eCRE – Reverse Engineering Professional, INE Version, 2021
The eLearnSecurity Certified Reverse Engineer (eCRE) is awarded to reverse engineers after passing a rigorous, practical examination.
ECRE is a now retired certification created by INE Security. It certifies that the individual is capable of performing reverse engineering on Windows-based applications. Candidates have to pass a challenging theoretical exam and successfully complete a practical test where they prove their ability to analyze complex algorithms and code, and to bypass different code obfuscation methods
Password:GREENARMOR
#education #reverse
The eLearnSecurity Certified Reverse Engineer (eCRE) is awarded to reverse engineers after passing a rigorous, practical examination.
ECRE is a now retired certification created by INE Security. It certifies that the individual is capable of performing reverse engineering on Windows-based applications. Candidates have to pass a challenging theoretical exam and successfully complete a practical test where they prove their ability to analyze complex algorithms and code, and to bypass different code obfuscation methods
Password:
#education #reverse
👍5🤔1
Reverse-Engineering-Course by FaxHack, 2024
Reverse engineering focusing on x64 Windows. This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
GitHub
#reverse #education
Reverse engineering focusing on x64 Windows. This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
GitHub
#reverse #education
🔥9👍3
Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code with Intel x64, Dmitry Vostokov, 2023
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers.
This book provides the background knowledge and practical foundations you’ll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. You’ll also work with the GDB debugger and use it for disassembly and reversing.
What You'll Learn:
✅ Review the basics of x64 assembly language
✅ Examine the essential GDB debugger commands for debugging and binary analysis
✅ Study C and C++ compiler code generation with and without compiler optimizations
✅ Look at binary code disassembly and reversing patterns
✅ See how pointers in C and C++ are implemented and used
#book #linux #reverse
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers.
This book provides the background knowledge and practical foundations you’ll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. You’ll also work with the GDB debugger and use it for disassembly and reversing.
What You'll Learn:
✅ Review the basics of x64 assembly language
✅ Examine the essential GDB debugger commands for debugging and binary analysis
✅ Study C and C++ compiler code generation with and without compiler optimizations
✅ Look at binary code disassembly and reversing patterns
✅ See how pointers in C and C++ are implemented and used
#book #linux #reverse
👍2🔥2❤1
Reverse Engineering For Everyone! by tadwhitaker, 2021
A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
GitHub
The tutorial + PDF
#reverse #coding
A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
GitHub
The tutorial + PDF
#reverse #coding
🔥6👍4🤝3🤡2
Reverse Engineering For Everyone! by mytechnotalent, 2024
This comprehensive set of reverse engineering tutorials covers x86, x64 as well as 32-bit ARM and 64-bit architectures. If you're a newbie looking to learn reversing, or just someone looking to revise on some concepts, you're at the right
place.
As a beginner, these tutorials will carry you from nothing up to the mid basics of reverse engineering, a skill that everyone within the realm of cybersecurity should possess. If you're here just to refresh some concepts, you can conveniently use the side bar to take a look at the sections that has been covered so far.
❗️ GitHub
⛳️ Mirror
#reverse #education
This comprehensive set of reverse engineering tutorials covers x86, x64 as well as 32-bit ARM and 64-bit architectures. If you're a newbie looking to learn reversing, or just someone looking to revise on some concepts, you're at the right
place.
As a beginner, these tutorials will carry you from nothing up to the mid basics of reverse engineering, a skill that everyone within the realm of cybersecurity should possess. If you're here just to refresh some concepts, you can conveniently use the side bar to take a look at the sections that has been covered so far.
❗️ GitHub
⛳️ Mirror
#reverse #education
🔥5👍2
Top books for Reverse Engineering.zip
50.1 MB
8 Best e-books for Reverse Engineering (ENG)
⛳️ Bypass Antivirus
⛳️ Learn Malware Analysis
⛳️ Learn Ollydbg
⛳️ Practical Reverse Engineering
⛳️ Reverse Eng. For Beginners
⛳️ Reverse Engineering Code IDA
⛳️ Reverse engineering secret
⛳️ The IDA Pro Books
#book #reverse #malware
⛳️ Bypass Antivirus
⛳️ Learn Malware Analysis
⛳️ Learn Ollydbg
⛳️ Practical Reverse Engineering
⛳️ Reverse Eng. For Beginners
⛳️ Reverse Engineering Code IDA
⛳️ Reverse engineering secret
⛳️ The IDA Pro Books
#book #reverse #malware
🔥6👍2❤1
Mastering Cybersecurity: A Practical Guide for Professionals, Volume 1, 2025
Volume 1: The first volume starts with the fundamentals and hands‑on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn’t just about identifying weaknesses; it’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You’ll also learn live hunting for vulnerable devices and systems on the Internet.
