Reverse Engineering
@reverseengineeringx
4.75K
subscribers
106
photos
1
video
18
files
458
links
Everything is open-source.
The official community group:
@reverseengineeringz
Download Telegram
Join
Reverse Engineering
4.75K subscribers
Reverse Engineering
https://reverseengineering.stackexchange.com/questions/16490/how-to-decompile-with-hex-rays-via-a-python-api
Reverse Engineering Stack Exchange
How to decompile with Hex Rays via a Python API?
If i have a large set of files and I'd like to run Hex-rays over them to produce output as C - can I do so in python?
I see there is IDA Python
And I see Hex-rays has a C++ SDK
Is there a python He...
Reverse Engineering
https://www.youtube.com/playlist?list=PLXOtMhdRHh8GvATwwwIzgzWBrHtiqUZLC
YouTube
null - YouTube
Reverse Engineering
https://www.gnu.org/software/libc/manual/pdf/libc.pdf
Reverse Engineering
https://github.com/m0n0ph1/malware-1
GitHub
GitHub - m0n0ph1/malware-1: Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code. - m0n0ph1/malware-1
Reverse Engineering
https://link.medium.com/RTCx1uvHeZ
Medium
Triton Is the World’s Most Murderous Malware, and It’s Spreading
It was discovered in the Middle East, but the hackers behind it are now targeting companies in North America and other parts of the world
Reverse Engineering
https://www.riverloopsecurity.com/blog/2019/05/pcode/
River Loop Security
Working With Ghidra’s P-Code To Identify Vulnerable Function …
Cybersecurity solutions for the whole lifecycle of IoT and embedded systems.
Reverse Engineering
http://ghidra.re/courses/GhidraClass/Intermediate/HeadlessAnalyzer.html#1.0
Reverse Engineering
https://aboureada.com/cheat_sheet/2017/12/20/radare2_cheat_sheet.html
{ Anas Aboureada }
Radare2 cheat Sheet
Blog and website of Anas Aboureada, blogging mainly about cyber security. Opinions expressed are mine.
Reverse Engineering
Qt Reverse Engineering.pdf
143.9 KB
Reverse Engineering
https://github.com/d35ha/xLogger
GitHub
GitHub - d35ha/xLogger: Simple windows API logger
Simple windows API logger. Contribute to d35ha/xLogger development by creating an account on GitHub.
Reverse Engineering
https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html
SEI Blog
Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra
This post explores how to use the new OOAnalyzer Ghidra Plugin to import C++ class information into the NSA's Ghidra tool and interpret results in the Ghidra SRE framework.
Reverse Engineering
https://searchsecurity.techtarget.com/definition/metamorphic-and-polymorphic-malware
Security
metamorphic and polymorphic malware
Learn how to detect and prevent metamorphic and polymorphic malware, two types of malicious software that change their code as they propagate through a system.
Reverse Engineering
https://www.youtube.com/watch?v=Jsohdah8ZCg
YouTube
Malware Theory - Oligomorphic, Polymorphic and Metamorphic Viruses
Concepts and terminology of encrypted viruses and self-mutating viruses.
My malware analysis course for beginners: https://www.udemy.com/course/windows-malware-analysis-for-hedgehogs-beginner-training/?referralCode=EE0E2DC9FA7388FF25B7
Buy me a coffee: https://ko…
Reverse Engineering
https://www.youtube.com/watch?v=Uaunytw-otk
YouTube
DEF CON 24 - The Remote Metamorphic Engine - Detecting - Evading - Attacking
Amro Abdelgawad Founder, Immuneye
As a matter of fact, it is all about time to reverse engineer the most complex piece of code. Code complicity techniques are usually used just to increase the time and effort needed for reverse engineering. The desired effect…
Reverse Engineering
https://remnux.org/docs/containers/malware-analysis/
Reverse Engineering
https://www.youtube.com/watch?v=RUmYojxy3Xw
YouTube
Creating SNORT Rules
Summary
Several examples of Snort rule creation and triggered alerts.
4:22 - Adding custom rules to Snort configuration
4:47 - Create custom rules file
5:40 - FTP alert rule
14:57 - Manually running Snort
17:53 -…
Reverse Engineering
https://github.com/multiarch/qemu-user-static
GitHub
GitHub - multiarch/qemu-user-static: :earth_africa: `/usr/bin/qemu-*-static`
:earth_africa: `/usr/bin/qemu-*-static`. Contribute to multiarch/qemu-user-static development by creating an account on GitHub.
Reverse Engineering
https://github.com/ALSchwalm/dwarfexport
GitHub
GitHub - ALSchwalm/dwarfexport: Export dwarf debug information from IDA Pro
Export dwarf debug information from IDA Pro. Contribute to ALSchwalm/dwarfexport development by creating an account on GitHub.
Reverse Engineering
https://resources.infosecinstitute.com/snort-rules-workshop-part-one/#gref
Reverse Engineering
https://youtu.be/dk39uVyrS_o
YouTube
Wireshark Advanced Malware Traffic Analysis
Please check out my Udemy courses! Coupon code applied to the following links....
https://www.udemy.com/hands-on-penetration-testing-labs-30/?couponCode=NINE99
https://www.udemy.com/hands-on-penetration-testing-labs-20/?couponCode=NINE99
https://www.udemy.com/kali…
Reverse Engineering
https://urlvoid.com
URLVoid.com
Check if a Website is Malicious/Scam or Safe/Legit | URLVoid
Free website reputation checker tool lets you scan a website with multiple website reputation/blocklist services to check if the website is safe and legit or malicious. Check the online reputation of a website to better detect potentially malicious and scam…
TWeb.init({scrollToPost:'reverseengineeringx/411'});