This commit is contained in:
bt3gl 2014-11-19 12:26:51 -05:00
parent 6edad0739a
commit 984d5ca66a
7 changed files with 74 additions and 23 deletions

View File

@ -96,7 +96,7 @@ In Python [we can use decoding](https://docs.python.org/2/library/codecs.html#co
## Tools
### Scripts:
### Scripts
- Finding GDC
- Finding if prime
@ -105,13 +105,20 @@ In Python [we can use decoding](https://docs.python.org/2/library/codecs.html#co
- XORtool
---
### Other Resources
- [Cryptol](https://www.cryptool.org/en/cryptool1-en)
- [PyCrypto](https://www.dlitz.net/software/pycrypto/)
- hashpump
- Sage
- John the Ripper
#### Carperter's Formula

View File

@ -8,4 +8,15 @@
- memdump
- pdfid
- pdf-parser
- dd
- strings
- scalpel
- TrID
- binwalk
- foremost
- ExifTool
- Hex editors
- DFF
- CAINE
- The Sleuth Kit
- Volability

View File

@ -22,3 +22,13 @@
- Example scripts
---
## Tools
- Wireshark, tshark
- OpenVPN
- OpenSSL
- nmap
- tcpdump
- netcat, telnet

View File

@ -15,13 +15,10 @@ All in one big bag. For fun, profits, or CTFs.
## * [STEGANOGRAPHY](https://github.com/bt3gl/My-Gray-Hacker-Resources/tree/master/Steganography)
## * [WEB EXPLOITS](https://github.com/bt3gl/My-Gray-Hacker-Resources/tree/master/Web_Exploits)
## * [OTHER HACKINGS](https://github.com/bt3gl/My-Gray-Hacker-Resources/tree/master/Other_Hackings)
## * [PENT TESTING](https://github.com/bt3gl/My-Gray-Hacker-Resources/tree/master/Pen_Testing)
## * [PEN TESTING](https://github.com/bt3gl/My-Gray-Hacker-Resources/tree/master/Pen_Testing)
![](http://i.imgur.com/4WNqTJS.png)
----
### Useful Command Line

View File

@ -1,9 +1,7 @@
# Reverse Engineering
-------------
## Tools
## Tools Folder
- X86 Win32 Cheat sheet
- Intro X86
@ -11,7 +9,26 @@
- Command line tricks
### Encondings/ Binaries
## Other Tools
- gdb
- IDA Pro
- Immunity Debugger
- OllyDbg
- Radare2
- nm
- objdump
- strace
- ILSpy (.NET)
- JD-GUI (Java)
- FFDec (Flash)
- dex2jar (Android)
- uncompyle2 (Python)
- unpackers, hex editors, compilers
## Encondings/ Binaries
```
file f1
@ -35,29 +52,25 @@ binutils
### Online References
## Online References
[Reverse Engineering, the Book]: http://beginners.re/
----
## IDA
- Cheat sheet
- [IDA PRO](https://www.hex-rays.com/products/ida/support/download_freeware.shtml)
-------------
## GDB
## gdb
- Commands and cheat sheet
#### gdb
```sh
$ gcc -ggdb -o <filename> <filename>.c
@ -76,7 +89,7 @@ disas main
```
#### objdump
## objdump
Display information from object files: Where object file can be an intermediate file
created during compilation but before linking, or a fully linked executable
@ -85,14 +98,14 @@ created during compilation but before linking, or a fully linked executable
$ objdump -d <bin>
```
#### hexdump & xxd
## hexdump & xxd
For canonical hex & ASCII view:
```
$hexdump -C
```
#### xxd
## xxd
Make a hexdump or do the reverse:
```
xxd hello > hello.dump

View File

@ -52,6 +52,19 @@ ____
- [ExifTool](http://www.sno.phy.queensu.ca/~phil/exiftool/index.html)
---
## Other Tools
- OpenStego
- OutGuess
- Gimp
- Audacity
- MP3Stego
- ffmpeg
- pngcheck
- StegFS
- Steghide

View File

@ -7,7 +7,7 @@
- xor_bytes
- color crypto
!()[http://i.imgur.com/5IBxKbF.png]
![](http://i.imgur.com/5IBxKbF.png)
___