awesome-reverse-engineering
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
https://github.com/alphaSeclab/awesome-reverse-engineering
Last synced: 4 days ago
JSON representation
-
<a id="2110ded2aa5637fa933cc674bc33bf21"></a>工具
-
<a id="63fd2c592145914e99f837cecdc5a67c"></a>新添加的1
- **4306**星
- **412**星
- **358**星
- **885**星 - based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures f…
- **820**星
- **800**星
- **608**星
- **541**星
- **284**星
- **251**星
- **409**星
- **4882**星
- **2051**星
- **6101**星
- **3649**星
- **2120**星
- **5195**星 - in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
- **1241**星
- **4776**星
- **1235**星
- **234**星
- **265**星
- **426**星
- **1925**星
- **379**星
- **333**星
- **2314**星 - The most complete and advanced IT security professional toolkit on Android.
- **2095**星
- **1430**星
- **1417**星
- **1208**星
- **668**星
- **527**星
- **482**星
- **379**星
- **358**星
- **234**星
- **267**星 - to-C Compiler) is method-based aot compiler that can translate DEX code to C code.
- **518**星
- **1976**星
- **1134**星
- **450**星
- **546**星
- **225**星 - wide
- **1213**星
- **6094**星 - A flexible, stable, easy-to-use Android Plug-in Framework
- **2011**星
- **443**星
- **5084**星
- **810**星 - Secure Peer to Peer Messaging
- **769**星
- **408**星 - optimized dex from odex/oat/vdex.
- **229**星
- **208**星
- **559**星
- **511**星
- **229**星
-
<a id="fa49f65b8d3c71b36c6924ce51c2ca0c"></a>HotFix
- **14557**星 - fix solution library for Android, it supports dex, library and resources update without reinstall apk.
- **1117**星
- **3462**星
-
<a id="7f353b27e45b5de6b0e6ac472b02cbf1"></a>Xposed
- **1726**星 - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
- **1655**星
- **1296**星
- **8756**星
- **2034**星
- **790**星
- **669**星 - support 4.4 - 10.0 32/64 bit - Xposed API Compat
- **478**星
- **322**星
- **309**星
- **204**星 - 2/arm32 and ARM64 ! With this, tools like Xposed can do android native hook.
- **2559**星
- **669**星 - support 4.4 - 10.0 32/64 bit - Xposed API Compat
- **478**星
- **309**星 - 10.0)
-
<a id="50f63dce18786069de2ec637630ff167"></a>加壳&&脱壳
-
<a id="bb9f8e636857320abf0502c19af6c763"></a>Debug&&调试
- **10794**星
- **6762**星 - Make Debugging Great Again
-
<a id="1d83ca6d8b02950be10ac8e4b8a2d976"></a>Obfuscate&&混淆
-
<a id="6d2b758b3269bac7d69a2d2c8b45194c"></a>ReverseEngineering
-
<a id="596b6cf8fd36bc4c819335f12850a915"></a>HOOK
-
<a id="f975a85510f714ec3cc2551e868e75b8"></a>Malware&&恶意代码
-
<a id="17408290519e1ca7745233afea62c43c"></a>各类App
-
<a id="5afa336e229e4c38ad378644c484734a"></a>Emulator&&模拟器
-
<a id="ec395c8f974c75963d88a9829af12a90"></a>打包
-
-
<a id="58cd9084afafd3cd293564c1d615dd7f"></a>工具
-
<a id="d0108e91e6863289f89084ff09df39d0"></a>新添加的
- **2795**星
- **349**星
- **2867**星
- **3414**星
- **1695**星
- **5775**星
- **3071**星
- **2733**星
- **2708**星
- **1683**星
- **1642**星
- **1239**星
- **1215**星
- **907**星
- **866**星
- **375**星
- **310**星 - tampering Swift library
- **263**星
- **213**星 - A Learning Tool for iOS App Pentesting and Security by Swaroop Yermalkar
- **203**星
- **1299**星
- **1442**星 - including certificate pinning - within iOS and OS X Apps
- **211**星
- **840**星
- **2753**星 - platform suite of tools for building and deploying software for iOS and other platforms.
- **4663**星
- **796**星
- **346**星
- **662**星
- **1253**星
- **604**星
- **482**星 - wide VPN based Tor client
- **396**星
- **322**星
- **223**星
- **4397**星
- **3686**星 - O binaries running on iOS.
