所有收集類項目:
- 收集的所有開源工具: sec-tool-list: 超過18K, 包括Markdown和Json兩種格式
- 全平台逆向資源: awesome-reverse-engineering:
- Windows平台安全: PE/DLL/DLL-Injection/Dll-Hijack/Dll-Load/UAC-Bypass/Sysmon/AppLocker/ETW/WSL/.NET/Process-Injection/Code-Injection/DEP/Kernel/...
- Linux安全: ELF/...
- macOS/iXxx安全: Mach-O/越獄/LLDB/XCode/...
- Android安全: HotFix/XPosed/Pack/Unpack/Emulator/Obfuscate
- 知名工具: IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/...
- 網絡相關的安全資源: awesome-network-stuff:
- 網絡通信: 代理/SS/V2ray/GFW/反向代理/隧道/VPN/Tor/I2P/...
- 網絡攻擊: 中間人/PortKnocking/...
- 網絡分析: 嗅探/協議分析/網絡可視化/網絡分析/網絡診斷等
- 攻擊性網絡安全資源: awesome-cyber-security: 漏洞/滲透/物聯網安全/數據滲透/Metasploit/BurpSuite/KaliLinux/C&C/OWASP/免殺/CobaltStrike/偵查/OSINT/社工/密碼/憑證/威脅狩獵/Payload/WifiHacking/無線攻擊/後滲透/提權/UAC繞過/...
- 開源遠控和惡意遠控分析報告: awesome-rat: 開源遠控工具: Windows/Linux/macOS/Android; 遠控類惡意惡意代碼的分析報告等
- Webshell工具和分析/使用文章: awesome-webshell: Webshell資源收集, 包括150個Github項目, 200個左右文章
- 取證相關工具和文章: awesome-forensics: 近300個取開源證工具,近600與取證相關文章
ReverseEngineering
- 跟逆向有關的資源收集。當前包括的工具個數3500+,並根據功能進行了粗糙的分類。部分工具添加了中文描述。當前包括文章數2300+。
- 此頁只包含部分內容. 查看完整版
說明
EnglishVersion
目錄
- Windows
- PE
- DLL
- UAC
- Sysmon
- ETW
- AppLocker
- 工具
- (213) 其他
- (10) .NET
- 新添加的
- (5) Environment&&環境&&配置
- 進程注入
- 代碼注入
- 內存模塊
- (6) VT&&虛擬化&&Hypbervisor
- (8) 內核&&驅動
- (3) 註冊表
- (4) 系統調用
- (3) Procmon
- 文章
- Linux
- Apple&&iOS&&iXxx
- Mach-O
- 越獄
- LLDB
- XCode
- 工具
- 文章&&視頻
- Android
- 工具
- (183) 新添加的
- (4) HotFix
- (1) 打包
- (2) 收集
- (1) 各類App
- (30) Xposed
- (19) 加殼&&脫殼
- (12) HOOK
- (9) Emulator&&模擬器
- (6) IDA
- (11) Debug&&調試
- (34) Malware&&惡意代碼
- (5) Obfuscate&&混淆
- (15) ReverseEngineering
- (319) 新添加的1
- (2) 文章&&視頻
- IDA
- 插件&&腳本
- (97) 未分類
- 結構體&&類的檢測&&創建&&恢復
- (3) 收集
- (9) 外觀&&主題
- (4) 固件&&嵌入式設備
- 簽名(FLIRT等)&&比較(Diff)&&匹配
- (17) 未分類
- FLIRT簽名
- (3) FLIRT簽名收集
- (2) FLIRT簽名生成
- (11) Diff&&Match工具
- (7) Yara
- (6) IDB操作
- (5) 協作逆向&&多人操作相同IDB文件
- (9) 與調試器同步&&通信&&交互
- 導入導出&與其他工具交互
- (13) 未分類
- (5) Ghidra
- (3) BinNavi
- (3) BinaryNinja
- (2) Radare2
- (4) Frida
- (2) IntelPin
- 針對特定分析目標
- (26) 未分類
- (2) GoLang
- (4) Windows驅動
- (4) PS3&&PS4
- (33) Loader&Processor
- (4) PDB
- (2) Flash&&SWF
- (4) 特定樣本家族
- (1) CTF
- IDAPython本身
- (6) 指令參考&文檔
- 輔助腳本編寫
- (9) 未分類
- (3) Qt
- (3) 控制台&&窗口界面
- (2) 插件模板
- (2) 其他語言
- (16) 古老的
- 調試&&動態運行&動態數據
- (10) 未分類
- (10) DBI數據
- (4) 調試數據
- (14) 反編譯器&&AST
- (7) 反混淆
- 效率&&導航&&快速訪問&&圖形&&圖像&&可視化
- (15) 其他
- (9) 顯示增強
- (3) 圖形&&圖像
- (3) 搜索
- (7) Android
- Apple&&macOS&&iXxx&&Objective-C&&SWift&&Mach-O
