Reverse Engineering – Telegram
Reverse Engineering
4.75K subscribers
106 photos
1 video
18 files
458 links
Everything is open-source.

The official community group: @reverseengineeringz
Download Telegram
Learn regex the easy way.

Regular expression is a group of characters or symbols which is used to find a specific pattern from a text.

https://github.com/ziishaned/learn-regex/blob/master/README.md
[ExpDev] Weaponizing Your Favorite PE — Portable Executable Exploit
https://link.medium.com/fF6Sdvdls1
Converts PE so that it can be then injected just like a normal shellcode.
(At the same time, the output file remains to be a valid PE).
Supports both 32 and 64 bit PEs

https://github.com/hasherezade/pe_to_shellcode
Portable Executable (P.E.) Code Injection: Injecting an Entire C Compiled Application

https://www.codeproject.com/Articles/24417/Portable-Executable-P-E-Code-Injection-Injecting-a
This media is not supported in your browser
VIEW IN TELEGRAM
ROPGenerator is a tool that helps you building ROP exploits by finding and chaining gadgets together

https://github.com/Boyan-MILANOV/ropgenerator
Debugging Windows Services For Malware Analysis / Reverse Engineering

https://secrary.com/Random/WindowsServiceDebugging/
claripy Solver Engine. A frontend to z3.

http://angr.io/api-doc/claripy.html
SMUC: Simplified MITRE Use Cases, it describes the Attack and Detection

https://github.com/karemfaisal/SMUC
Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.

https://github.com/HassanShehata/KeySpark
A realtime assembler and disassembler  
https://disasm.pro/