reverse

  1. ApexWolf

    Free OpenAI API (Reverse Proxy)

    How Can You Get A Free OpenAI API? Please note that this method uses reverse proxy to make the API requests. How to get it? Check the Github repository below Join their discord server Go to #bot in the server and use the slash command: /key You will get an API key...
  2. Ghost-Panther

    🔥 Mobile Security: Reverse Engineer Android Apps From Scratch 🔥

    Course LINK : Hidden content
  3. DonDotX

    Reverse Engineering iOS Applications

    Reverse Engineering iOS Applications This course is divided in 5 modules that will take you from zero to reversing production applications on the Apple App Store. Every module is intended to explain a single part of the process in a series of step-by-step instructions that should guide you...
  4. Error500

    Reverse Engineering 2 Windows GUI Programs

    Hidden content
  5. DonDotX

    .Net Application Reverse Engineering

    Hidden content
  6. K0lt

    Reverse Engineering x64dbg Graphical Static Analysis

    Hidden content
  7. AnonJellyfish

    Reverse Engineer Android Apps From Scratch

    Mobile Security: Reverse Engineer Android Apps From Scratch Learn Android reverse engineering in less than 4 hours TOPICS :-----> Course prerequisites Intro to Android Course/Lab setup Developing a basic Android App Analysing Android Apps ▭▬▭▬▭▬▭ ▭▬▭▬▭▬▭ COURSE CONTENT :- 6...
  8. BinaryBrute

    Reverse Engineering Reversing .NET with dnSpy

    Hidden content
  9. D4rkMoney

    Learn Reverse Engineering

    Disclaimer: This content has been shared under Educational And Non-Profit Purposes Only in order to create awereness. We do not support or foster illegal acts. No Copyright Infringement Intended, All Rights Reserved to the Actual Owner. Hidden content
  10. Gateman

    Reverse Engineering Software Protection

    Hidden content
  11. SharkBank

    X20 reverse credit cards

    Hidden content
  12. protectaccount

    IT & Software Intro to Malware Analysis and Reverse Engineering | Cybrary

    In this Malware analysis course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries. Hidden content
  13. protectaccount

    Hexorcist – Reverse Engineering Course

    Hexorcist – Reverse Engineering Course English | Tutorial | Size: 11.13 GB Hidden content
  14. protectaccount

    Reverse Engineering: IDA For Beginners | Udemy

    Learn to use IDA Pro Free to do Reverse Engineering on Linux and Windows What you’ll learn Reverse Engineering Assembly Language Remnux Linux IDA Windows IDA File, Strings and Hexeditor Analysis Converting Data, Renaming Labels and Variables Inserting Comments Creating Data Structures...
  15. DONAVAN

    Reverse SIM - 2026🦾✅

    Reverse is a way to gain, albeit temporary, access to the victim's phone number, but it nonetheless brings great benefits to us, since, as always, we go to our mobile operator to complain about how they allowed this to happen. Do you have any issues regarding this, or would you like to know...
  16. protectaccount

    Course Reverse Engineering and Malware Analysis x64/32: CRMA+ 2022

    Learn Malware Analysis and Reverse Engineering Deeply with CRMA+ 2022 Course. Breaking something down and putting it back together is a process that helps people understand how things were made. A person would be able to redo and reproduce an origami by unfolding it first. Knowing how cars work...
  17. protectaccount

    Course Kali NetHunter Ninja: HID Payloads & Reverse Shells

    Dive into the world of mobile penetration testing with Kali NetHunter Ninja: HID Payloads & Reverse Shells. In this comprehensive, hands‑on course, you’ll transform your Android device into a pocket-sized pentesting platform, mastering everything from initial setup and rooting to the creation...
  18. NinjaNet

    SRE Framework + Source Code

    Github link Hidden content
  19. RussianSwords

    Reverse Vending Machine SOURCE CODES (For sale) / Estonia, Romania, Qatar, Turkey, the United States, and Israel

