Bytecode Viewer – A Java 8 Jar & Android Apk Reverse Engineering Suite

Bytecode Viewer is an Advanced Lightweight Java Bytecode Viewer, GUI Java Decompiler, GUI Bytecode Editor, GUI Smali, GUI Baksmali, GUI APK Editor, GUI Dex Editor, GUI APK Decompiler, GUI DEX Decompiler, GUI Procyon Java Decompiler, GUI Krakatau, GUI CFR Java Decompiler, GUI FernFlower Java Decompiler, GUI DEX2Jar, GUI Jar2DEX, GUI Jar-Jar, Hex Viewer, Code Searcher, […]

Installing Apktool for Reverse Engineering Android Apps

Apktool is used for reverse engineering 3rd party Android apps. Debugging is made easier with Apktool’s ability to decrypt properties to their practically original forms. By rebuilding the properties post alteration, a user can gradually debug a smali code. Kali lists the features of apktool: decoding resources to nearly original form (including resources.arsc, XMLs and […]

rePy2exe – A Reverse Engineering Tool for py2exe applications

Reverse Engineering Tool for py2exe applications. Prerequisites cmake git python2.7 Cloning git clone https://github.com/4w4k3/rePy2exe.git Running python rePy2exe.py or python2.7 rePy2exe.py Authors Alisson Moretto – Coder – 4w4k3 Reference Thanks to: zrax – pycdc matiasb – unpy2exe License This project is licensed under the GPL 3.0 License – see the LICENSE file for details.

rePy2exe – Reverse Engineering Tool For py2exe Applications

rePy2exe, a Reverse Engineering Tool for py2exe applications.   cmake git python 2.7 Enter the following command to download rePy2exe file git clone https://github.com/4w4k3/rePy2exe.git   Now to run rePy2exe type python rePy2exe.py python2.7 rePy2exe.py Download now –  rePy2exe

Lobotomy – Android Reverse Engineering Tool

Lobotomy is a command line based Android reverse engineering tool.   Components: Permission Strings Attack Surface Surgical Interact UI De-compile De-buggable Dextra Socket   OSX Components required for python-adb brew install openssl   brew install swig   env LDFLAGS=”-L$(brew –prefix openssl)/lib” CFLAGS=”-I$(brew –prefix openssl)/include” SWIG_FEATURES=”-cpperraswarn -includeall -I$(brew –prefix openssl)/include”   Now enter the following code […]

Hack any Mobile APP – Reverse engineering and Analysis Framework.

MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering tools, in order to make the task or reverse engineering and analysis easier and friendly to mobile application developers and security professionals. Features supported Reverse engineer apk files to smali, java jar […]

Push To Hack: Reverse engineering an IP camera

For our most recent IoT adventure, we’ve examined an outdoor cloud security camera which like many devices of its generation a) has an associated mobile app b) is quick to setup and c) presents new security threats to your network. The Motorola Focus 73 outdoor security camera is packed with features and quite a few […]

How to do malware reverse engineering

Malicious Software can be Virus, Worm, Trojan Horse, Rootkit, Bot, DoS Tool,Exploit kit, Spyware. The objective of malware analysis is to gain an understanding of how specific pieces of malware work. There are important questions that must be answered. Like, how did this machine become infected and what exactly does this malware do? In this […]

Reverse Engineering Tool – BinText

A small, very fast and powerful text extractor.It can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item. Basically, we need to extract the appropriate text that will lead us back to the hacker. […]

Reverse-engineering DUBNIUM’s Flash-targeting exploit

The DUBNIUM campaign in December involved one exploit in-the-wild that affected Adobe Flash Player. In this blog, we’re going to examine the technical details of the exploit that targeted vulnerability CVE-2015-8651. For more details on this vulnerability, see Adobe Security Bulletin APSB16-01. Note that Microsoft Edge on Windows 10 was protected from this attack due […]

Reverse-Engineering iOS Apps: Hacking on Lyft

If you’ve ever needed to know how another piece of code works, or have been at the mercy of someone else’s bugs, you can always look at the source code… unless you don’t have it. In this talk, Conrad covers many concepts & tools that can used to reverse-engineer existing apps, as well as debug […]