x64dbg
Metasploit
x64dbg | Metasploit | |
---|---|---|
32 | 117 | |
43,260 | 32,889 | |
0.7% | 0.9% | |
9.0 | 10.0 | |
8 days ago | 1 day ago | |
C++ | Ruby | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
x64dbg
- we need a 2015E revival.
-
Too Many Fonts in Windows 10 Can Cause Slow Application Starts
I have never heard anyone say anything good about the Visual Studio debugger before. Now, I'm not a Windows person but I'm not gonna argue for gdb or lldb here. RemedyBG and x64dbg are the two debuggers I've heard good things about though I've never used them because, again, not a Windows person.
[1] https://remedybg.handmade.network/
[2] https://x64dbg.com/
-
Advice needed on disabling license checks on some old proprietary abandonware
I'd help you out but because of circumstances I have no laptop with me. You need x86/x64 debugger to do this. This one for example Find a registration procedure and look for possible brenching to other parts of code in assembly. It's probably somewhere in the beginning. Exclude code validation and export new program version.
- Looking for x64 emulator to learn assembly ?
-
C/C++: Where is the address of a declared variable stores?
One interesting thing you can do is download an app like https://x64dbg.com/ or cheat engine, which will let you see the memory. You can look at the process for something you’ve made and explore it. Log a memory address from your app then go find it in the tool and interpret the bytes as an integer. Find a string and see how that works. Find a pointer, read the address it’s pointing then go look at that address. You start to see how different containers store data. I find it fascinating.
-
Is there a tool that can show you an EIP trace of a game?
If you want to also do dynamic analysis (debugging) you can use https://x64dbg.com.
-
Star Wars Squadrons Windows 7 help (epic games ea origin)
close origin and download this debugger https://github.com/x64dbg/x64dbg/releases
- Lulu não foi eleito pelo povo brasileiro. Foi escolhido pelo sistema eleitoral
-
How do I get opcode instructions from hexdump
.exe is a complex format and not something you're going to extract raw instructions from using a hexdump. What you need is a "disassembler". For Windows I'd recommend x64dbg.
-
DayZ running on Apple Silicon 🔥
Patch the DayZServer_x64.exe, change "test al, al" to "cmp al, 2". i used x64dbg (https://x64dbg.com) a good video for the whole process: https://drive.google.com/file/d/1F1A0lpumREPXtVeoTMq1HiEnvaZp-NUU/view
Metasploit
-
Best Hacking Tools for Beginners 2024
Metasploit
- Metasploit: Add Systemd BSOD QR Payload?
- Metasploit explained for pentesters
-
Effective Adversary Emulation
Metasploit: https://github.com/rapid7/metasploit-framework
- CVE-2023-22515 - Atlassian Confluence unauthenticated RCE exploit module
-
Hacking from anywhere
1-) Learn Hacking on a debian based distro like Kali Linux - I personally started with tools like nikto, camhacker... and then moved to more complex frameworks like metasploit.
-
CMV: The Second Amendment "right to bear arms" and the discussions surrounding gun control also apply to hacking tools.
I once had to give a presentation about Metasploit, and whether it was ethically correct for the creator to make it free and open-source, available to everyone. And in researching this I realized that there were a lot of parallels between the arguments for or against hacking tools being readily available and the arguments for or against gun control. I'll just list a few quickly:
-
Hackers Tools: Must-Have Tools for Every Ethical Hacker
Metasploit Framework (mentioned earlier)
-
Penetration Testing
This phase is where the pen testers practically prove that there exist potential vulnerabilities in the target system. The pen testers do the hacking using an array of technical approaches and social engineering methods to exploit the vulnerabilities. The ethical hackers commonly use Metasploit framework to automatically execute exploitation against the target systems. Moreover, they may install malwares such as rootkit to persistently maintain their foothold and further compromise the target system.
- Metasploit Framework
What are some alternatives?
ghidra - Ghidra is a software reverse engineering (SRE) framework
BeEF - The Browser Exploitation Framework Project
dnSpy - .NET debugger and assembly editor [Moved to: https://github.com/dnSpy/dnSpy]
routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]
dnSpy
Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
ImHex - 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
SQLMap - Automatic SQL injection and database takeover tool
pycdc - C++ python bytecode disassembler and decompiler
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Disassembler
Brakeman - A static analysis security vulnerability scanner for Ruby on Rails applications