Our great sponsors
|3 days ago||about 1 year ago|
|Apache License 2.0||MIT License|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Awesome CTF : Top Learning Resource Labs
72 projects | /r/TutorialBoy | 13 Nov 2021
Androguard - Reverse engineer Android applications.
MIPS Firmware Reverse Engineering - anyone having any success using Ghidra for this?
4 projects | /r/ghidra | 6 Jan 2023
Your best bet here is to get the base address nailed down (assuming it’s a flat/monolithic image). There are a handful of utilities floating around (binbloom, basefind2) that use various pointer heuristics to try to guess the base address. There’s also a nice trick detailed in PoC||GTFO that you can use pretty reliably.
What are some alternatives?
Apktool - A tool for reverse engineering Android apk files
apk2gold - CLI tool for decompiling Android apps to Java. It does resources! It does Java! Its real easy!
jadx - Dex to Java decompiler
fibratus - A modern tool for Windows kernel exploration and tracing with a focus on security
z3 - The Z3 Theorem Prover
pwndbg - Exploit Development and Reverse Engineering with GDB Made Easy
vmlinux-to-elf - A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)
CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
hellomello - Experiments with writing Android apps in Nim
tenet - A Trace Explorer for Reverse Engineers
Metasploit - Metasploit Framework