- (5) 未分類
- (3) 內核緩存
- (3) Mach-O
- (3) Swift
- (9) ELF
- (5) Microcode
- (6) 模擬器集成
- (4) 新添加的
- (4) 作為輔助&&構成其他的一環
- 漏洞
- (7) 補丁&&Patch
- (3) 其他
- 函數相關
- (4) 未分類
- (6) 重命名&&前綴&&標記
- (5) 導航&&查看&&查找
- (2) demangle
- (3) 污點分析&&符號執行
- (8) 字符串
- (3) 加密解密
- 文章
- (6) 系列文章-Labeless插件介紹
- (24) 系列文章-使用IDA從零開始學逆向
- 系列文章-IDAPython-讓你的生活更美好
- 工具&&插件&&腳本介紹
- (51) 未分類
- (3) Loader&&Processor
- (1) 與其他工具交互
- (10) Tips&&Tricks
- (125) 未分類
- (5) 翻譯-TheIDAProBook
- (2) 翻譯-ReverseEngineeringCodeWithIDAPro
- (5) 系列文章-使用IDA逆向C代碼
- 逆向實戰
- (11) 未分類
- (15) 惡意代碼分析
- (2) 漏洞分析&&挖掘
- (27) 新添加的
- (4) IDA本身
- (1) Microcode
- (1) IDA對抗
- Ghidra
- 插件&&腳本
- (12) 新添加的
- 特定分析目標
- (4) 未分類
- (18) Loader&&Processor
- (2) Xbox
- 與其他工具交互
- (2) Radare2
- 未分類
- (5) IDA
- (1) DBI
- (1) 調試器
- (1) 外觀&&主題
- (4) Ghidra
- 腳本編寫
- 文章&&視頻
- (30) 新添加的
- (4) Ghidra漏洞
- 實戰分析
- (3) 漏洞分析&&挖掘
- (9) 未分類
- (9) 惡意代碼
- 其他
- Tips&&Tricks
- (5) 工具&&插件&&腳本
- (15) 新添加的1
- x64dbg
- OllyDbg
- WinDBG
- Radare2
- 插件&&腳本
- (76) 新添加的
- (1) Radare2
- 與其他工具交互
- GUI
- 文章&&視頻
- Cuckoo
- BinaryNinja
- DBI
- DynamoRIO
- 工具
- (8) 新添加的
- (2) DynamoRIO
- (3) 與其他工具交互
- (15) 文章&&視頻
- IntelPin
- Frida
- 工具
- (100) 新添加的
- 與其他工具交互
- (1) 未分類
- (3) IDA
- (2) BinaryNinja
- (2) Radare2
- (1) Frida
- (92) 文章&&視頻
- QBDI
- 其他
- 其他
- 文章-新添加的
- (284) 工具-新添加的
- (3) 工具-其他
- angr
- Debug&&調試
- BAP
- BinNavi
- Decompiler&&反編譯器
- Disassemble&&反彙編
- GDB
- Monitor&&監控&&Trace&&追踪
- TODO
TODO
- 對工具進行更細緻的分類
- 為工具添加詳細的中文描述,包括其內部實現原理和使用方式
- 添加非Github repo
- 補充文章
- 修改已添加文章的描述
IDA
插件&&腳本
新添加的
未分類
- [ 1058星][17d] [Py] fireeye/flare-ida 多工具
- StackStrings 自動恢復手動構造的字符串
- Struct Typer implements the struct typing described here
- ApplyCalleeType specify or choose a function type for indirect calls as described here
- argtracker 識別函數使用的靜態參數
- idb2pat FLIRT簽名生成
- objc2_analyzer 在目標Mach-O可執行文件的與Objective-C運行時相關的部分中定義的選擇器引用及其實現之間創建交叉引用
- MSDN Annotations 從XML文件中提取MSDN信息,添加到IDB數據庫中
- ironstrings 使用代碼模擬執行(flare-emu), 恢復構造的字符串
- Shellcode Hashes 生成Hash數據庫
- [ 737星][7m] [Py] devttys0/ida IDA插件/腳本/模塊收集
- wpsearch 查找在MIPS WPS checksum實現中常見的立即數
- md5hash 純Python版的MD5 hash實現(IDA的hashlib有問題)
- alleycat 查找向指定的函數內代碼塊的路徑、查找兩個或多個函數之間的路徑、生成交互式調用圖、可編程
- codatify 定義IDA自動化分析時miss的ASCII字符串、函數、代碼。將data段的所有未定義字節轉換為DWORD(於是IDA可識別函數和跳轉表指針)
- fluorescence 高亮函數調用指令
- leafblower 識別常用的POSIX函數:printf, sprintf, memcmp, strcpy等
- localxrefs 在當前函數內部查找所有對任意選擇文本的引用
- mipslocalvars 對棧上只用於存儲寄存器的變量進行命名,簡化棧數據分析(MISP)
- mipsrop 在MIPS可執行代碼中搜尋ROP。查找常見的ROP