- **1252**星
- **238**星
- **340**星
- **1630**星
- **478**星
- **3327**星
- **1001**星
- **1801**星
- **462**星 - platform java application for decoding, monitoring, recording and streaming trunked mobile and related radio protocols using Software Defined Radios (SDR). Website:
- **430**星
- **239**星
- **651**星
- **1113**星
- **471**星
- **382**星 - 11.3.1
- **371**星
- **247**星
- **244**星
- **219**星
- **200**星
- **1291**星
- **1291**星
- **10966**星 - app debugging and exploration tool for iOS
- **1291**星
- **500**星
-
-
<a id="004d0b9e325af207df8e1ca61af7b721"></a>LLDB
-
<a id="977cef2fc942ac125fa395254ab70eea"></a>XCode
-
<a id="7037d96c1017978276cb920f65be2297"></a>工具
-
<a id="a2d228a68b40162953d3d482ce009d4e"></a>文章
-
-
<a id="18c6a45392d6b383ea24b363d2f3e76b"></a>文章
-
<a id="3d3bc775abd7f254ff9ff90d669017c9"></a>工具&&插件&&脚本介绍
- aliyun
- vmray
- talosintelligence
- carbonblack
- freebuf
- talosintelligence
- 4hou
- vmray
- aliyun
- ptsecurity
- talosintelligence
- cisco
- msreverseengineering
- 360
- ptsecurity
- 360
- dustri
- aliyun
- 360
- vmray
- talosintelligence
- carbonblack
- talosintelligence
- 4hou
- vmray
- aliyun
- aliyun
- aliyun
- talosintelligence
- msreverseengineering
- 360
-
<a id="37634a992983db427ce41b37dd9a98c2"></a>新添加的
-
<a id="4187e477ebc45d1721f045da62dbf4e8"></a>未分类
-
<a id="a4bd25d3dc2f0be840e39674be67d66b"></a>Tips&&Tricks
-
<a id="04cba8dbb72e95d9c721fe16a3b48783"></a>系列文章-Labeless插件介绍
-
<a id="1a2e56040cfc42c11c5b4fa86978cc19"></a>系列文章-使用IDA从零开始学逆向
- kienbigmummy
- kienbigmummy
- tradahacking
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- tradahacking
- kienbigmummy
- kienbigmummy
- kienbigmummy
- tradahacking
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- kienbigmummy
- tradahacking
- kienbigmummy
-
<a id="e838a1ecdcf3d068547dd0d7b5c446c6"></a>系列文章-IDAPython-让你的生活更美好
-
<a id="8433dd5df40aaf302b179b1fda1d2863"></a>系列文章-使用IDA逆向C代码
-
<a id="ea11818602eb33e8b165eb18d3710965"></a>翻译-TheIDAProBook
-
<a id="ec5f7b9ed06500c537aa25851a3f2d3a"></a>翻译-ReverseEngineeringCodeWithIDAPro
-
<a id="2120fe5420607a363ae87f5d2fed459f"></a>IDA本身
-
<a id="d8e48eb05d72db3ac1e050d8ebc546e1"></a>逆向实战
-
<a id="e9ce398c2c43170e69c95fe9ad8d22fc"></a>Microcode
-
<a id="9c0ec56f402a2b9938417f6ecbaeaa72"></a>IDA对抗
-
-
<a id="ac43a3ce5a889d8b18cf22acb6c31a72"></a>ETW
-
<a id="11c4c804569626c1eb02140ba557bb85"></a>文章
- criteo
- Cooper
- adventuresincyberchallenges
- Cyb3rWard0g
- Cyb3rWard0g
- freebuf
- 4sysops
- 360
- sans
- sans
- sans
- palantir
- sophos
- 4sysops
- pentesttoolz
- dragos
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- palantir
- Cyb3rWard0g
- Cyb3rWard0g
- palantir
- pentesttoolz
- criteo
-
<a id="0af4bd8ca0fd27c9381a2d1fa8b71a1f"></a>工具
-
-
<a id="f24f1235fd45a1aa8d280eff1f03af7e"></a>Frida
-
<a id="a1a7e3dd7091b47384c75dba8f279caf"></a>文章&&视频
-
<a id="a5336a0f9e8e55111bda45c8d74924c1"></a>工具
-
-
<a id="95fdc7692c4eda74f7ca590bb3f12982"></a>文章&&视频
-
<a id="a4debf888d112b91e56c90136f513ec0"></a>未分类
-
<a id="d86e19280510aee0bcf2599f139cfbf7"></a>Cutter
-
-
<a id="0e08f9478ed8388319f267e75e2ef1eb"></a>插件&&脚本
-
<a id="f7778a5392b90b03a3e23ef94a0cc3c6"></a>GUI
-
<a id="ec3f0b5c2cf36004c4dd3d162b94b91a"></a>Radare2
- **11588**星 - like reverse engineering framework and commandline tools
-
<a id="6922457cb0d4b6b87a34caf39aa31dfe"></a>新添加的
-
-
<a id="2d24dd6f0c01a084e88580ad22ce5b3c"></a>文章&&视频
-
<a id="bba1171ac550958141dfcb0027716f41"></a>与其他工具交互
-
-
<a id="273df546f1145fbed92bb554a327b87a"></a>文章&&视频
-
<a id="0d086cf7980f65da8f7112b901fecdc1"></a>工具&&插件&&脚本
-
<a id="8962bde3fbfb1d1130879684bdf3eed0"></a>新添加的1
-
<a id="ce49901b4914f3688ef54585c8f9df1a"></a>新添加的
-
<a id="b7fb955b670df2babc67e5942297444d"></a>Ghidra漏洞
-
<a id="dd0d49a5e6bd34b372d9bbf4475e8024"></a>实战分析
-
-
<a id="1d9dec1320a5d774dc8e0e7604edfcd3"></a>工具-新添加的
-
<a id="8f1b9c5c2737493524809684b934d49a"></a>文章&&视频
- **3773**星
- **3243**星
- **6055**星
- **14349**星 - time
- **4810**星
- **4062**星
- **3844**星
- **3505**星 - cryptographic hash algorithm
- **3306**星 - only driver samples.
- **3295**星
- **2898**星
- **2789**星 - to-peer Tox protocol.
- **2687**星 - wide ads & trackers blocking DNS server
- **2092**星 - quality event tracing
- **2053**星
- **1877**星
- **1722**星 - bot page.
- **1698**星
- **1659**星
- **1637**星
- **1620**星
- **1592**星
- **1584**星
- **587**星
- **523**星
- **449**星
- **306**星 - source port of Prince of Persia, based on the disassembly of the DOS version.
- **291**星
- **211**星
- **568**星
- **2344**星
- **3690**星
- **6894**星
- **3768**星
- **1714**星
- **3131**星
- **2340**星
- **1863**星
- **3188**星
- **11402**星
- **2948**星
- **2872**星 - Linux Containers
- **1761**星 - driven examples for using Puppeteer and headless chrome
- **1781**星
- **2760**星
- **2631**星
- **5753**星
- **5420**星
- **7748**星
- **5717**星
- **3980**星
- **4060**星
- **10378**星
- **7020**星 - Performance server for NATS, the cloud native messaging system.