The various attack categories available in Kali Linux along with their descriptions and installed tools to perform different operations are as follows:
⛳️ Information gathering – collect and format the initial target data about systems and networks in a form that could be used in the future. Tools are NMAP, Zenmap, Stealth Scan, Dimitry, and Maltego.
⛳️ Web App analysis – identify weaknesses by accessing websites through browser-based tools to find bugs or loopholes leading to information or data loss. Tools are Skipfish, ZAP, Wpscan, SQLMap, HTTrack, Burpsuite, Vega, and Webscarap.
⛳️ Database assessment – access database to analyze for different attacks and security issues.
Tools are SQLMap, SQLNinja, Bbqsl, Jsql Injection, and Oscanner.
⛳️ Password cracking – handle the worklist or the password list to check against login credentials of different services, protocols, and hashes. Tools include Cewl, Crunch, Hashcat, John, Medusa, and Ncrack.
⛳️ Wireless attacks – assess and exploit wireless networks like Wifi routers and access points. These are useful not only for just SSID cracking but also for gathering information about user browsing behavior. Tools include Aircrack-NG, Kismet, Ghost Phisher, Wifilite, and Fern-Wifi-Cracker.
⛳️ Reverse engineering – helps break down the layers of applications by reaching into the source code to understand its working logic and data flow to manipulate as required. Tools include Nsam Shell, Flasm, Ollydbg, and Apktools.
⛳️ Exploitation tools – are frameworks that generate payloads that exploit known vulnerabilities in systems, apps, and services. Tools include Armitage, Metasploit, SearchSploit, Beef XSS, Termineter, and Social Engineering Toolkit.
⛳️ Sniffing and spoofing – secretly accessing data in an unauthorized manner, using fake profiles, and hiding real identity. Tools include Wireshark, Bettercap, Ettercap, Hamster, Driftnet, MACchanger, and Responder.
#book #pentest #kali #web #linux #reverse
Volume 1: The first volume starts with the fundamentals and hands‑on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn’t just about identifying weaknesses; it’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You’ll also learn live hunting for vulnerable devices and systems on the Internet.
The various attack categories available in Kali Linux along with their descriptions and installed tools to perform different operations are as follows:
⛳️ Information gathering – collect and format the initial target data about systems and networks in a form that could be used in the future. Tools are NMAP, Zenmap, Stealth Scan, Dimitry, and Maltego.
⛳️ Web App analysis – identify weaknesses by accessing websites through browser-based tools to find bugs or loopholes leading to information or data loss. Tools are Skipfish, ZAP, Wpscan, SQLMap, HTTrack, Burpsuite, Vega, and Webscarap.
⛳️ Database assessment – access database to analyze for different attacks and security issues.
Tools are SQLMap, SQLNinja, Bbqsl, Jsql Injection, and Oscanner.
⛳️ Password cracking – handle the worklist or the password list to check against login credentials of different services, protocols, and hashes. Tools include Cewl, Crunch, Hashcat, John, Medusa, and Ncrack.
⛳️ Wireless attacks – assess and exploit wireless networks like Wifi routers and access points. These are useful not only for just SSID cracking but also for gathering information about user browsing behavior. Tools include Aircrack-NG, Kismet, Ghost Phisher, Wifilite, and Fern-Wifi-Cracker.
⛳️ Reverse engineering – helps break down the layers of applications by reaching into the source code to understand its working logic and data flow to manipulate as required. Tools include Nsam Shell, Flasm, Ollydbg, and Apktools.
⛳️ Exploitation tools – are frameworks that generate payloads that exploit known vulnerabilities in systems, apps, and services. Tools include Armitage, Metasploit, SearchSploit, Beef XSS, Termineter, and Social Engineering Toolkit.
⛳️ Sniffing and spoofing – secretly accessing data in an unauthorized manner, using fake profiles, and hiding real identity. Tools include Wireshark, Bettercap, Ettercap, Hamster, Driftnet, MACchanger, and Responder.
