white2hack 📚
12.5K subscribers
4.81K photos
135 videos
1.96K files
2.27K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://xn--r1a.website/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
eCRE – Reverse Engineering Professional, INE Version, 2021

The eLearnSecurity Certified Reverse Engineer (eCRE) is awarded to reverse engineers after passing a rigorous, practical examination.

ECRE is a now retired certification created by INE Security. It certifies that the individual is capable of performing reverse engineering on Windows-based applications. Candidates have to pass a challenging theoretical exam and successfully complete a practical test where they prove their ability to analyze complex algorithms and code, and to bypass different code obfuscation methods

Password: GREENARMOR

#education #reverse
👍5🤔1
Reverse-Engineering-Course by FaxHack, 2024

Reverse engineering focusing on x64 Windows. This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

GitHub

#reverse #education
🔥9👍3
Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code with Intel x64, Dmitry Vostokov, 2023

Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers.

This book provides the back­ground knowledge and practical foundations you’ll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. You’ll also work with the GDB debugger and use it for disassembly and reversing.

What You'll Learn:
Review the basics of x64 assembly language
Examine the essential GDB debugger commands for debugging and binary analysis
Study C and C++ compiler code generation with and without compiler optimizations
Look at binary code disassembly and reversing patterns
See how pointers in C and C++ are implemented and used

#book #linux #reverse
👍2🔥21
Reverse Engineering For Everyone! by tadwhitaker, 2021

A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

GitHub
The tutorial + PDF

#reverse #coding
🔥6👍4🤝3🤡2
Reverse Engineering For Everyone! by mytechnotalent, 2024

This comprehensive set of reverse engineering tutorials covers x86, x64 as well as 32-bit ARM and 64-bit architectures. If you're a newbie looking to learn reversing, or just someone looking to revise on some concepts, you're at the right
place.

As a beginner, these tutorials will carry you from nothing up to the mid basics of reverse engineering, a skill that everyone within the realm of cybersecurity should possess. If you're here just to refresh some concepts, you can conveniently use the side bar to take a look at the sections that has been covered so far.

❗️ GitHub
⛳️
Mirror

#reverse #education
🔥5👍2
Top books for Reverse Engineering.zip
50.1 MB
8 Best e-books for Reverse Engineering (ENG)

⛳️ Bypass Antivirus
⛳️ Learn Malware Analysis
⛳️ Learn Ollydbg
⛳️ Practical Reverse Engineering
⛳️ Reverse Eng. For Beginners
⛳️ Reverse Engineering Code IDA
⛳️ Reverse engineering secret
⛳️ The IDA Pro Books

#book #reverse #malware
🔥6👍21
Mastering Cybersecurity: A Practical Guide for Professionals, Volume 1, 2025

Volume 1: The first volume starts with the fundamentals and hands‑on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn’t just about identifying weaknesses; it’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You’ll also learn live hunting for vulnerable devices and systems on the Internet.

The various attack categories available in Kali Linux along with their descriptions and installed tools to perform different operations are as follows:

⛳️ Information gathering – collect and format the initial target data about systems and networks in a form that could be used in the future. Tools are NMAP, Zenmap, Stealth Scan, Dimitry, and Maltego.
⛳️ Web App analysis – identify weaknesses by accessing websites through browser-based tools to find bugs or loopholes leading to information or data loss. Tools are Skipfish, ZAP, Wpscan, SQLMap, HTTrack, Burpsuite, Vega, and Webscarap.
⛳️ Database assessment – access database to analyze for different attacks and security issues.
Tools are SQLMap, SQLNinja, Bbqsl, Jsql Injection, and Oscanner.
⛳️ Password cracking – handle the worklist or the password list to check against login credentials of different services, protocols, and hashes. Tools include Cewl, Crunch, Hashcat, John, Medusa, and Ncrack.
⛳️ Wireless attacks – assess and exploit wireless networks like Wifi routers and access points. These are useful not only for just SSID cracking but also for gathering information about user browsing behavior. Tools include Aircrack-NG, Kismet, Ghost Phisher, Wifilite, and Fern-Wifi-Cracker.
⛳️ Reverse engineering – helps break down the layers of applications by reaching into the source code to understand its working logic and data flow to manipulate as required. Tools include Nsam Shell, Flasm, Ollydbg, and Apktools.
⛳️ Exploitation tools – are frameworks that generate payloads that exploit known vulnerabilities in systems, apps, and services. Tools include Armitage, Metasploit, SearchSploit, Beef XSS, Termineter, and Social Engineering Toolkit.
⛳️ Sniffing and spoofing
– secretly accessing data in an unauthorized manner, using fake profiles, and hiding real identity. Tools include Wireshark, Bettercap, Ettercap, Hamster, Driftnet, MACchanger, and Responder.

#book #pentest #kali #web #linux #reverse
👍4👏42🔥1
𝐅𝐑𝐄𝐄 𝐑𝐄𝐒𝐎𝐔𝐑𝐂𝐄𝐒 𝐆𝐀𝐌𝐄 𝐇𝐀𝐂𝐊𝐈𝐍𝐆

Games are pentested to identify and mitigate security vulnerabilities, comply with regulatory requirements, and improve overall quality. Pentesting helps protect gamers by securing personal information, preventing cheating, and preventing game disruptions.