- rizzo 對2個或多個IDB之間的函數進行識別和重命名,基於:函數簽名、對唯一字符串/常量的引用、模糊簽名、調用圖
- [ 318星][2m] [C] ohjeongwook/darungrim 軟件補丁分析工具
- [ 277星][4m] [Py] jpcertcc/aa-tools 多腳本
- apt17scan.py Volatility插件, 檢測APT17相關的惡意代碼並提取配置
- emdivi_postdata_decoder 解碼Emdivi post的數據
- emdivi_string_decryptor IDAPython腳本, 解密Emdivi內的字符串
- citadel_decryptor Data decryption tool for Citadel
- adwind_string_decoder Python script for decoding strings inside Adwind
- redleavesscan Volatility plugin for detecting RedLeaves and extracting its config
- datper_splunk Python script for detects Datper communication and adds result field to Splunk index
- datper_elk Python script for detects Datper communication and adds result field to Elasticsearch index
- tscookie_decode Python script for decrypting and parsing TSCookie configure data
- wellmess_cookie_decode Python script for decoding WellMess's cookie data (support Python2)
- cobaltstrikescan Volatility plugin for detecting Cobalt Strike Beacon and extracting its config
- tscookie_data_decode Python script for decrypting and parsing TSCookie configure data
結構體&&類的檢測&&創建&&恢復
未分類
- [ 931星][25d] [OCaml] airbus-seclab/bincat 二進制代碼靜態分析工具。值分析(寄存器、內存)、污點分析、類型重建和傳播(propagation)、前向/後向分析
- [ 664星][27d] [Py] igogo-x86/hexrayspytools 結構體和類重建插件
C++類&&虛表
- [ 607星][3m] [Py] 0xgalz/virtuailor 利用IDA調試獲取的信息,自動創建C++的虛表
重複區段: IDA->插件->調試->調試數據|
查看詳情
靜態部分:
- 檢測非直接調用
- 利用條件斷點, Hook非直接調用的值賦值過程
動態部分
- 創建虛表結構
- 重命名函數和虛表地址
- 給反彙編非直接調用添加結構偏移
- 給非直接調用到虛表之間添加交叉引用
使用
- File -> Script File -> Main.py(設置斷點) -> IDA調試器執行
收集
- [ 1771星][10d] onethawt/idaplugins-list IDA插件收集
- [ 363星][9m] fr0gger/awesome-ida-x64-olly-plugin IDA x64DBG OllyDBG 插件收集
外觀&&主題
- [ 723星][7m] [Py] zyantific/idaskins 皮膚插件
固件&&嵌入式設備
- [ 5228星][2m] [Py] refirmlabs/binwalk 固件分析工具(命令行+IDA插件)
- [ 492星][5m] [Py] maddiestone/idapythonembeddedtoolkit 自動分析嵌入式設備的固件
簽名(FLIRT等)&&比較(Diff)&&匹配
未分類
- [ 421星][1m] [C] mcgill-dmas/kam1n0-community 彙編代碼管理與分析平台(獨立工具+IDA插件)
- 重複區段: IDA->插件->作為輔助|
- IDA插件
- kam1n0
FLIRT簽名
FLIRT簽名收集
- [ 605星][2m] [Max] maktm/flirtdb A community driven collection of IDA FLIRT signature files
- [ 321星][5m] push0ebp/sig-database IDA FLIRT Signature Database
FLIRT簽名生成
Diff&&Match工具
- [ 1554星][13d] [Py] joxeankoret/diaphora program diffing
- [ 360星][1m] [Py] checkpointsw/karta source code assisted fast binary matching plugin for IDA
- [ 332星][1y] [Py] joxeankoret/pigaios A tool for matching and diffing source codes directly against binaries.