- **4857**星
- **2003**星
- **6353**星
- **5007**星
- **408**星
- **1827**星
- **5829**星 - platform.
- **2305**星
- **1955**星 - Powered API Gateway
- **4610**星 - the Ultimate Packer for eXecutables
- **2093**星
- **1859**星
- **3129**星
- **1779**星
- **2833**星
- **4003**星
- **1761**星
- **4747**星 - platform high performance deep learning inference engine (『飞桨』多平台高性能深度学习预测引擎)
- **1562**星
- **2587**星
- **3233**星
- **5226**星 - line
- **2808**星 - code with colored syntax.
- **5876**星 - it-yourself, 6-wheel rover based on the rovers on Mars!
- **3052**星
- **1786**星
- **3908**星 - alone graphics debugging tool.
- **1930**星
- **1668**星
- **4600**星
- **2364**星
- **1624**星
- **2474**星
- **4314**星
- **3280**星
- **2211**星
- **637**星
- **3289**星
- **3219**星 - place DOM diffing library
- **11213**星
- **2627**星 - platform, free software BitTorrent client that includes an integrated media player. Desktop ( Windows / Mac / Linux ) a Butter-Project Fork
- **2848**星 - to-go Linux box in seconds.
- **5116**星
- **3749**星
- **2621**星
- **2217**星
- **3954**星
- **2053**星
- **1854**星
- **2345**星
- **2052**星 - source implementation of the Thread networking protocol
- **4258**星
- **1899**星
- **3108**星
- **2391**星
- **3608**星
- **3960**星 - friendly binary analysis platform!
- **2535**星
- **5751**星
- **2132**星
- **1650**星
- **2854**星
- **1907**星
- **3688**星
- **895**星
- **3451**星 - room capability with Audio Synchronisation
- **1837**星
- **2980**星
- **1816**星
- **1848**星 - focused recommendations for employee information security.
- **657**星 - ready disassembly and static analysis library for PE32, 32+ and shellcode
- **1846**星
- **447**星
- **522**星
- **2478**星
- **966**星
- **4352**星
- **2137**星
- **1676**星
- **1562**星 - scale entity and relation database supporting aggregation of properties
- **1852**星
- **19766**星 - first, mathematics-second point of view. All in pure Python ;)
- **5229**星
- **3627**星
- **2615**星
- **383**星
- **1756**星
- **658**星
- **706**星
- **4651**星
- **1851**星
- **1672**星
- **1727**星
- **2286**星
- **1998**星
- **2619**星
- **344**星
- **2031**星
- **265**星
- **1949**星
- **3939**星
- **2260**星
- **4597**星
- **2772**星
- **2718**星
- **2080**星
- **2214**星
- **6454**星
- **4541**星
- **3202**星
- **906**星
- **507**星
- **446**星 - quality event tracing
- **308**星
- **214**星
- **1572**星
- **2815**星 - purpose tool that helps you monitor system resources, debug software and detect malware.
-
-
<a id="f11ab1ff46aa300cc3e86528b8a98ad7"></a>插件&&脚本
-
<a id="c39a6d8598dde6abfeef43faf931beb5"></a>未分类
- StackStrings
- Struct Typer - function-types-structure-fields-ida/)
- ApplyCalleeType - research/2015/04/flare_ida_pro_script.html)
- argtracker
- idb2pat
- objc2_analyzer - O可执行文件的与Objective-C运行时相关的部分中定义的选择器引用及其实现之间创建交叉引用
- MSDN Annotations
- ironstrings - emu), 恢复构造的字符串
- Shellcode Hashes
- IDA插件
- DGEngine
- apt17scan.py
- emdivi_postdata_decoder
- emdivi_string_decryptor
- citadel_decryptor
- adwind_string_decoder
- redleavesscan
- datper_splunk
- datper_elk
- tscookie_decode
- wellmess_cookie_decode
- cobaltstrikescan
- tscookie_data_decode
- **318**星
- **277**星
- **1058**星
- StackStrings
- Struct Typer - function-types-structure-fields-ida/)
- ApplyCalleeType - research/2015/04/flare_ida_pro_script.html)
- argtracker
- idb2pat
- objc2_analyzer - O可执行文件的与Objective-C运行时相关的部分中定义的选择器引用及其实现之间创建交叉引用
- MSDN Annotations
- ironstrings - emu), 恢复构造的字符串
- Shellcode Hashes
- **737**星
- wpsearch
- md5hash
- alleycat
- codatify
- fluorescence
- leafblower
- mipslocalvars
- mipsrop
- rizzo
- localxrefs
-