❗️ 𝗜𝗡𝗧𝗥𝗢𝗗𝗨𝗖𝗧𝗜𝗢𝗡
🌟 Intro to GamePwn (aka Game Hacking) on Hack The Box
https://lnkd.in/eGDmzbr5

❗️𝗖𝗢𝗨𝗥𝗦𝗘𝗦
🌟 Beginner’s guide to Game Hacking by Guided Hacking
https://lnkd.in/erbi7ecN
🌟 Game Hacking by Cryptocat (Intigriti)
https://lnkd.in/eTqp6atd
🌟 Learn Game hacking on Game Hacking Academy
https://lnkd.in/eVt3mK4G

❗️𝗧𝗢𝗢𝗟𝗦
🌟 The Ultimate Game Hacking Resource by Dsasmblr
https://lnkd.in/e3hJydV5

❗️ 𝗣𝗥𝗔𝗖𝗧𝗜𝗖𝗘
🌟 Pwn Adventure 3 - Pwnie Island
https://lnkd.in/eKHYHG2v
🌟 Reverse Engineering an MMORPG by Antonin Beaujant
https://lnkd.in/eZwfct8U

❗️𝗦𝗧𝗔𝗡𝗗𝗔𝗥𝗗𝗦 𝗔𝗡𝗗 𝗥𝗘𝗙𝗘𝗥𝗘𝗡𝗖𝗘𝗦
🌟 OWASP Game Security Framework by Daniel Miessler and Jason Haddix
https://lnkd.in/e7dCYgrp

❗️ 𝗥𝗘𝗦𝗢𝗨𝗥𝗖𝗘𝗦
🌟 Resources Game Hacking by CryptoCat
https://lnkd.in/e_rBWjie

#reverse #coding
9👍4
Unprotect Project by Thomas Roccia (fr0gger) and Jean-Pierre LESUEUR (DarkCoderSc), 2024

Malware authors spend a great deal of time and effort to develop complex code to perform malicious actions against a target system. It is crucial for malware to remain undetected and avoid sandbox analysis, antiviruses or malware analysts. With this kind of techniques, malware are able to pass under the radar and stay undetected on a system. The goal of this free database is to centralize the information about malware evasion techniques.

This project aims to provide Malware Analysts and Defenders with actionable insights and detection capabilities to shorten their response times.

❗️Source
📌Contribute
📌About project

#malware #reverse
🔥64
Reversing With Lena (Tutorials)

Reverse Engineering with OllyDBG backup

❗️ GitHub + BackUp
📌 YouTube

#reverse #coding
👍6🔥4
Изменения в облаке тегов:

[+] Добавлены новые теги:

#management - все для CISO, BISO, Lead Team, менеджмент ИБ в компании, управление командой, оценка ИБ продукта, от красноглазого батрака до белого воротничка
#architecture - безопасное проектирование, secure by design, архитектурное ревью ИТ инфраструктуры, STRIDE, Zero trust, Shift left концепции
#HR -поиск, вербовка, удержание кадров в ИТ\ИБ, специфика найма ИТ\ИБ-спецов, методы оценки кандидатов, прохождение интервью, мотивация, современный стэк технологий

[/] Изменение существующих тегов:
#great - все материалы по мотивации, вдохновению, саморазвитию, финансовой грамотности, инвестициям, все лучшее от автора w2hack переходит к новому тегу от прежнего #info
👍9👀2🫡2🤔1
Reverse Engineering 1: x64dbg Debugger for Beginners, Paul Chin, PhD (Udemy), 2024

Learn how to reverse engineer and debug programs with x64dbg in 1 hour

If you had always wanted to learn how use x64dbg to reverse engineer and debug software, then this is the course for you.

x64dbg is one of the most popular modern debugger in use today and has superseded OllyDbg. It is used for Reverse Engineering, Malware Analysis and Software Debugging. In this course we will learn x64dbg by solving a simple CrackMe challenge. A CrackMe is a small program designed to test a programmer's reverse engineering skills.

This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to fix bugs where the source code is not available. This course will equip you with the knowledge and skill to use x64dbg in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to hero.

❗️Official page

#education #reverse
Assembly for Hacker, Hadess, 2025

The book produced by Hadess is a small work of art for those who are interested in (truly) low-level programming languages and are also curious to understand how inserting malicious code works directly into legitimate processes or in memory.

In addition to this document, they produce several others aimed mainly at offensive security.

Read on web site:
Syntax;
Sections;
Processor Registers;
System Calls;
Strings;
Numbers;
Conditions;
Addressing Modes;
File Handling;
Stack and Memory;
Code Injection Attack;
DLL Injection;
APC Injection;
Valid Accounts;
System Binary Proxy Execution: Rundll32;
Reflective code loading;
Modify Registry;
Process Injection;
Mark-Of-The-Web (MOTW) Bypass;
Access Token Manipulation;
Hijack Execution Flow;
Resources.