Yara
- [ 449星][2m] [Py] polymorf/findcrypt-yara 使用Yara規則查找加密常量
IDB操作
- [ 316星][6m] [Py] williballenthin/python-idb idb 文件解析和分析工具
協作逆向&&多人操作相同IDB文件
- [ 508星][11m] [Py] idarlingteam/idarling 多人協作插件
- [ 258星][1y] [C++] dga-mi-ssi/yaco 利用Git版本控制,同步多人對相同二進製文件的修改
與調試器同步&&通信&&交互
- [ 471星][13d] [C] bootleg/ret-sync 在反彙編工具和調試器之間同步調試會話
- 重複區段: x64dbg->插件->新添加的|
- GDB插件
- Ghidra插件
- IDA插件
- LLDB
- OD
- OD2
- WinDgb
- x64dbg
- [ 292星][11m] [C] a1ext/labeless 在IDA和調試器之間無縫同步Label/註釋等
導入導出&與其他工具交互
未分類
Ghidra
- [ 299星][4m] [Py] cisco-talos/ghida 在IDA中集成Ghidra反編譯器
- 重複區段: Ghidra->插件->與其他工具交互->IDA |
- [ 238星][9m] [Py] daenerys-sre/source 使IDA和Ghidra腳本通用, 無需修改
- 重複區段: Ghidra->插件->與其他工具交互->IDA |
BinNavi
- [ 382星][26d] [C++] google/binexport 將反彙編以Protocol Buffer的形式導出為PostgreSQL數據庫, 導入到BinNavi中使用
BinaryNinja
Radare2
Frida
IntelPin
針對特定分析目標
未分類
Loader&Processor
- [ 205星][1y] [Py] fireeye/idawasm WebAssembly的加載器和解析器
GoLang
- [ 376星][9m] [Py] sibears/idagolanghelper 解析Go語言編譯的二進製文件中的GoLang類型信息
- [ 297星][2m] [Py] strazzere/golang_loader_assist 輔助Go逆向
Windows驅動
- [ 306星][1y] [Py] fsecurelabs/win_driver_plugin A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.
- [ 218星][1y] [Py] nccgroup/driverbuddy 輔助逆向Windows內核驅動
PS3&&PS4
PDB
Flash&&SWF
特定樣本家族
CTF
IDAPython本身
未分類
- [ 720星][15d] [Py] idapython/src IDAPython源碼
- [ 373星][3m] [Py] tmr232/sark IDAPython的高級抽象
清單
- [ 258星][28d] [Py] inforion/idapython-cheatsheet Scripts and cheatsheets for IDAPython
指令參考&文檔
- [ 497星][1y] [PLpgSQL] nologic/idaref 指令參考插件.
- [ 449星][4m] [C++] alexhude/friend 反彙編顯示增強, 文檔增強插件
輔助腳本編寫
未分類
- [ 282星][2m] [Py] fireeye/flare-emu 結合Unicorn引擎, 簡化模擬腳本的編寫
Qt
控制台&&窗口界面
- [ 269星][1m] [Py] eset/ipyida 集成IPython控制台
插件模板
其他語言
古老的
調試&&動態運行&動態數據
未分類
- [ 395星][1y] [C++] cseagle/sk3wldbg 用Unicorn引擎做後端的調試插件
DBI數據
- [ 943星][1y] [Py] gaasedelen/lighthouse 從DBI中收集代碼覆蓋情況,在IDA/Binja中映射、瀏覽、查看
- 重複區段: DBI->IntelPin->工具->與其他工具交互->未分類|DBI->Frida->工具->與其他工具交互->IDA |DBI->Frida->工具->與其他工具交互->BinaryNinja |
- coverage-frida 使用Frida收集信息
- coverage-pin 使用Pin收集覆蓋信息
- 插件支持IDA和BinNinja
調試數據
[ 607星][3m] [Py] 0xgalz/virtuailor 利用IDA調試獲取的信息,自動創建C++的虛表
[ 386星][5m] [Py] ynvb/die 使用IDA調試器收集動態運行信息, 輔助靜態分析
反編譯器&&AST
- [ 1672星][7m] [C++] yegord/snowman Snowman反編譯器,支持x86, AMD64, ARM。有獨立的GUI工具、命令行工具、IDA/Radare2/x64dbg插件,也可以作為庫使用
- 重複區段: x64dbg->插件->新添加的|
- IDA插件
- snowman QT界面
- nocode 命令行工具
- nc 核心代碼,可作為庫使用
- [ 418星][3m] [C++] avast/retdec-idaplugin retdec 的IDA 插件
- [ 235星][7m] [Py] patois/dsync 反彙編和反編譯窗口同步插件
反混淆
- [ 1365星][3m] [Py] fireeye/flare-floss 自動從惡意代碼中提取反混淆後的字符串
- 重複區段: IDA->插件->字符串|
- floss
- IDA插件
- [ 304星][4m] [C++] rolfrolles/hexraysdeob 利用Hex-Rays microcode API破解編譯器級別的混淆
- 重複區段: IDA->插件->Microcode |
效率&&導航&&快速訪問&&圖形&&圖像&&可視化
其他
[ 449星][4m] [C++] alexhude/friend 反彙編顯示增強, 文檔增強插件
[ 372星][3m] [Py] l4ys/lazyida 若干快速訪問功能, 掃描字符串格式化漏洞
[ 329星][4m] [Py] pfalcon/scratchabit 交互式反彙編工具, 有與IDAPython兼容的插件API
[ 235星][7m] [Py] patois/dsync 反彙編和反編譯窗口同步插件
顯示增強