<a id="7199e8787c0de5b428f50263f965fda7"></a>反混淆
-
<a id="fb4f0c061a72fc38656691746e7c45ce"></a>结构体&&类的检测&&创建&&恢复
-
-
使用
-
<a id="a8f5db3ab4bc7bc3d6ca772b3b9b0b1e"></a>固件&&嵌入式设备
-
<a id="83de90385d03ac8ef27360bfcdc1ab48"></a>作为辅助&&构成其他的一环
-
<a id="f7d311685152ac005cfce5753c006e4b"></a>与调试器同步&&通信&&交互
-
<a id="e3e7030efc3b4de3b5b8750b7d93e6dd"></a>调试&&动态运行&动态数据
-
<a id="d2166f4dac4eab7fadfe0fd06467fbc9"></a>反编译器&&AST
-
<a id="fabf03b862a776bbd8bcc4574943a65a"></a>外观&&主题
-
<a id="02088f4884be6c9effb0f1e9a3795e58"></a>签名(FLIRT等)&&比较(Diff)&&匹配
-
<a id="206ca17fc949b8e0ae62731d9bb244cb"></a>协作逆向&&多人操作相同IDB文件
-
<a id="6fb7e41786c49cc3811305c520dfe9a1"></a>导入导出&与其他工具交互
-
<a id="004c199e1dbf71769fbafcd8e58d1ead"></a>针对特定分析目标
-
<a id="9dcc6c7dd980bec1f92d0cc9a2209a24"></a>字符串
-
功能
-
<a id="90bf5d31a3897400ac07e15545d4be02"></a>函数相关
-
<a id="1ded622dca60b67288a591351de16f8b"></a>漏洞
-
<a id="c08ebe5b7eec9fc96f8eff36d1d5cc7d"></a>辅助脚本编写
-
<a id="34ac84853604a7741c61670f2a075d20"></a>污点分析&&符号执行
-
<a id="06d2caabef97cf663bd29af2b1fe270c"></a>加密解密
-
<a id="a7dac37cd93b8bb42c7d6aedccb751b3"></a>收集
-
<a id="ad68872e14f70db53e8d9519213ec039"></a>IDAPython本身
-
<a id="7d557bc3d677d206ef6c5a35ca8b3a14"></a>补丁&&Patch
-
<a id="846eebe73bef533041d74fc711cafb43"></a>指令参考&文档
-
<a id="5e91b280aab7f242cbc37d64ddbff82f"></a>IDB操作
-
<a id="fcf75a0881617d1f684bc8b359c684d7"></a>效率&&导航&&快速访问&&图形&&图像&&可视化
-
<a id="b38dab81610be087bd5bc7785269b8cc"></a>模拟器集成
-
<a id="7a2977533ccdac70ee6e58a7853b756b"></a>Microcode
- **304**星 - Rays microcode API破解编译器级别的混淆
-
<a id="66052f824f5054aa0f70785a2389a478"></a>Android
-
-
<a id="620af0d32e6ac1f4a3e97385d4d3efc0"></a>PE
-
<a id="7e890d391fa32df27beb1377a371518b"></a>文章
-
<a id="574db8bbaafbee72eeb30e28e2799458"></a>工具
-
-
<a id="fa45b20f6f043af1549b92f7c46c9719"></a>插件&&脚本
-
<a id="ce70b8d45be0a3d29705763564623aca"></a>新添加的
-
<a id="2ae406afda6602c8f02d73678b2ff040"></a>Ghidra
-
-
<a id="22894d6f2255dc43d82dd46bdbc20ba1"></a>文章&&视频
-
<a id="da5688c7823802e734c39b539aa39df7"></a>新添加的
-
-
<a id="8dd3e63c4e1811973288ea8f1581dfdb"></a>文章&&视频
-
<a id="92c44f98ff5ad8f8b0f5e10367262f9b"></a>新添加的
-
-
<a id="6d8bac8bfb5cda00c7e3bd38d64cbce3"></a>文章&&视频
-
<a id="f0493b259e1169b5ddd269b13cfd30e6"></a>文章&&视频
-
<a id="830f40713cef05f0665180d840d56f45"></a>Mach-O
-
<a id="750700dcc62fbd83e659226db595b5cc"></a>文章
-
<a id="9b0f5682dc818c93c4de3f46fc3f43d0"></a>工具
-
-
<a id="bba00652bff1672ab1012abd35ac9968"></a>越狱
-
<a id="ff19d5d94315d035bbcb3ef0c348c75b"></a>工具
-
<a id="cbb847a025d426a412c7cd5d8a2332b5"></a>文章
-
-
<a id="ec0a441206d9a2fe1625dce0a679d466"></a>文章&&视频
-
<a id="f2b5c44c2107db2cec6c60477c6aa1d0"></a>新添加的
-
-
<a id="c8cdb0e30f24e9b7394fcd5681f2e419"></a>DynamoRIO
-
<a id="b2fca17481b109a9b3b0bc290a1a1381"></a>QBDI
-
<a id="2cf79f93baf02a24d95d227a0a3049d8"></a>文章&&视频
-
<a id="e72b766bcd3b868c438a372bc365221e"></a>工具
-
-
<a id="5a9974bfcf7cdf9b05fe7a7dc5272213"></a>其他
-
<a id="8f1b9c5c2737493524809684b934d49a"></a>文章&&视频
-
-
<a id="4fe330ae3e5ce0b39735b1bfea4528af"></a>angr
-
<a id="042ef9d415350eeb97ac2539c2fa530e"></a>文章
-
<a id="1ede5ade1e55074922eb4b6386f5ca65"></a>工具
-
-
<a id="2683839f170250822916534f1db22eeb"></a>BinNavi
-
<a id="975d9f08e2771fccc112d9670eae1ed1"></a>GDB
-
<a id="37b17362d72f9c8793973bc4704893a2"></a>文章
-
<a id="5f4381b0a90d88dd2296c2936f7e7f70"></a>工具
- **7019**星 - based frontend to gdb (gnu debugger). Add breakpoints, view the stack, visualize data structures, and more in C, C++, Go, Rust, and Fortran. Run gdbgui from the terminal and a new tab will open in your browser.