#book #pentest #kali #web #linux #reverse
👍4👏4❤2🔥1
𝐅𝐑𝐄𝐄 𝐑𝐄𝐒𝐎𝐔𝐑𝐂𝐄𝐒 𝐆𝐀𝐌𝐄 𝐇𝐀𝐂𝐊𝐈𝐍𝐆
Games are pentested to identify and mitigate security vulnerabilities, comply with regulatory requirements, and improve overall quality. Pentesting helps protect gamers by securing personal information, preventing cheating, and preventing game disruptions.
❗️ 𝗜𝗡𝗧𝗥𝗢𝗗𝗨𝗖𝗧𝗜𝗢𝗡
🌟 Intro to GamePwn (aka Game Hacking) on Hack The Box
https://lnkd.in/eGDmzbr5
❗️𝗖𝗢𝗨𝗥𝗦𝗘𝗦
🌟 Beginner’s guide to Game Hacking by Guided Hacking
https://lnkd.in/erbi7ecN
🌟 Game Hacking by Cryptocat (Intigriti)
https://lnkd.in/eTqp6atd
🌟 Learn Game hacking on Game Hacking Academy
https://lnkd.in/eVt3mK4G
❗️𝗧𝗢𝗢𝗟𝗦
🌟 The Ultimate Game Hacking Resource by Dsasmblr
https://lnkd.in/e3hJydV5
❗️ 𝗣𝗥𝗔𝗖𝗧𝗜𝗖𝗘
🌟 Pwn Adventure 3 - Pwnie Island
https://lnkd.in/eKHYHG2v
🌟 Reverse Engineering an MMORPG by Antonin Beaujant
https://lnkd.in/eZwfct8U
❗️𝗦𝗧𝗔𝗡𝗗𝗔𝗥𝗗𝗦 𝗔𝗡𝗗 𝗥𝗘𝗙𝗘𝗥𝗘𝗡𝗖𝗘𝗦
🌟 OWASP Game Security Framework by Daniel Miessler and Jason Haddix
https://lnkd.in/e7dCYgrp
❗️ 𝗥𝗘𝗦𝗢𝗨𝗥𝗖𝗘𝗦
🌟 Resources Game Hacking by CryptoCat
https://lnkd.in/e_rBWjie
#reverse #coding
Games are pentested to identify and mitigate security vulnerabilities, comply with regulatory requirements, and improve overall quality. Pentesting helps protect gamers by securing personal information, preventing cheating, and preventing game disruptions.
❗️ 𝗜𝗡𝗧𝗥𝗢𝗗𝗨𝗖𝗧𝗜𝗢𝗡
🌟 Intro to GamePwn (aka Game Hacking) on Hack The Box
https://lnkd.in/eGDmzbr5
❗️𝗖𝗢𝗨𝗥𝗦𝗘𝗦
🌟 Beginner’s guide to Game Hacking by Guided Hacking
https://lnkd.in/erbi7ecN
🌟 Game Hacking by Cryptocat (Intigriti)
https://lnkd.in/eTqp6atd
🌟 Learn Game hacking on Game Hacking Academy
https://lnkd.in/eVt3mK4G
❗️𝗧𝗢𝗢𝗟𝗦
🌟 The Ultimate Game Hacking Resource by Dsasmblr
https://lnkd.in/e3hJydV5
❗️ 𝗣𝗥𝗔𝗖𝗧𝗜𝗖𝗘
🌟 Pwn Adventure 3 - Pwnie Island
https://lnkd.in/eKHYHG2v
🌟 Reverse Engineering an MMORPG by Antonin Beaujant
https://lnkd.in/eZwfct8U
❗️𝗦𝗧𝗔𝗡𝗗𝗔𝗥𝗗𝗦 𝗔𝗡𝗗 𝗥𝗘𝗙𝗘𝗥𝗘𝗡𝗖𝗘𝗦
🌟 OWASP Game Security Framework by Daniel Miessler and Jason Haddix
https://lnkd.in/e7dCYgrp
❗️ 𝗥𝗘𝗦𝗢𝗨𝗥𝗖𝗘𝗦
🌟 Resources Game Hacking by CryptoCat
https://lnkd.in/e_rBWjie
#reverse #coding
❤9👍4
Unprotect Project by Thomas Roccia (fr0gger) and Jean-Pierre LESUEUR (DarkCoderSc), 2024
Malware authors spend a great deal of time and effort to develop complex code to perform malicious actions against a target system. It is crucial for malware to remain undetected and avoid sandbox analysis, antiviruses or malware analysts. With this kind of techniques, malware are able to pass under the radar and stay undetected on a system. The goal of this free database is to centralize the information about malware evasion techniques.