- [ 208星][1m] [Py] patois/idacyber 交互式數據可視化插件
圖形&&圖像
- [ 2569星][6m] [Java] google/binnavi 二進制分析IDE, 對反彙編代碼的控制流程圖和調用圖進行探查/導航/編輯/註釋.(IDA插件的作用是導出反彙編)
搜尋
Android
- [ 246星][28d] [C++] strazzere/android-scripts Android逆向腳本收集
- 重複區段: Android->工具->ReverseEngineering |
Apple&&macOS&&iXxx&&Objective-C&&SWift&&Mach-O
未分類
內核緩存
Mach-O
Swift
ELF
Microcode
- [ 304星][4m] [C++] rolfrolles/hexraysdeob 利用Hex-Rays microcode API破解編譯器級別的混淆
模擬器集成
- [ 504星][20d] [Py] alexhude/uemu 基於Unicorn的模擬器插件
- [ 395星][1y] [C++] cseagle/sk3wldbg 用Unicorn引擎做後端的調試插件
- [ 282星][2m] [Py] fireeye/flare-emu 結合Unicorn引擎, 簡化模擬腳本的編寫
- 重複區段: IDA->插件->輔助腳本編寫->未分類|
作為輔助&&構成其他的一環
- [ 1542星][28d] [Py] lifting-bits/mcsema 將x86, amd64, aarch64二進製文件轉換成LLVM字節碼
- IDA7插件用於反彙編二進製文件並生成控制流程圖
- IDA插件用於反彙編二進製文件並生成控制流程圖
- Binja插件用於反彙編二進製文件並生成控制流程圖
- mcsema
- [ 421星][1m] [C] mcgill-dmas/kam1n0-community 彙編代碼管理與分析平台(獨立工具+IDA插件)
- 重複區段: IDA->插件->簽名(FLIRT等)->未分類|
- IDA插件
- kam1n0
漏洞
未分類
- [ 492星][7m] [Py] danigargu/heap-viewer 查看glibc堆, 主要用於漏洞開發
- [ 372星][3m] [Py] l4ys/lazyida 若干快速訪問功能, 掃描字符串格式化漏洞
ROP
補丁&&Patch
- [ 727星][1y] [Py] keystone-engine/keypatch 彙編/補丁插件, 支持多架構, 基於Keystone引擎
其他
函數相關
未分類
重命名&&前綴&&標記
- [ 291星][3m] [Py] a1ext/auto_re 自動化函數重命名
導航&&查看&&查找
demangle
污點分析&&符號執行
- [ 931星][25d] [OCaml] airbus-seclab/bincat 二進制代碼靜態分析工具。值分析(寄存器、內存)、污點分析、類型重建和傳播(propagation)、前向/後向分析
字符串
- [ 1365星][3m] [Py] fireeye/flare-floss 自動從惡意代碼中提取反混淆後的字符串
- 重複區段: IDA->插件->反混淆|
- floss
- IDA插件
- [ 372星][3m] [Py] l4ys/lazyida 若干快速訪問功能, 掃描字符串格式化漏洞
加密解密
- [ 449星][2m] [Py] polymorf/findcrypt-yara 使用Yara規則查找加密常量
- 重複區段: IDA->插件->簽名(FLIRT等)->Yara |
文章
新添加的
- 2019.12 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P27)
- 2019.12 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P26)
- 2019.12 [knownsec] 使用IDA 處理U-Boot 二進制流文件
- 2019.12 [venus] 使用IDA 處理U-Boot 二進制流文件
- 2019.11 [hexblog] Extending IDA processor modules for GDB debugging
- 2019.11 [0x48] 使用IDA處理U-Boot二進制流文件
- 2019.11 [aliyun] 使用IDA microcode去除ollvm混淆(上)
- 2019.10 [cisco] New IDA Pro plugin provides TileGX support
- 2019.09 [cisco] GhIDA: Ghidra decompiler for IDA Pro
- 2019.09 [cn0xroot] Fix IDA Crash bug on osx 10.14
- 2019.08 [hexblog] IDA 7.4: IDAPython and Python 3
- 2019.08 [hexblog] IDA 7.4: Turning off IDA 6.x compatibility in IDAPython by default
- 2019.06 [hitbsecconf] #HITB2019AMS D1T2 - fn_fuzzy: Fast Multiple Binary Diffing Triage With IDA - Takahiro Haruyama
- 2019.05 [aliyun] 欺騙IDA F5參數識別
- 2019.05 [aliyun] 混淆IDA F5的一個小技巧-x64
- 2018.11 [4hou] 使用IDAPython自動映射二進製文件替換默認函數名
- 2018.10 [WarrantyVoider] Ida Pro Tutorial - Compare Reverse Engineering
- 2018.06 [freebuf] MindshaRE:如何利用IDA Python瀏覽WINDOWS內核
- 2018.05 [WarrantyVoider] Tutorial - Debugging In Source Code With IDA Pro
- 2018.03 [BinaryAdventure] x86 In-Depth 4: Labeling Structs Properly in IDA Pro
未分類
- 2018.05 [tradahacking] 使用IDA和輔助工具比較二進製文件
- 2018.04 [pediy] [翻譯]IDAPython-Book(Alexander Hanel)
- 2018.03 [hexblog] IDA on non-OS X/Retina Hi-DPI displays