    We seized the source code of a company that produces deposit-refund machines. We obtained the Docker images and source codes in Azure Cloud. We crashed the device management panel interface. (There is no API auth management :D) They have devices in countries like Estonia, Romania, Qatar...
  20. S

    LummaC2 - Stealer, 90% knockback, reverse proxy

    LummaC2 - Stealer, 90% knockback, reverse proxy LummaC2 - stealer, average hit rate 75-80%, works even on clean systems, no dependencies (AT ALL), log decryption on the server, build weight 150-200 KB (depends on cleaning), steals browsers based on Chromium and Mozilla, excellent low-level...
  21. NinjaNet

    Simple Reverse Shell in Go

    Simple TCP Reverse Shell in Go language Hidden content
  22. RX19

    [RX19] 🌟 Reverse Engineering Resources About All Platforms 🌟 2025 NEW

    Hidden content
  23. RX19

    ⭐ [RX] +100 PISHING TOOLS❗, WIFI, REVERSE, WEB, OSINT, MALWARE, EXPLOIT ⭐

    Hidden content
  24. iMaredd

    RED GATE SMARTASSEMBLY | OBFUSCATION | FUD | SOFTWARE ASSEMBLY | REVERSE ENGINEERING

    Hidden content
  25. RX19

    ⭐ [NEW] ⭐ Reverse Engineering For Free now 2024 ⭐

    Hidden content
  26. RX19

    ⭐ [NEW] ⭐ Reverse Engineering Resources 2024 ⭐ RX | SVR

    Hidden content
  27. Shadow Warrior

    BEST EMAIL AND PHONE REVERSE SEARCH

    BEST EMAIL AND PHONE REVERSE SEARCH Hidden content
  28. Sauron

    Reverse Engineering Windows Applications [ru]

    Reverse engineering is considered one of the most complex areas in information security (IS). In the book, the author offers to lift the veil of secrecy over this topic and, using practical examples, consider how applications work under Windows OS, as well as understand how to exploit buffer...
  29. Sauron

    REVERSE ENGINEERING AND EXPLOIT DEVELOPMENT

    Hidden content
  30. Sauron

    Rootkits and bootkits. Reverse Engineering Malware and Next Generation Threats [RU]

    Rootkits and bootkits. Reverse Engineering Malware and Next Generation Threats [RU] : This book is dedicated to the detection, analysis and reverse engineering of malware. The first part describes examples of rootkits that show how an attacker sees the operating system from the inside and...
  31. Sauron

    Mobile App Reverse Engineering

    Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world’s evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to...
  32. Sauron

    Blue Fox: Arm Assembly Internals and Reverse Engineering

    Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including...
  33. ASMODEUS

    Reverse Engineering 3: x64dbg Graphical Static Analysis

    If you had always wanted to learn how to reverse engineer a program and understand how it works from the inside out, then this is the course for you. Except for IDA Pro, many other debuggers out there are not capable of performing graphical representation of a disassembled software. x64dbg...
  34. ASMODEUS

    Reverse Engineering 4: Software Protection

    Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to...
  35. Sauron

    Reverse Engineering 4 - Software Protection

    Hidden content
  36. S

    Hacker for hire offering his services (Web)

    Hello! I've been a white hat for more than 4 years and have a very big amount of experience. So I am new in black hat and here too. I am offering Web exploitation service with gaining full access to server. PM me if you are interested.
  37. Mr.Robot

    (GUIDE)REVERSE ENGINEERING FOR EVERYONE

    Reverse Engineering For Everyone You can learn about reverse engineering. enjoy Hidden content
  38. Sauron

    Reverse Engineering Course The Ultimate Training

    What We’ll Do/Learn: This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations...
  39. Sauron

    Reverse Engineering For Beginners With Resources

    Hidden content
  40. Sauron

    Learn Reverse Engineering With Android Malware Analysis

    What you’ll learn Learn how Android applications are developed Learn how to reverse engineer Android applications and malware Learn how to extract applications and malware from a running device Gain access to premium cheat sheets, study guides, and books Develop your skills with challenges that...
Top