This project aims to provide Malware Analysts and Defenders with actionable insights and detection capabilities to shorten their response times.
❗️Source
📌Contribute
📌About project
#malware #reverse
Malware authors spend a great deal of time and effort to develop complex code to perform malicious actions against a target system. It is crucial for malware to remain undetected and avoid sandbox analysis, antiviruses or malware analysts. With this kind of techniques, malware are able to pass under the radar and stay undetected on a system. The goal of this free database is to centralize the information about malware evasion techniques.
This project aims to provide Malware Analysts and Defenders with actionable insights and detection capabilities to shorten their response times.
❗️Source
📌Contribute
📌About project
#malware #reverse
🔥6❤4
Изменения в облаке тегов:
[+] Добавлены новые теги:
#management - все для CISO, BISO, Lead Team, менеджмент ИБ в компании, управление командой, оценка ИБ продукта, от красноглазого батрака до белого воротничка
#architecture - безопасное проектирование, secure by design, архитектурное ревью ИТ инфраструктуры, STRIDE, Zero trust, Shift left концепции
#HR -поиск, вербовка, удержание кадров в ИТ\ИБ, специфика найма ИТ\ИБ-спецов, методы оценки кандидатов, прохождение интервью, мотивация, современный стэк технологий
[/] Изменение существующих тегов:
#great - все материалы по мотивации, вдохновению, саморазвитию, финансовой грамотности, инвестициям, все лучшее от автора w2hack переходит к новому тегу от прежнего #info
[+] Добавлены новые теги:
#management - все для CISO, BISO, Lead Team, менеджмент ИБ в компании, управление командой, оценка ИБ продукта, от красноглазого батрака до белого воротничка
#architecture - безопасное проектирование, secure by design, архитектурное ревью ИТ инфраструктуры, STRIDE, Zero trust, Shift left концепции
#HR -поиск, вербовка, удержание кадров в ИТ\ИБ, специфика найма ИТ\ИБ-спецов, методы оценки кандидатов, прохождение интервью, мотивация, современный стэк технологий
[/] Изменение существующих тегов:
#great - все материалы по мотивации, вдохновению, саморазвитию, финансовой грамотности, инвестициям, все лучшее от автора w2hack переходит к новому тегу от прежнего #info
👍9👀2🫡2🤔1
Reverse Engineering 1: x64dbg Debugger for Beginners, Paul Chin, PhD (Udemy), 2024
Learn how to reverse engineer and debug programs with x64dbg in 1 hour
If you had always wanted to learn how use x64dbg to reverse engineer and debug software, then this is the course for you.
x64dbg is one of the most popular modern debugger in use today and has superseded OllyDbg. It is used for Reverse Engineering, Malware Analysis and Software Debugging. In this course we will learn x64dbg by solving a simple CrackMe challenge. A CrackMe is a small program designed to test a programmer's reverse engineering skills.
This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to fix bugs where the source code is not available. This course will equip you with the knowledge and skill to use x64dbg in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to hero.
❗️Official page
#education #reverse
Learn how to reverse engineer and debug programs with x64dbg in 1 hour
If you had always wanted to learn how use x64dbg to reverse engineer and debug software, then this is the course for you.
x64dbg is one of the most popular modern debugger in use today and has superseded OllyDbg. It is used for Reverse Engineering, Malware Analysis and Software Debugging. In this course we will learn x64dbg by solving a simple CrackMe challenge. A CrackMe is a small program designed to test a programmer's reverse engineering skills.
This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to fix bugs where the source code is not available. This course will equip you with the knowledge and skill to use x64dbg in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to hero.
❗️Official page
#education #reverse
Assembly for Hacker, Hadess, 2025
The book produced by Hadess is a small work of art for those who are interested in (truly) low-level programming languages and are also curious to understand how inserting malicious code works directly into legitimate processes or in memory.
In addition to this document, they produce several others aimed mainly at offensive security.
