Reverse Engineering – Telegram
Reverse Engineering
4.75K subscribers
106 photos
1 video
18 files
458 links
Everything is open-source.

The official community group: @reverseengineeringz
Download Telegram
Radare2 asm to shellcode
Pwntools shellcode to asm
R2 backtrace => dbt
R2 memoy map => dm
HxD can inspect process memory directly
Tools -> open RAM -> proc name
Or use tools like process hacker to dump process memory
Sonic visualiser
Z3 SMT solver
R2pipe automated debugging
IDA pro python interpreter
X64dbg function locals
IDA pro source code debugging
Pwntools simple shell
Ponce plugin for one click taint analysis and symbolic execution
https://github.com/illera88/Ponce
Dnspy .net decompiler & debugger
Representing assembly algorithm using python
Cutter & EDB for complete GUI static & dynamic analysis within linux