mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2024-12-24 06:49:23 -05:00
adding reverse engineering and mobile security references
This commit is contained in:
parent
11263ced81
commit
02f91e3feb
@ -18,8 +18,13 @@ The following are several of the resources covered in the Wireless Networks, IoT
|
|||||||
|
|
||||||
## Android
|
## Android
|
||||||
|
|
||||||
### Android Studio
|
### Android Research and Reverse Tools
|
||||||
* https://developer.android.com/sdk/index.html
|
* [Android Developer Studio](http://developer.android.com/sdk/index.html)
|
||||||
|
* [APKtool](http://ibotpeaches.github.io/Apktool/)
|
||||||
|
* [dex2jar](https://github.com/pxb1988/dex2jar)
|
||||||
|
* [Bytecode Viewer](https://bytecodeviewer.com/)
|
||||||
|
* [IDA Pro](https://www.hex-rays.com/products/ida/index.shtml)
|
||||||
|
|
||||||
|
|
||||||
### Android Reverse Engineering Arsenals
|
### Android Reverse Engineering Arsenals
|
||||||
* https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=M-Tools
|
* https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=M-Tools
|
||||||
|
40
reverse_engineering/README.md
Normal file
40
reverse_engineering/README.md
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
# Reverse Engineer References
|
||||||
|
|
||||||
|
## Hex Editors
|
||||||
|
|
||||||
|
* [010 Editor](http://www.sweetscape.com/010editor/)
|
||||||
|
* [Hex Workshop](http://www.hexworkshop.com/)
|
||||||
|
* [HexFiend](http://ridiculousfish.com/hexfiend/)
|
||||||
|
* [Hiew](http://www.hiew.ru/)
|
||||||
|
* [HxD](https://mh-nexus.de/en/hxd/)
|
||||||
|
|
||||||
|
## Disassemblers
|
||||||
|
|
||||||
|
* [Binary Ninja](https://binary.ninja/)
|
||||||
|
* [Capstone](http://www.capstone-engine.org/)
|
||||||
|
* [fREedom](https://github.com/cseagle/fREedom)
|
||||||
|
* [Hopper](http://hopperapp.com/)
|
||||||
|
* [IDA Pro](https://www.hex-rays.com/products/ida/index.shtml)
|
||||||
|
* [JEB](https://www.pnfsoftware.com/jeb2/)
|
||||||
|
* [objdump](http://linux.die.net/man/1/objdump)
|
||||||
|
* [Radare](http://www.radare.org/r/)
|
||||||
|
|
||||||
|
## Awesome Reversing
|
||||||
|
* https://github.com/fdivrp/awesome-reversing - a plethora of references of tools, practice sites, and other reverse engineering information
|
||||||
|
|
||||||
|
## Reverse Engineering Tutorials
|
||||||
|
|
||||||
|
* [ARM Assembly Basics](https://azeria-labs.com/writing-arm-assembly-part-1/)
|
||||||
|
* [Binary Auditing Course](http://www.binary-auditing.com/)
|
||||||
|
* [Corelan Training](https://www.corelan-training.com/)
|
||||||
|
* [Dr. Fu's Malware Analysis](http://fumalwareanalysis.blogspot.sg/p/malware-analysis-tutorials-reverse.html)
|
||||||
|
* [Legend of Random](https://tuts4you.com/download.php?list.97)
|
||||||
|
* [Lenas Reversing for Newbies](https://tuts4you.com/download.php?list.17)
|
||||||
|
* [Modern Binary Exploitation](http://security.cs.rpi.edu/courses/binexp-spring2015/)
|
||||||
|
* [Offensive and Defensive Android Reversing](https://github.com/rednaga/training/raw/master/DEFCON23/O%26D%20-%20Android%20Reverse%20Engineering.pdf)
|
||||||
|
* [Offensive Security](https://www.offensive-security.com/information-security-training/)
|
||||||
|
* [Open Security Training](http://opensecuritytraining.info/Training.html)
|
||||||
|
* [REcon Training](https://recon.cx/2015/training.html)
|
||||||
|
* [Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
||||||
|
* [RPISEC Malware Course](https://github.com/RPISEC/Malware)
|
||||||
|
* [TiGa's Video Tutorials](http://www.woodmann.com/TiGa/)
|
Loading…
Reference in New Issue
Block a user