Read on web site:
➡ Syntax;
➡ Sections;
➡ Processor Registers;
➡ System Calls;
➡ Strings;
➡ Numbers;
➡ Conditions;
➡ Addressing Modes;
➡ File Handling;
➡ Stack and Memory;
➡ Code Injection Attack;
➡ DLL Injection;
➡ APC Injection;
➡ Valid Accounts;
➡ System Binary Proxy Execution: Rundll32;
➡ Reflective code loading;
➡ Modify Registry;
➡ Process Injection;
➡ Mark-Of-The-Web (MOTW) Bypass;
➡ Access Token Manipulation;
➡ Hijack Execution Flow;
➡ Resources.
#reverse #coding #malware
The book produced by Hadess is a small work of art for those who are interested in (truly) low-level programming languages and are also curious to understand how inserting malicious code works directly into legitimate processes or in memory.
In addition to this document, they produce several others aimed mainly at offensive security.
Read on web site:
#reverse #coding #malware
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
The small list tutorials of Reverse Engineering with Radare2
Radare2 (also known as r2) is a complete framework for reverse-engineering and analyzing binaries; composed of a set of small utilities that can be used together or independently from the command line. Built around a disassembler for computer software which generates assembly language source code from machine-executable code, it supports a variety of executable formats for different processor architectures and operating systems
❗️Radare2 Reversing Series by ConsoleCowboys
❗️Reverse Engineering with Radare2 by ÆTHER SECURITY LAB
❗️Radare2 Tutorial by inaryAdventure
#education #reverse
Radare2 (also known as r2) is a complete framework for reverse-engineering and analyzing binaries; composed of a set of small utilities that can be used together or independently from the command line. Built around a disassembler for computer software which generates assembly language source code from machine-executable code, it supports a variety of executable formats for different processor architectures and operating systems
❗️Radare2 Reversing Series by ConsoleCowboys
❗️Reverse Engineering with Radare2 by ÆTHER SECURITY LAB
❗️Radare2 Tutorial by inaryAdventure
#education #reverse
The small list of Ghidra Reverse Engineering Tutorials
Ghidra is a free and open source reverse engineering tool developed by the National Security Agency (NSA) of the United States. The binaries were released at RSA Conference in March 2019; the sources were published one month later on GitHub. Ghidra is seen by many security researchers as a competitor to IDA Pro. The software is written in Java using the Swing framework for the GUI.
The decompiler component is written in C++, and is therefore usable in a stand-alone form.
❗️Ghidra Reversing Tutorials by Dr Josh Stroschein - The Cyber Yeti channel
❗️Introduction to Software Reverse Engineering by Eugene Kirian
#reverse #education
Ghidra is a free and open source reverse engineering tool developed by the National Security Agency (NSA) of the United States. The binaries were released at RSA Conference in March 2019; the sources were published one month later on GitHub. Ghidra is seen by many security researchers as a competitor to IDA Pro. The software is written in Java using the Swing framework for the GUI.
The decompiler component is written in C++, and is therefore usable in a stand-alone form.
❗️Ghidra Reversing Tutorials by Dr Josh Stroschein - The Cyber Yeti channel
❗️Introduction to Software Reverse Engineering by Eugene Kirian
#reverse #education
Видео курс по реверс инжинирингу в компьютерных играх, ANDREWFEED
Как делают читы? В серии видео я расскажу о том, как создаются читы для игр. Обсудим базу знаний, необходимую для создания первого чита с нуля. Включая устройство компьютера, виды читов, процесс компиляции кода, преобразования кода в ассемблер, основные типы данных, устройство памяти, регистры и инструкции процессора, софт используемый в реверс-инжиниринге и декомпиляции, обсудим типы поиска и поиск указателей используя Cheat Engine, а так же реверсинг используя такие стандарты в области как IDA и Ghidra.
Плавно перейдём к функциям читов и реализации пользовательского интерфейса на С++ используя библиотеки, в том числе ImGui. По итогу найдём ответ на вопрос "как научиться писать читы".
Пройдя этот курс по реверс инжинирингу вы узнаете как сделать свой чит с нуля на любую игру.
❗️Смотреть плейлист
#reverse
Как делают читы? В серии видео я расскажу о том, как создаются читы для игр. Обсудим базу знаний, необходимую для создания первого чита с нуля. Включая устройство компьютера, виды читов, процесс компиляции кода, преобразования кода в ассемблер, основные типы данных, устройство памяти, регистры и инструкции процессора, софт используемый в реверс-инжиниринге и декомпиляции, обсудим типы поиска и поиск указателей используя Cheat Engine, а так же реверсинг используя такие стандарты в области как IDA и Ghidra.