- **2568**星
- **3784**星
- **2439**星
- **208**星
- **6052**星
- **446**星
- **1417**星
- **244**星
- **452**星
-
-
<a id="89f963773ee87e2af6f9170ee60a7fb2"></a>DLL
-
<a id="4dcfd9135aa5321b7fa65a88155256f9"></a>新添加
-
<a id="3b4617e54405a32290224b729ff9f2b3"></a>DLL注入
-
<a id="f39e40e340f61ae168b67424baac5cc6"></a>DLL劫持
- 4hou
- 4hou
- specterops
- sans
- t00ls
- pediy
- DoktorCranium
- astr0baby
- parsiya
- parsiya
- cybereason
- 360
- insert
- cybereason
- 4hou
- pediy
- pentestlab
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- **431**星
- **299**星
- specterops
- securiteam
-
-
<a id="40fd1488e4a26ebf908f44fdcedd9675"></a>UAC
-
<a id="90d7d5feb7fd506dc8fd6ee0d7e98285"></a>文章
-
<a id="02517eda8c2519c564a19219e97d6237"></a>工具
-
-
<a id="0fed6a96b28f339611e7b111b8f42c23"></a>Sysmon
-
<a id="2c8cb7fdf765b9d930569f7c64042d62"></a>文章
- vanimpe
- 4hou
- HackersOnBoard
- blackhillsinfosec
- osandamalith
- specterops
- 4hou
- olafhartong
- blackhillsinfosec
- blackhillsinfosec
- nosecurecode
- binarydefense
- 360
- SecurityWeekly
- xpnsec
- olafhartong
- olafhartong
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- specterops
- olafhartong
- olafhartong
- olafhartong
- specterops
-
<a id="d48f038b58dc921660be221b4e302f70"></a>工具
-
-
<a id="184bbacd8b9e08c30cc9ffcee9513f44"></a>AppLocker
-
<a id="286317d6d7c1a0578d8f5db940201320"></a>文章
-
<a id="8f1876dff78e80b60d00de25994276d9"></a>工具
-
-
<a id="b478e9a9a324c963da11437d18f04998"></a>工具
-
<a id="920b69cea1fc334bbc21a957dd0d9f6f"></a>注册表
-
<a id="1afda3039b4ab9a3a1f60b179ccb3e76"></a>其他
-
<a id="d90b60dc79837e06d8ba2a7ee1f109d3"></a>.NET
-
<a id="6d2fe834b7662ecdd48c17163f732daf"></a>Environment&&环境&&配置
-
<a id="d295182c016bd9c2d5479fe0e98a75df"></a>系统调用
-
<a id="19cfd3ea4bd01d440efb9d4dd97a64d0"></a>VT&&虚拟化&&Hypbervisor
-
<a id="c3cda3278305549f4c21df25cbf638a4"></a>内核&&驱动
-
-
<a id="3939f5e83ca091402022cb58e0349ab8"></a>文章
-
<a id="fa89526db1f9373c57ea4ffa1ac8c39f"></a>DEP
-
<a id="af06263e9a92f6036dc5d4c4b28b9d8c"></a>Procmon
-
-
<a id="a63015576552ded272a242064f3fe8c9"></a>ELF
-
<a id="72d101d0f32d5521d5d305e7e653fdd3"></a>文章
-
<a id="929786b8490456eedfb975a41ca9da07"></a>工具
-
-
<a id="89e277bca2740d737c1aeac3192f374c"></a>工具
-
<a id="203d00ef3396d68f5277c90279f4ebf3"></a>新添加
- **331**星
- **1450**星
- **759**星
- **468**星
- **354**星
- **1413**星 - weight process isolation tool, making use of Linux namespaces and seccomp-bpf syscall filters (with help of the kafel bpf language)
- **741**星 - based assembly REPL for x86, amd64, armv7, and armv8
- **895**星
- **509**星
- **441**星
- **565**星
- **731**星
- **560**星
- **393**星
- **536**星
- **228**星 - weight Dynamic Tracer for Linux
- **405**星 - V Linux Guest VM Enhancements
- **282**星
-
-
<a id="37eea2c2e8885eb435987ccf3f467122"></a>插件&&脚本
-
<a id="324874bb7c3ead94eae6f1fa1af4fb68"></a>Debug&&调试
-
<a id="d22bd989b2fdaeda14b64343b472dfb6"></a>工具
- **423**星
- **285**星 - x hypervisor.
- **1422**星 - 64 debugger.
- **1147**星 - end to the GNU debugger
- **1413**星 - like macros
- **220**星
- **377**星 - in replacement for pdb (the Python debugger)
- **270**星
- **239**星
- **1275**星
- **1450**星
- **306**星
- **899**星
- **250**星
- **332**星 - based remote UI for Python's PDB debugger
- **291**星
- **560**星 - source Visual Studio Debugger extension that works with MI-enabled debuggers such as gdb, lldb, and clrdbg.
- **233**星
- **462**星
- **200**星
- **272**星
- **521**星
- **240**星
- **418**星
- **213**星
- **239**星 - debug Method Improved
- **218**星
- **209**星 - based programs
- **836**星 - system emulator written in C#. BizHawk provides nice features for casual gamers such as full screen, and joypad support in addition to full rerecording and debugging tools for all system cores.
