reverse-engineering
Here are 1,597 public repositories matching this topic...
A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Dec 31, 2019
Is your feature request related to a problem? Please describe.
In the current api documentation classes from external libraries are displayed with their full package name. This leaves the user to search for the documentation for the external library themselves for which they must also find the correct version number.
Describe the solution you'd like
It would be nice to have the extern
For flags: (ft command conflicts)
- name
- realname
- addr (rename rom offset for consistency)
- size
- comment
For registers
- name
- value
- old.value
- size
- offset in arena
- group
- alias (SP, BP, PC, A0..)
No resource identifier found for attribute 'windowLayoutInDisplayCutoutMode' in package 'android'
Information
- Apktool Version (
apktool -version) - 2.4.0 - Operating System (Mac, Linux, Windows) - Windows
- APK From? (Playstore, ROM, Other) - Other
Steps to Reproduce
- Decompile apk
- Recompile APK
APK
APK Link: https://www78.zippyshare.com/v/y11Q3m2c/file.html
Questions to ask before submission
- Have you tried
apktool d,apktool bwithou
A collection of hacking / penetration testing resources to make you better!
-
Updated
Dec 31, 2019
Describe the bug
The dialog of edit-bytes doesn't respect multiple instructions. For example, 90909090 will only show as Unknown Instruction and not as nop; nop; nop; nop. And this is a simple example, the preview should handle more complicated byte sequences of multiple instructions.
.
https://github.com/Co2333/coreBase/blob/master/OneMonkey.sh
It will auto install following thing with out any issues, easy for beginners:
HomeBrew
wget
ldid
ldid2
dpkg
libimobiledevice
libimobileinstaller
python
THEOS
MonkeyDev
frida-tools
frida-ios-dump
It will auto swip the localhost to user ip and also ios device ssh password
After install, run this py like
username$ fri
urrently I do not know the structure of the payload that should be sent to the server, in the documentation they speak of 3 paramatros [description, attributes, content] but the model whatsapp_binary_writter that triggers an error and closes the connection
There seems to be an issue with update_flags on some ARM instruction (at least for ADC and SBC). More precisely, Capstone reports update_flags as true when it should be false (according to ARM reference manual).
The following code snippet shows the issue:
from capstone import *
from capstone.arm import *
CODE = [
b"\x03\x00\xa1\xe0", # adcal r0, r1, r3
b"Patch iOS Apps, The Easy Way, Without Jailbreak.
-
Updated
Dec 31, 2019 - Objective-C
COPYING and README claim this is GPL, but it doesn't specify which version exactly? It looks like GPLv2, the question is: "GPLv2 only" or "GPLv2 or later"?
The current uc.c only contains a copyright where it's unclear wether that file also belongs to GPL'd code.
The source files or README should contain [the license text as per COPYING file](https://github.com/unicorn-engine/unicorn/blob/master/CO
Right now the process isn't documented and is done by calling different classes in the project. Make a gradle task and document it a bit to make it easier for people to update it themselves.
Related discussion: CalebFenton/simplify#57
Does anyone uses the AST feature of thje decompiler, i.e. this one:
from pprint import pprint
from androguard.decompiler.dad.decompile import DvMethod
for method in dx.get_methods():
if method.is_external():
continue
dv = DvMethod(method)
dv.process(doAST=True)
pprint(dv.get_ast())
I would really like to see a usecase for this and some code how it is ac
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
-
Updated
Dec 30, 2019 - Python
An Information Security Reference That Doesn't Suck
-
Updated
Dec 31, 2019
Your issue will be closed unless you confirm the following:
- Did you use the latest version of GEF from
masterbranch? - Did you read the documentation first?
- Did you check closed issues?
Step 1: Describe your environment
- Operating System: Ubuntu 14.04 4.4.0-137-generic
- Arc
Description
In pwndbg release 2017.02.01 build: 1ab3de0, when registers changed while debugging a program, there would be an asterisk near the changed register which could be customized with context-register-changed-marker and context-register-changed-color.
These config options are still available, however in later releases (both 2018.07.29 and 2019.01.25) there doesn't seem to be a
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
-
Updated
Dec 31, 2019 - Python
Traceback (most recent call last):
...
File "../pyimports/miasm2/ir/ir.py", line 153, in add_instr
self.add_bloc(b, gen_pc_updt)
File "../pyimports/miasm2/ir/ir.py", line 233, in add_bloc
ir_bloc_cur, ir_blocs_extra = self.instr2ir(l)
File "../pyimports/miasm2/ir/ir.py", line 135, in instr2ir
ir_bloc_cur, ir_blocs_extra = self.get_ir(l)
File "../pyimports/miasm2/arch/x86/sem.py
In my testing fork, I add two scripts to handle mesh normalization.
In normalize_obj.py, the script normalize the mesh with a reference XYZ point instead of the mesh center. Therefore we could normalize several meshes with the same origin a
We're still stuck with http://doc.kaitai.io/ksy_reference.html, which is frankly horrible, while we have a new and shiny https://github.com/kaitai-io/ksy_schema
Any chance anyone knows if we can generate human-readable KSY reference from our KSY schema?
-
Updated
Dec 31, 2019 - PowerShell
Tutorials, tools, and more as related to reverse engineering video games.
-
Updated
Dec 31, 2019
reverse engineering tools for android(android 逆向工程工具集)
-
Updated
Dec 29, 2019 - Shell
Unofficial mirror of FernFlower Java decompiler (All pulls should be submitted upstream)
-
Updated
Dec 31, 2019 - Java
A completely free, open source and online course about Reverse Engineering iOS Applications.
-
Updated
Dec 31, 2019
Improve this page
Add a description, image, and links to the reverse-engineering topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the reverse-engineering topic, visit your repo's landing page and select "manage topics."
Hi,
many instructions are decoded with errors when scrolling the disassembler listing, examples can be found below ..


![Image 3](https://user-images.githubusercontent.