Плавно перейдём к функциям читов и реализации пользовательского интерфейса на С++ используя библиотеки, в том числе ImGui. По итогу найдём ответ на вопрос "как научиться писать читы".
Пройдя этот курс по реверс инжинирингу вы узнаете как сделать свой чит с нуля на любую игру.
❗️Смотреть плейлист
#reverse
This media is not supported in your browser
VIEW IN TELEGRAM
Copilot for IDA Pro by Antelcat, 2023
Welcome to the ChatGPT plugin for IDA Pro, where the cutting-edge capabilities of OpenAI's GPT models meet the powerful disassembly and debugging features of IDA Pro. This plugin leverages LangChain and the latest Agent-based approach to automate the analysis of decompiled code in IDA, making reverse engineering easier and more interactive than ever.
❗️GitHub
VulChatGPT by ke0z, 2023
An IDA PRO plugin to help in finding vulnerabilites in binaries. Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries
❗️GitHub
See also:
⛳️ ChatGPT for Forensic Analyze
#reverse #AI
Welcome to the ChatGPT plugin for IDA Pro, where the cutting-edge capabilities of OpenAI's GPT models meet the powerful disassembly and debugging features of IDA Pro. This plugin leverages LangChain and the latest Agent-based approach to automate the analysis of decompiled code in IDA, making reverse engineering easier and more interactive than ever.
❗️GitHub
VulChatGPT by ke0z, 2023
An IDA PRO plugin to help in finding vulnerabilites in binaries. Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries
❗️GitHub
See also:
⛳️ ChatGPT for Forensic Analyze
#reverse #AI
Arm Assembly Internals & Reverse Engineering by Maria Markstedter
Welcome to this tutorial series on ARM assembly basics. This is the preparation for the followup tutorial series on ARM exploit development. Before we can dive into creating ARM shellcode and build ROP chains, we need to cover some ARM Assembly basics first.
🛡 Official page
😺 About author
#hardware #reverse
Welcome to this tutorial series on ARM assembly basics. This is the preparation for the followup tutorial series on ARM exploit development. Before we can dive into creating ARM shellcode and build ROP chains, we need to cover some ARM Assembly basics first.
🛡 Official page
#hardware #reverse
Please open Telegram to view this post
VIEW IN TELEGRAM
❤7🔥5😁1
Kaspersky Reverse Challenge Cup on Zero Nights (Moscow, Russia) likely refers to a reverse engineering malware competition or challenge organized by Kaspersky Lab, possibly with a focus on scenarios where participants have limited time to analyze and solve problems.
Парни, кто решал crackme от ЛК в 2010-х годах? Это было эпично, мой первый дебют после самооучения реверсу (CrackLab, ExeLab many thanks) состоявшийся на ZN 2017. Бинарик уже потерян, но солюшн остался в черновиках. Если интересно ставьте
#fun #malware #reverse
Please open Telegram to view this post
VIEW IN TELEGRAM
👍17❤1
Gepetto - OpenAI ChatGPT IDA Plugin by JusticeRage (Ivan Kwiatkowski), 2025
IDA plugin which queries language models to speed up reverse-engineering. Gepetto is a Python plugin which uses various large language models to provide meaning to functions decompiled by IDA Pro (≥ 7.4). It can leverage them to explain what a function does, and to automatically rename its variables.
☄️ GitHub
See also:
Manalyzer + GitHub
#reverse #AI
IDA plugin which queries language models to speed up reverse-engineering. Gepetto is a Python plugin which uses various large language models to provide meaning to functions decompiled by IDA Pro (≥ 7.4). It can leverage them to explain what a function does, and to automatically rename its variables.
Simply drop this script into your IDA plugins folder ($IDAUSR/plugins).
You will need to add the required packages to IDA's Python installation for the script to work. Find which interpreter IDA is using by checking the following registry key:
Computer\HKEY_CURRENT_USER\Software\Hex-Rays\IDA (default on Windows: %LOCALAPPDATA%\Programs\Python\Python39)
See also:
Manalyzer + GitHub
#reverse #AI
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6👍3❤1