- 2018.03 [pediy] [翻譯]IDA v6.5 文本執行
- 2018.02 [pediy] [原創]逆向技術之熟悉IDA工具
- 2018.01 [pediy] [原創]ARM Linux下搭建IDA Pro遠程調試環境
- 2018.01 [pediy] [翻譯]對抗IDA Pro調試器ARM反彙編的技巧
- 2017.12 [OALabs] Debugging shellcode using BlobRunner and IDA Pro
- 2017.12 [pediy] [原創]IDA7.0 Mac 插件編譯指南
- 2017.12 [pediy] [原創]IDA 插件- FRIEND 的安裝和使用
- 2017.12 [BinaryAdventure] IDAPython Tutorial with example script
- 2017.11 [OALabs] How To Defeat Anti-VM and Anti-Debug Packers With IDA Pro
- 2017.11 [pediy] [原創]IDAPython腳本分享- 自動在JNI_OnLoad下斷點
- 2017.11 [pediy] [求助]IDA Pro調試so,附加完畢,跳到目標so基址,但是內容都是DCB偽指令?
- 2017.11 [OALabs] IDA Pro Malware Analysis Tips
- 2017.10 [hexblog] IDA and common Python issues
- 2017.10 [pediy] [分享]IDA + VMware 調試win7 x64
- 2017.06 [pediy] [翻譯]IDA Hex-Rays反編譯器使用的一些小技巧
- 2017.06 [qmemcpy] IDA series, part 2: debugging a .NET executable
- 2017.06 [qmemcpy] IDA series, part 1: the Hex-Rays decompiler
Tips&&Tricks
- 2019.07 [kienbigmummy] Cách export data trong IDA
- 2019.07 [hexacorn] Batch decompilation with IDA / Hex-Rays Decompiler
- 2019.06 [openanalysis] Disable ASLR for Easier Malware Debugging With x64dbg and IDA Pro
- 2019.06 [OALabs] Disable ASLR For Easier Malware Debugging With x64dbg and IDA Pro
- 2019.06 [openanalysis] Reverse Engineering C++ Malware With IDA Pro: Classes, Constructors, and Structs
- 2019.06 [OALabs] Reverse Engineering C++ Malware With IDA Pro
- 2019.03 [aliyun] IDA Pro7.0使用技巧總結
- 2018.06 [checkpoint] Scriptable Remote Debugging with Windbg and IDA Pro
- 2015.07 [djmanilaice] 在PyCharm中編寫IDAPython腳本時自動提示
- 2015.07 [djmanilaice] 使用IDA自動打開當前目錄下的DLL和EXE
系列文章-Labeless插件介紹
- 2018.10 [checkpoint] Labeless Part 6: How to Resolve Obfuscated API Calls in the Ngioweb Proxy Malware - Check Point Research
- 2018.10 [checkpoint] Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm. - Check Point Research
- 2018.10 [checkpoint] Labeless Part 4: Scripting - Check Point Research
- 2018.08 [checkpoint] Labeless Part 3: How to Dump and Auto-Resolve WinAPI Calls in LockPos Point-of-Sale Malware - Check Point Research
- 2018.08 [checkpoint] Labeless Part 2: Installation - Check Point Research
- 2018.08 [checkpoint] Labeless Part 1: An Introduction - Check Point Research
系列文章-使用IDA從零開始學逆向
- 2019.11 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P25)
- 2019.10 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P24)
- 2019.10 [tradahacking] REVERSING WITH IDA FROM SCRATCH (P23)
- 2019.09 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P21)
- 2019.08 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P20)
- 2019.08 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P19)
- 2019.07 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P18)
- 2019.07 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P17)
- 2019.06 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P16)
- 2019.06 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P15)
