Reverse Engineering – Telegram
Reverse Engineering
4.75K subscribers
106 photos
1 video
18 files
458 links
Everything is open-source.

The official community group: @reverseengineeringz
Download Telegram
DynamoRIO

DynamoRIO is a runtime code manipulation system that supports code transformations on any part of a program, while it executes. DynamoRIO exports an interface for building dynamic tools for a wide variety of uses: program analysis and understanding, profiling, instrumentation, optimization, translation, etc.

https://github.com/DynamoRIO/dynamorio
emerald
Import DynamoRIO drcov code coverage data into Ghidra

https://github.com/reb311ion/emerald
sysmon-modular

a sysmon configuration repository for everybody to customise

https://github.com/olafhartong/sysmon-modular
capa detects capabilities in executable files. You run it against a PE file or shellcode and it tells you what it thinks the program can do. For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate.

https://github.com/fireeye/capa
PE Tree
Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro to dump in-memory PE files and reconstruct imports.

https://github.com/blackberry/pe_tree