#reverse #coding #malware
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
The small list tutorials of Reverse Engineering with Radare2

Radare2 (also known as r2) is a complete framework for reverse-engineering and analyzing binaries; composed of a set of small utilities that can be used together or independently from the command line. Built around a disassembler for computer software which generates assembly language source code from machine-executable code, it supports a variety of executable formats for different processor architectures and operating systems

❗️Radare2 Reversing Series
by ConsoleCowboys
❗️Reverse Engineering with Radare2 by ÆTHER SECURITY LAB
❗️Radare2 Tutorial by inaryAdventure

#education #reverse
The small list of Ghidra Reverse Engineering Tutorials

Ghidra is a free and open source reverse engineering tool developed by the National Security Agency (NSA) of the United States. The binaries were released at RSA Conference in March 2019; the sources were published one month later on GitHub. Ghidra is seen by many security researchers as a competitor to IDA Pro. The software is written in Java using the Swing framework for the GUI.

The decompiler component is written in C++, and is therefore usable in a stand-alone form.

❗️Ghidra Reversing Tutorials by Dr Josh Stroschein - The Cyber Yeti channel
❗️Introduction to Software Reverse Engineering by Eugene Kirian

#reverse #education
Видео курс по реверс инжинирингу в компьютерных играх, ANDREWFEED

Как делают читы? В серии видео я расскажу о том, как создаются читы для игр. Обсудим базу знаний, необходимую для создания первого чита с нуля. Включая устройство компьютера, виды читов, процесс компиляции кода, преобразования кода в ассемблер, основные типы данных, устройство памяти, регистры и инструкции процессора, софт используемый в реверс-инжиниринге и декомпиляции, обсудим типы поиска и поиск указателей используя Cheat Engine, а так же реверсинг используя такие стандарты в области как IDA и Ghidra.

Плавно перейдём к функциям читов и реализации пользовательского интерфейса на С++ используя библиотеки, в том числе ImGui. По итогу найдём ответ на вопрос "как научиться писать читы".

Пройдя этот курс по реверс инжинирингу вы узнаете как сделать свой чит с нуля на любую игру.

❗️Смотреть плейлист

#reverse
This media is not supported in your browser
VIEW IN TELEGRAM
Copilot for IDA Pro by Antelcat, 2023

Welcome to the ChatGPT plugin for IDA Pro, where the cutting-edge capabilities of OpenAI's GPT models meet the powerful disassembly and debugging features of IDA Pro. This plugin leverages LangChain and the latest Agent-based approach to automate the analysis of decompiled code in IDA, making reverse engineering easier and more interactive than ever.

❗️GitHub

VulChatGPT by ke0z, 2023

An IDA PRO plugin to help in finding vulnerabilites in binaries. Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries

❗️GitHub

See also:
⛳️ ChatGPT for Forensic Analyze

#reverse #AI
Arm Assembly Internals & Reverse Engineering by Maria Markstedter

Welcome to this tutorial series on ARM assembly basics. This is the preparation for the followup tutorial series on ARM exploit development. Before we can dive into creating ARM shellcode and build ROP chains, we need to cover some ARM Assembly basics first.

🛡 Official page
😺 About author

#hardware #reverse
Please open Telegram to view this post
VIEW IN TELEGRAM
7🔥5😁1
👍 Kaspersky Reverse Challenge Cup 2017

Kaspersky Reverse Challenge Cup on Zero Nights (Moscow, Russia) likely refers to a reverse engineering malware competition or challenge organized by Kaspersky Lab, possibly with a focus on scenarios where participants have limited time to analyze and solve problems.

Парни, кто решал crackme от ЛК в 2010-х годах? Это было эпично, мой первый дебют после самооучения реверсу (CrackLab, ExeLab many thanks) состоявшийся на ZN 2017. Бинарик уже потерян, но солюшн остался в черновиках. Если интересно ставьте👍 попробуем превратить его в райтап 👍

Official page
⭐️ Zero Nights 2017
🧑‍🎓 GitHub (w2hack official repo)

#fun #malware #reverse
Please open Telegram to view this post
VIEW IN TELEGRAM
👍171
Gepetto - OpenAI ChatGPT IDA Plugin by JusticeRage (Ivan Kwiatkowski), 2025

IDA plugin which queries language models to speed up reverse-engineering. Gepetto is a Python plugin which uses various large language models to provide meaning to functions decompiled by IDA Pro (≥ 7.4). It can leverage them to explain what a function does, and to automatically rename its variables.

Simply drop this script into your IDA plugins folder ($IDAUSR/plugins).

You will need to add the required packages to IDA's Python installation for the script to work. Find which interpreter IDA is using by checking the following registry key:

Computer\HKEY_CURRENT_USER\Software\Hex-Rays\IDA (default on Windows: %LOCALAPPDATA%\Programs\Python\Python39)

☄️ GitHub

See also:
Manalyzer + GitHub

#reverse #AI
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6👍31