-
-
<a id="9f8d3f2c9e46fbe6c25c22285c8226df"></a>BAP
-
<a id="0971f295b0f67dc31b7aa45caf3f588f"></a>Decompiler&&反编译器
-
<a id="e67c18b4b682ceb6716388522f9a1417"></a>工具
-
-
<a id="2df6d3d07e56381e1101097d013746a0"></a>Disassemble&&反汇编
-
<a id="b4a856db286f9f29b5a32d477d6b3f3a"></a>插件&&脚本
-
<a id="da5688c7823802e734c39b539aa39df7"></a>新添加的
-
<a id="353ea40f2346191ecb828210a685f9db"></a>x64dbg
-
-
<a id="3034389f5aaa9d7b0be6fa7322340aab"></a>插件&&脚本
-
<a id="5830a8f8fb3af1a336053d84dd7330a1"></a>工具
-
Uncategorized
-
<a id="70e64e3147675c9bcd48d4f475396e7f"></a>Monitor&&监控&&Trace&&追踪
-
<a id="cd76e644d8ddbd385939bb17fceab205"></a>工具
- **1419**星 - space
-
-
<a id="7b8a493ca344f41887792fcc008573e7"></a>IntelPin
-
<a id="fe5a6d7f16890542c9e60857706edfde"></a>工具
-
Programming Languages
Categories
<a id="18c6a45392d6b383ea24b363d2f3e76b"></a>文章
226
<a id="1d9dec1320a5d774dc8e0e7604edfcd3"></a>工具-新添加的
171
<a id="2110ded2aa5637fa933cc674bc33bf21"></a>工具
102
<a id="89f963773ee87e2af6f9170ee60a7fb2"></a>DLL
92
使用
81
<a id="273df546f1145fbed92bb554a327b87a"></a>文章&&视频
77
<a id="58cd9084afafd3cd293564c1d615dd7f"></a>工具
62
<a id="ac43a3ce5a889d8b18cf22acb6c31a72"></a>ETW
51
<a id="f11ab1ff46aa300cc3e86528b8a98ad7"></a>插件&&脚本
49
<a id="b478e9a9a324c963da11437d18f04998"></a>工具
43
<a id="0fed6a96b28f339611e7b111b8f42c23"></a>Sysmon
41
<a id="620af0d32e6ac1f4a3e97385d4d3efc0"></a>PE
35
<a id="975d9f08e2771fccc112d9670eae1ed1"></a>GDB
34
<a id="f24f1235fd45a1aa8d280eff1f03af7e"></a>Frida
33
<a id="830f40713cef05f0665180d840d56f45"></a>Mach-O
33
<a id="a63015576552ded272a242064f3fe8c9"></a>ELF
32
<a id="977cef2fc942ac125fa395254ab70eea"></a>XCode
31
<a id="95fdc7692c4eda74f7ca590bb3f12982"></a>文章&&视频
31
<a id="324874bb7c3ead94eae6f1fa1af4fb68"></a>Debug&&调试
29
<a id="40fd1488e4a26ebf908f44fdcedd9675"></a>UAC
27
<a id="3939f5e83ca091402022cb58e0349ab8"></a>文章
27
<a id="6d8bac8bfb5cda00c7e3bd38d64cbce3"></a>文章&&视频
26
<a id="22894d6f2255dc43d82dd46bdbc20ba1"></a>文章&&视频
25
<a id="004d0b9e325af207df8e1ca61af7b721"></a>LLDB
25
<a id="ec0a441206d9a2fe1625dce0a679d466"></a>文章&&视频
24
<a id="8dd3e63c4e1811973288ea8f1581dfdb"></a>文章&&视频
24
<a id="bba00652bff1672ab1012abd35ac9968"></a>越狱
24
<a id="184bbacd8b9e08c30cc9ffcee9513f44"></a>AppLocker
22
<a id="c8cdb0e30f24e9b7394fcd5681f2e419"></a>DynamoRIO
22
<a id="0971f295b0f67dc31b7aa45caf3f588f"></a>Decompiler&&反编译器
19
<a id="89e277bca2740d737c1aeac3192f374c"></a>工具
18
<a id="2d24dd6f0c01a084e88580ad22ce5b3c"></a>文章&&视频
13
<a id="b2fca17481b109a9b3b0bc290a1a1381"></a>QBDI
8
<a id="2df6d3d07e56381e1101097d013746a0"></a>Disassemble&&反汇编
8
<a id="fa45b20f6f043af1549b92f7c46c9719"></a>插件&&脚本
7
<a id="2683839f170250822916534f1db22eeb"></a>BinNavi
7
Uncategorized
6
<a id="5830a8f8fb3af1a336053d84dd7330a1"></a>工具
6
<a id="4fe330ae3e5ce0b39735b1bfea4528af"></a>angr
5
<a id="0e08f9478ed8388319f267e75e2ef1eb"></a>插件&&脚本
5
<a id="3034389f5aaa9d7b0be6fa7322340aab"></a>插件&&脚本
4
<a id="9f8d3f2c9e46fbe6c25c22285c8226df"></a>BAP
3
<a id="b4a856db286f9f29b5a32d477d6b3f3a"></a>插件&&脚本
3
<a id="f0493b259e1169b5ddd269b13cfd30e6"></a>文章&&视频
3
<a id="37eea2c2e8885eb435987ccf3f467122"></a>插件&&脚本
3
<a id="5a9974bfcf7cdf9b05fe7a7dc5272213"></a>其他
1
<a id="7b8a493ca344f41887792fcc008573e7"></a>IntelPin
1
<a id="70e64e3147675c9bcd48d4f475396e7f"></a>Monitor&&监控&&Trace&&追踪
1
Sub Categories
<a id="8f1b9c5c2737493524809684b934d49a"></a>文章&&视频
172
<a id="d0108e91e6863289f89084ff09df39d0"></a>新添加的
62
<a id="63fd2c592145914e99f837cecdc5a67c"></a>新添加的1
57
<a id="c39a6d8598dde6abfeef43faf931beb5"></a>未分类
46
<a id="2c8cb7fdf765b9d930569f7c64042d62"></a>文章
