Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse...
Bytecode Viewer is an Advanced Lightweight Java Bytecode Viewer, GUI Java Decompiler, GUI Bytecode Editor, GUI Smali, GUI Baksmali, GUI APK Editor,...
Malwasm is a Cuckoo Sandbox based open source tool that is designed to help malware reverse engineering tasks. How Malwasm Works: The...
Black Rabbit – Python Cross-Compiled Reverse Shell for Windows Installation apt-get install wine git clone https://github.com/m4n3dw0lf/blackrabbit.git Usage #Edit the Master host informations:...
Apktool is used for reverse engineering 3rd party Android apps. Debugging is made easier with Apktool’s ability to decrypt properties to their...
SQL CHAR encoding SQL CAST encoding Case encoding of SQL keywords Substring(Experimental – Disabled by default as it will fail with nested...
Reverse Engineering Tool for py2exe applications. Prerequisites cmake git python2.7 Cloning git clone https://github.com/4w4k3/rePy2exe.git Running python rePy2exe.py or python2.7 rePy2exe.py Authors Alisson...
rePy2exe, a Reverse Engineering Tool for py2exe applications. cmake git python 2.7 Enter the following command to download rePy2exe file git...
Lobotomy is a command line based Android reverse engineering tool. Components: Permission Strings Attack Surface Surgical Interact UI De-compile De-buggable Dextra...
MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse...
The DUBNIUM campaign in December involved one exploit in-the-wild that affected Adobe Flash Player. In this blog, we’re going to examine the...
For our most recent IoT adventure, we’ve examined an outdoor cloud security camera which like many devices of its generation a) has...
Malicious Software can be Virus, Worm, Trojan Horse, Rootkit, Bot, DoS Tool,Exploit kit, Spyware. The objective of malware analysis is to gain...
Sidedoor maintains a reverse tunnel to provide a backdoor. sidedoor can be used to remotely control a device behind a NAT. Sidedoor...
A small, very fast and powerful text extractor.It can extract text from any kind of file and includes the ability to find...
Over the last year, criminals in Russia found a way to steal 252 million Rubles ($3.8 million) from five unnamed banks, using a...
If you’ve ever needed to know how another piece of code works, or have been at the mercy of someone else’s bugs,...
A Resolver will “lookup” a username on a VPS hosting the hacked skype, which allows the skype to pull data from the...
This week, UK IT worker and social engineering blogger Dale Pearson was targeted - with eight phone calls from a company claiming...
I’m not always in alignment with Jeffrey Carr’s point of view but in this he is spot on. Succinct and to the...