x64dbg
bettercap
Our great sponsors
x64dbg | bettercap | |
---|---|---|
32 | 28 | |
43,170 | 15,681 | |
0.9% | 1.7% | |
9.1 | 1.0 | |
5 days ago | 19 days ago | |
C++ | Go | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
x64dbg
- we need a 2015E revival.
-
Too Many Fonts in Windows 10 Can Cause Slow Application Starts
I have never heard anyone say anything good about the Visual Studio debugger before. Now, I'm not a Windows person but I'm not gonna argue for gdb or lldb here. RemedyBG and x64dbg are the two debuggers I've heard good things about though I've never used them because, again, not a Windows person.
[1] https://remedybg.handmade.network/
[2] https://x64dbg.com/
-
Advice needed on disabling license checks on some old proprietary abandonware
I'd help you out but because of circumstances I have no laptop with me. You need x86/x64 debugger to do this. This one for example Find a registration procedure and look for possible brenching to other parts of code in assembly. It's probably somewhere in the beginning. Exclude code validation and export new program version.
- Looking for x64 emulator to learn assembly ?
-
C/C++: Where is the address of a declared variable stores?
One interesting thing you can do is download an app like https://x64dbg.com/ or cheat engine, which will let you see the memory. You can look at the process for something you’ve made and explore it. Log a memory address from your app then go find it in the tool and interpret the bytes as an integer. Find a string and see how that works. Find a pointer, read the address it’s pointing then go look at that address. You start to see how different containers store data. I find it fascinating.
-
Is there a tool that can show you an EIP trace of a game?
If you want to also do dynamic analysis (debugging) you can use https://x64dbg.com.
-
Star Wars Squadrons Windows 7 help (epic games ea origin)
close origin and download this debugger https://github.com/x64dbg/x64dbg/releases
- Lulu não foi eleito pelo povo brasileiro. Foi escolhido pelo sistema eleitoral
-
How do I get opcode instructions from hexdump
.exe is a complex format and not something you're going to extract raw instructions from using a hexdump. What you need is a "disassembler". For Windows I'd recommend x64dbg.
-
DayZ running on Apple Silicon 🔥
Patch the DayZServer_x64.exe, change "test al, al" to "cmp al, 2". i used x64dbg (https://x64dbg.com) a good video for the whole process: https://drive.google.com/file/d/1F1A0lpumREPXtVeoTMq1HiEnvaZp-NUU/view
bettercap
-
bettercap VS petep - a user suggested alternative
2 projects | 3 Oct 2023
-
Malware installed in this bluetooth remote?
you can do this with Bettercap
- bettercap hell
-
quicklisp security (or total lack of it)
I've been learning some common lisp, reading through Practical Common Lisp, and it's really neat. People say the good ideas of lisp got adapted in other languages and sure that's true of garbage collection, lambda's and some others, but I'm seeing plenty incredible stuff I haven't seen elsewhere, the condition system that among other things lets you fix and resume your program on exception, real interactive development, flexible object system, macros way more understandable than in other languages with AST macros as in lisp the AST is simple, an expressive dynamic language at high level of ruby and python while being an order of magnitude faster performance. Quicklisp also is really neat, how many other package managers can load new dependencies without restarting your application? And I was learning it with idea that it's not just of historical or hobby interest but legitimately a good choice I can use for new programming projects today for many tasks, but I just learned something that makes it impossible for me to consider, which is complete lack of security of quicklisp. You go to the website and see sha256 hash and PGP signature for quicklisp download, awesome it seems at the security standard you expect for a package manager. But then the actual quicklisp client does all downloads over http with no verification. What this means in practical terms is basically if you use quicklisp, anyone on your local network can easily hack your computer, by MITM (man-in-the-middle) the traffic and serving you backdoored software when you install packages from quicklisp. mitm6 will MITM windows machines on normal networks, bettercap can MITM linux and os x on most networks. Aside from attackers on your local network there's plenty other scenarios, you can go near office of CL using company and set up a open WIFI access point with same name as company wifi and hack their developers, using quicklisp over something like Tor is extremely dangerous at present as it would let the exit node backdoor the packages you download, and then in less likely but still should be protected against scenarios is just if quicklisp.org or any router between you and it is compromised, you can be hacked.
- Grannar från helvetet
- Bettercap – Swiss Army Knife for 802.11, BLE, IPv4 and IPv6 Networks
-
Hacker News top posts: Dec 3, 2022
Bettercap – Swiss Army Knife for 802.11, BLE, IPv4 and IPv6 Networks\ (5 comments)
What are some alternatives?
ghidra - Ghidra is a software reverse engineering (SRE) framework
aircrack-ng - WiFi security auditing tools suite
dnSpy - .NET debugger and assembly editor [Moved to: https://github.com/dnSpy/dnSpy]
MITMf - Framework for Man-In-The-Middle attacks
dnSpy
mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
ImHex - 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
wifipumpkin3 - Powerful framework for rogue access point attack.
pycdc - C++ python bytecode disassembler and decompiler
pwnagotchi-display-password-plugin - Pwnagotchi plugin to display the most recently cracked password on the Pwnagotchi face
Disassembler
Metasploit - Metasploit Framework