40
<a id="f39e40e340f61ae168b67424baac5cc6"></a>DLL劫持
40
<a id="1a2e56040cfc42c11c5b4fa86978cc19"></a>系列文章-使用IDA从零开始学逆向
40
<a id="11c4c804569626c1eb02140ba557bb85"></a>文章
38
<a id="3d3bc775abd7f254ff9ff90d669017c9"></a>工具&&插件&&脚本介绍
37
<a id="d8e48eb05d72db3ac1e050d8ebc546e1"></a>逆向实战
36
<a id="37634a992983db427ce41b37dd9a98c2"></a>新添加的
31
<a id="f2b5c44c2107db2cec6c60477c6aa1d0"></a>新添加的
30
<a id="d22bd989b2fdaeda14b64343b472dfb6"></a>工具
29
<a id="750700dcc62fbd83e659226db595b5cc"></a>文章
29
<a id="2ef75ae7852daa9862b2217dca252cc3"></a>新添加的
29
<a id="dd0d49a5e6bd34b372d9bbf4475e8024"></a>实战分析
27
<a id="da5688c7823802e734c39b539aa39df7"></a>新添加的
27
<a id="4dcfd9135aa5321b7fa65a88155256f9"></a>新添加
26
<a id="a4debf888d112b91e56c90136f513ec0"></a>未分类
26
<a id="72d101d0f32d5521d5d305e7e653fdd3"></a>文章
26
<a id="3b4617e54405a32290224b729ff9f2b3"></a>DLL注入
26
<a id="7e890d391fa32df27beb1377a371518b"></a>文章
25
<a id="a2d228a68b40162953d3d482ce009d4e"></a>文章
25
<a id="92c44f98ff5ad8f8b0f5e10367262f9b"></a>新添加的
24
<a id="90d7d5feb7fd506dc8fd6ee0d7e98285"></a>文章
24
<a id="37b17362d72f9c8793973bc4704893a2"></a>文章
24
<a id="4187e477ebc45d1721f045da62dbf4e8"></a>未分类
23
<a id="fa89526db1f9373c57ea4ffa1ac8c39f"></a>DEP
22
<a id="286317d6d7c1a0578d8f5db940201320"></a>文章
21
<a id="ce49901b4914f3688ef54585c8f9df1a"></a>新添加的
20
<a id="86eca88f321a86712cc0a66df5d72e56"></a>文章
20
<a id="1afda3039b4ab9a3a1f60b179ccb3e76"></a>其他
20
<a id="e67c18b4b682ceb6716388522f9a1417"></a>工具
19
<a id="9479ce9f475e4b9faa4497924a2e40fc"></a>文章&&视频
18
<a id="203d00ef3396d68f5277c90279f4ebf3"></a>新添加
18
<a id="8962bde3fbfb1d1130879684bdf3eed0"></a>新添加的1
18
<a id="a1a7e3dd7091b47384c75dba8f279caf"></a>文章&&视频
18
<a id="a4bd25d3dc2f0be840e39674be67d66b"></a>Tips&&Tricks
16
<a id="cbb847a025d426a412c7cd5d8a2332b5"></a>文章
16
<a id="a5336a0f9e8e55111bda45c8d74924c1"></a>工具
15
<a id="7f353b27e45b5de6b0e6ac472b02cbf1"></a>Xposed
15
<a id="f7d311685152ac005cfce5753c006e4b"></a>与调试器同步&&通信&&交互
14
<a id="bba1171ac550958141dfcb0027716f41"></a>与其他工具交互
13
<a id="0af4bd8ca0fd27c9381a2d1fa8b71a1f"></a>工具
13
<a id="04cba8dbb72e95d9c721fe16a3b48783"></a>系列文章-Labeless插件介绍
12
<a id="e838a1ecdcf3d068547dd0d7b5c446c6"></a>系列文章-IDAPython-让你的生活更美好
11
<a id="5f4381b0a90d88dd2296c2936f7e7f70"></a>工具
10
<a id="574db8bbaafbee72eeb30e28e2799458"></a>工具
10
<a id="ff19d5d94315d035bbcb3ef0c348c75b"></a>工具
8
<a id="6d2b758b3269bac7d69a2d2c8b45194c"></a>ReverseEngineering
8
<a id="59f472c7575951c57d298aef21e7d73c"></a>工具
8
<a id="83de90385d03ac8ef27360bfcdc1ab48"></a>作为辅助&&构成其他的一环
8
<a id="0d086cf7980f65da8f7112b901fecdc1"></a>工具&&插件&&脚本
7
<a id="2cf79f93baf02a24d95d227a0a3049d8"></a>文章&&视频
7
<a id="ff4dc5c746cb398d41fb69a4f8dfd497"></a>文章
7
<a id="d2166f4dac4eab7fadfe0fd06467fbc9"></a>反编译器&&AST
6
<a id="50f63dce18786069de2ec637630ff167"></a>加壳&&脱壳
6
<a id="7037d96c1017978276cb920f65be2297"></a>工具
6
<a id="e3e7030efc3b4de3b5b8750b7d93e6dd"></a>调试&&动态运行&动态数据
6
<a id="ce70b8d45be0a3d29705763564623aca"></a>新添加的
6
Uncategorized
6
<a id="929786b8490456eedfb975a41ca9da07"></a>工具
6
<a id="d86e19280510aee0bcf2599f139cfbf7"></a>Cutter
5
<a id="ea11818602eb33e8b165eb18d3710965"></a>翻译-TheIDAProBook
5
<a id="c20772abc204dfe23f3e946f8c73dfda"></a>工具
5
<a id="b7fb955b670df2babc67e5942297444d"></a>Ghidra漏洞
5
<a id="02088f4884be6c9effb0f1e9a3795e58"></a>签名(FLIRT等)&&比较(Diff)&&匹配
5
<a id="596b6cf8fd36bc4c819335f12850a915"></a>HOOK
5
<a id="d90b60dc79837e06d8ba2a7ee1f109d3"></a>.NET
5
<a id="c3cda3278305549f4c21df25cbf638a4"></a>内核&&驱动
5
<a id="6d2fe834b7662ecdd48c17163f732daf"></a>Environment&&环境&&配置
5
