A reverse engineering guide for complete beginners.
What it covers:
- What is reverse engineering(basic theory)
- Static & Dynamic analysis
- Decompilation & when you should use it
Hidden content
This project intends to provide a complete description and re-implementation of the WhatsApp Web API, which will eventually lead to a custom client. WhatsApp Web internally works using WebSockets; this project does as well.
Hidden content
SudoDragon
Thread
cybersecurity
messaging platforms
reverseengineering
web development
whatsapp web
In this small tutorial you'll learn how to:
access data that isn't displayed on the front-end - can be used for OSINT purposes
Also works on https-encrypted requests
If you have access to another computer on your network you can use this tutorial to monitor traffic
Required knowledge: know...
SudoDragon
Thread
mobile apps
private api
reverseengineering
tutorial
web development
What is de4py?
. This project is maintained by Fadi002 and AdvDebug.
Features
Deobfuscation: de4py supports popular obfuscators like Jawbreaker, BlankOBF, PlusOBF, Wodx, Hyperion, and pyobfuscate.com obfuscator.
Pycode Execution: Execute your Python code within the process, enabling you to...
SUB-ZER0
Thread
open source
programming
python
reverseengineering
software tools
If you feel like you have been a victim who has been hacked, I am going to tell you exactly how to check if you have any rats, viruses, trojans, ransomware, etc.
In this tutorial you will learn how to check if you have been hacked, or have spyware on your device, how to remove it and find out...
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Let's make it the biggest resource repository for our community.
Learning the Skills
Name
Description
CS 642: Intro to Computer Security
academic content, full semester course, includes...
Nightmare
Thread
cybersecurity
hacker tools
hacking tutorials
it security
reverseengineering
software cracking
Reverse engineering is considered one of the most complex areas in information security (IS). In the book, the author offers to lift the veil of secrecy over this topic and, using practical examples, consider how applications work under Windows OS, as well as understand how to exploit buffer...
Rootkits and bootkits. Reverse Engineering Malware and Next Generation Threats [RU]
: This book is dedicated to the detection, analysis and reverse engineering
of malware. The first part describes examples of rootkits that show
how an attacker sees the operating system from the inside and...
Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world’s evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to...
Sauron
Thread
engineering
mobile
reversereverseengineering
wordpress
Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including...
If you had always wanted to learn how to reverse engineer a program and understand how it works from the inside out, then this is the course for you. Except for IDA Pro, many other debuggers out there are not capable of performing graphical representation of a disassembled software. x64dbg...
Requirements
Assembly language is helpful but not compulsory
Windows PC
Already know how to use x64dbg debugger
Description
If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to...
What is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials...
What We’ll Do/Learn:
This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations...
What you’ll learn
Learn how Android applications are developed
Learn how to reverse engineer Android applications and malware
Learn how to extract applications and malware from a running device
Gain access to premium cheat sheets, study guides, and books
Develop your skills with challenges that...