mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-04-26 18:49:08 -04:00
Reverse Engineering
Tools
- X86 Win32 Cheat sheet
- Intro X86
- base conversion
- Command line tricks
Encondings/ Binaries
file f1
ltrace bin
strings f1
base64 -d
xxd -r
nm
objcopy
binutils
Online References
IDA
- Cheat sheet
- IDA PRO
GDB
- Commands and cheat sheet
gdb
$ gcc -ggdb -o <filename> <filename>.c
Starting with some commands:
$ gdb <program name> -x <command file>
For example:
$ cat command.txt
set disassembly-flavor intel
disas main
objdump
Display information from object files: Where object file can be an intermediate file created during compilation but before linking, or a fully linked executable
$ objdump -d <bin>
hexdump & xxd
For canonical hex & ASCII view:
$hexdump -C
xxd
Make a hexdump or do the reverse:
xxd hello > hello.dump
xxd -r hello.dump > hello