- 2019.05 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P14)
- 2019.05 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P13)
- 2019.04 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P12)
- 2019.04 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P11)
- 2019.03 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P10)
- 2019.03 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P9)
- 2019.03 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P8)
- 2019.03 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P7)
- 2019.03 [tradahacking] REVERSING WITH IDA FROM SCRATCH (P6)
- 2019.03 [kienbigmummy] REVERSING WITH IDA FROM SCRATCH (P5)
系列文章-IDAPython-讓你的生活更美好
原文
- 2016.06 [paloaltonetworks] Using IDAPython to Make Your Life Easier, Part6
- 2016.01 [paloaltonetworks] Using IDAPython to Make Your Life Easier, Part5
- 2016.01 [paloaltonetworks] Using IDAPython to Make Your Life Easier, Part4
- 2016.01 [paloaltonetworks] Using IDAPython to Make Your Life Easier, Part3
- 2015.12 [paloaltonetworks] Using IDAPython to Make Your Life Easier, Part2
- 2015.12 [paloaltonetworks] Using IDAPython to Make Your Life Easier, Part1
譯文
- 2016.01 [freebuf] IDAPython:讓你的生活更美好(五)
- 2016.01 [freebuf] IDAPython:讓你的生活更美好(四)
- 2016.01 [freebuf] IDAPython:讓你的生活更美好(三)
- 2016.01 [freebuf] IDAPython:讓你的生活更美好(二)
- 2016.01 [freebuf] IDAPython:讓你的生活更美好(一)
系列文章-使用IDA逆向C代碼
- 2019.01 [ly0n] Reversing C code with IDA part V
- 2019.01 [ly0n] Reversing C code with IDA part IV
- 2019.01 [ly0n] Reversing C code with IDA part III
- 2018.12 [ly0n] Reversing C code with IDA part II
- 2018.01 [ly0n] Reversing C code with IDA part I
工具&&插件&&腳本介紹
未分類
- 2019.10 [vmray] VMRay IDA Plugin v1.1: Streamlining Deep-Dive Malware Analysis
- 2019.10 [talosintelligence] New IDA Pro plugin provides TileGX support
- 2019.09 [talosintelligence] GhIDA: Ghidra decompiler for IDA Pro
- 2019.05 [carbonblack] fn_fuzzy: Fast Multiple Binary Diffing Triage with IDA
- 2019.04 [] climacros – IDA productivity tool
- 2019.04 [] QScripts – IDA Scripting productivity tool
- 2019.03 [] Daenerys: IDA Pro and Ghidra interoperability framework
- 2019.03 [freebuf] Ponce:一鍵即可實現符號執行(IDA插件)
- 2019.01 [talosintelligence] Dynamic Data Resolver (DDR) - IDA Plugin
- 2018.11 [4hou] FLARE腳本系列:使用idawasm IDA Pro插件逆向WebAssembly(Wasm)模塊
- 2018.10 [aliyun] 用idawasm IDA Pro逆向WebAssembly模塊
- 2018.10 [fireeye] FLARE Script Series: Reverse Engineering WebAssembly Modules Using the idawasm IDA Pro Plugin
- 2018.10 [vmray] Introducing the IDA Plugin for VMRay Analyzer
- 2018.10 [aliyun] IDA-minsc在Hex-Rays插件大賽中獲得第二名(2)
- 2018.10 [aliyun] IDA-minsc在Hex-Rays插件大賽中獲得第二名(1)
- 2018.10 [aliyun] 通過兩個IDAPython插件支持A12 PAC指令和iOS12 kernelcache 重定位
- 2018.09 [ptsecurity] How we developed the NIOS II processor module for IDA Pro
- 2018.09 [talosintelligence] IDA-minsc Wins Second Place in Hex-Rays Plugins Contest
- 2018.09 [cisco] IDA-minsc Wins Second Place in Hex-Rays Plugins Contest