<a id="2120fe5420607a363ae87f5d2fed459f"></a>IDA本身
5
<a id="af06263e9a92f6036dc5d4c4b28b9d8c"></a>Procmon
5
<a id="8433dd5df40aaf302b179b1fda1d2863"></a>系列文章-使用IDA逆向C代码
5
<a id="004c199e1dbf71769fbafcd8e58d1ead"></a>针对特定分析目标
5
<a id="a8f5db3ab4bc7bc3d6ca772b3b9b0b1e"></a>固件&&嵌入式设备
4
<a id="9b0f5682dc818c93c4de3f46fc3f43d0"></a>工具
4
<a id="9dcc6c7dd980bec1f92d0cc9a2209a24"></a>字符串
4
<a id="6c4841dd91cb173093ea2c8d0b557e71"></a>工具
4
<a id="19cfd3ea4bd01d440efb9d4dd97a64d0"></a>VT&&虚拟化&&Hypbervisor
4
<a id="a750ac8156aa0ff337a8639649415ef1"></a>新添加的
4
功能
4
<a id="5afa336e229e4c38ad378644c484734a"></a>Emulator&&模拟器
3
<a id="ad68872e14f70db53e8d9519213ec039"></a>IDAPython本身
3
<a id="02517eda8c2519c564a19219e97d6237"></a>工具
3
<a id="6fb7e41786c49cc3811305c520dfe9a1"></a>导入导出&与其他工具交互
3
<a id="f10e9553770db6f98e8619dcd74166ef"></a>工具
3
<a id="fa49f65b8d3c71b36c6924ce51c2ca0c"></a>HotFix
3
<a id="b38dab81610be087bd5bc7785269b8cc"></a>模拟器集成
3
<a id="042ef9d415350eeb97ac2539c2fa530e"></a>文章
3
<a id="6922457cb0d4b6b87a34caf39aa31dfe"></a>新添加的
3
<a id="920b69cea1fc334bbc21a957dd0d9f6f"></a>注册表
2
<a id="f975a85510f714ec3cc2551e868e75b8"></a>Malware&&恶意代码
2
<a id="d295182c016bd9c2d5479fe0e98a75df"></a>系统调用
2
<a id="1ede5ade1e55074922eb4b6386f5ca65"></a>工具
2
<a id="ec5f7b9ed06500c537aa25851a3f2d3a"></a>翻译-ReverseEngineeringCodeWithIDAPro
2
<a id="206ca17fc949b8e0ae62731d9bb244cb"></a>协作逆向&&多人操作相同IDB文件
2
<a id="1d83ca6d8b02950be10ac8e4b8a2d976"></a>Obfuscate&&混淆
2
<a id="bb9f8e636857320abf0502c19af6c763"></a>Debug&&调试
2
<a id="a7dac37cd93b8bb42c7d6aedccb751b3"></a>收集
2
<a id="7199e8787c0de5b428f50263f965fda7"></a>反混淆
2
<a id="9c0ec56f402a2b9938417f6ecbaeaa72"></a>IDA对抗
2
<a id="846eebe73bef533041d74fc711cafb43"></a>指令参考&文档
1
<a id="ec395c8f974c75963d88a9829af12a90"></a>打包
1
<a id="06d2caabef97cf663bd29af2b1fe270c"></a>加密解密
1
<a id="66052f824f5054aa0f70785a2389a478"></a>Android
1
<a id="d48f038b58dc921660be221b4e302f70"></a>工具
1
<a id="f7778a5392b90b03a3e23ef94a0cc3c6"></a>GUI
1
<a id="fcf75a0881617d1f684bc8b359c684d7"></a>效率&&导航&&快速访问&&图形&&图像&&可视化
1
<a id="90bf5d31a3897400ac07e15545d4be02"></a>函数相关
1
<a id="1ded622dca60b67288a591351de16f8b"></a>漏洞
1
<a id="353ea40f2346191ecb828210a685f9db"></a>x64dbg
1
<a id="ec3f0b5c2cf36004c4dd3d162b94b91a"></a>Radare2
1
<a id="17408290519e1ca7745233afea62c43c"></a>各类App
1
<a id="8f1876dff78e80b60d00de25994276d9"></a>工具
1
<a id="5e91b280aab7f242cbc37d64ddbff82f"></a>IDB操作
1
<a id="7a2977533ccdac70ee6e58a7853b756b"></a>Microcode
1
<a id="e9ce398c2c43170e69c95fe9ad8d22fc"></a>Microcode
1
<a id="e72b766bcd3b868c438a372bc365221e"></a>工具
1
<a id="fb4f0c061a72fc38656691746e7c45ce"></a>结构体&&类的检测&&创建&&恢复
1
<a id="fabf03b862a776bbd8bcc4574943a65a"></a>外观&&主题
1
<a id="34ac84853604a7741c61670f2a075d20"></a>污点分析&&符号执行
1
<a id="7d557bc3d677d206ef6c5a35ca8b3a14"></a>补丁&&Patch
1
<a id="fe5a6d7f16890542c9e60857706edfde"></a>工具
1
<a id="c08ebe5b7eec9fc96f8eff36d1d5cc7d"></a>辅助脚本编写
1
<a id="2ae406afda6602c8f02d73678b2ff040"></a>Ghidra
1
<a id="cd76e644d8ddbd385939bb17fceab205"></a>工具
1
Keywords
reverse-engineering
72
android
53
security
38
python
33
ios
31
windows
29
linux
23
debugger
21
disassembler
20
ida
18
x86
17
malware-analysis
16
x86-64
16
java
15
ida-pro
15
debugging
14
binary-analysis
13
apk
12
decompiler
12
ida-plugin
12
golang
12
frida
12
static-analysis
11
macos
11
instrumentation
10
objective-c
10
c
10
gdb
9
dex
9
malware
9
arm
9
rust
9
debugging-tool
8
idapython
8
hook
8
javascript
8
swift
8
mips
7
c-plus-plus
7
emulator
7
decompile
7
monitoring
7
dynamic-analysis
7
xcode
7
mobile-security
7
cli
7
security-tools
7
dalvik
6
pentest
6
assembly
6