- 2018.09 [msreverseengineering] Weekend Project: A Custom IDA Loader Module for the Hidden Bee Malware Family
Loader&&Processor
- 2019.03 [360] 為CHIP-8編寫IDA processor module
- 2018.10 [ptsecurity] Modernizing IDA Pro: how to make processor module glitches go away
- 2018.08 [360] Lua程序逆向之為Luac編寫IDA Pro處理器模塊
與其他工具交互
- 2018.09 [dustri] IDAPython vs. r2pipe
翻譯-TheIDAProBook
- 2008.10 [pediy] [翻譯]The IDA Pro Book 第六章
- 2008.10 [pediy] [翻譯](20081030更新)The IDA Pro Book 第12章:使用FLIRT簽名識別庫
- 2008.10 [pediy] [翻譯]The IDA Pro Book(第二章)
- 2008.10 [pediy] [翻譯]The IDA Pro book 第5章---IDA DATA DISPLAY
- 2008.10 [pediy] [翻譯]The IDA Pro Book(第一章)
翻譯-ReverseEngineeringCodeWithIDAPro
- 2009.01 [pediy] [原創]Reverse Engineering Code with IDA Pro第七章中文譯稿
- 2008.06 [pediy] [翻譯]Reverse Engineering Code with IDA Pro(第一、二章)
IDA本身
- 2019.01 [pediy] [原創]IDA7.2安裝包分析
- 2019.01 [pediy] [原創]IDA 在解析IA64 中的brl 指令時存在一個Bug
- 2018.11 [hexblog] IDA 7.2 – The Mac Rundown
- 2018.10 [pediy] [原創] 修復IDA Pro 7.0在macOS Mojave崩潰的問題
逆向實戰
未分類
- 2019.11 [4hou] 反作弊遊戲如何破解,看看《黑色沙漠》逆向分析過程:使用IDAPython 和FLIRT 簽名恢復IAT
- 2019.11 [aliyun] 使用IDA microcode去除ollvm混淆(下)
- 2019.06 [devco] 破密行動: 以不尋常的角度破解IDA Pro 偽隨機數
- 2019.05 [360] IDAPython實戰項目——DES算法識別
- 2019.04 [venus] 使用IDA Pro 的REobjc 模塊逆向Objective-C 二進製文件
- 2019.01 [ly0n] Cracking with IDA (redh@wk 2.5 crackme)
- 2018.11 [somersetrecon] Introduction to IDAPython for Vulnerability Hunting - Part 2
- 2018.11 [pediy] [原創]IDA動態調試ELF
- 2018.06 [pediy] [翻譯]在IDA中使用Python Z3庫來簡化函數中的算術運算
- 2018.03 [duo] Reversing Objective-C Binaries With the REobjc Module for IDA Pro
- 2006.05 [pediy] Themida v1008 驅動程序分析,去除花指令的IDA 文件
惡意代碼分析
- 2019.04 [360] 兩種姿勢批量解密惡意驅動中的上百條字串
- 2019.03 [cyber] 使用IDAPython分析Trickbot
- 2019.01 [OALabs] Lazy String Decryption Tips With IDA PRO and Shade Ransomware Unpacked!
- 2018.09 [4hou] Hidden Bee惡意軟件家族的定制IDA裝載模塊開發
- 2018.09 [4hou] 用IDAPython解密Gootkit中的字符串
- 2018.05 [OALabs] Unpacking Gootkit Part 2 - Debugging Anti-Analysis Tricks With IDA Pro and x64dbg
- 2018.04 [OALabs] Unpacking VB6 Packers With IDA Pro and API Hooks (Re-Upload)
- 2018.03 [OALabs] Unpacking Gootkit Malware With IDA Pro and X64dbg - Subscriber Request
- 2018.01 [OALabs] Unpacking Pykspa Malware With Python and IDA Pro - Subscriber Request Part 1
- 2017.11 [OALabs] Unpacking Process Injection Malware With IDA PRO (Part 2)
- 2017.11 [OALabs] Unpacking Process Injection Malware With IDA PRO (Part 1)
- 2017.06 [hackers] Reverse Engineering Malware, Part 3: IDA Pro Introduction
- 2017.05 [4hou] 逆向分析——使用IDA動態調試WanaCrypt0r中的tasksche.exe
- 2017.05 [3gstudent] 逆向分析——使用IDA動態調試WanaCrypt0r中的tasksche.exe
- 2012.06 [trustwave] 使用IDAPython對Flame的字符串進行反混淆
漏洞分析&&挖掘
- 2018.07 [360] 如何使用IDAPython 尋找漏洞
- 2018.07 [somersetrecon] 如何使用IDAPython挖掘漏洞
Microcode
- 2019.10 [amossys] 探秘Hex-Rays microcode
IDA對抗
- 2019.05 [aliyun] 混淆IDA F5的一個小技巧-x86
Ghidra
插件&&腳本
Ghidra
- [ 18649星][10d] [Java] nationalsecurityagency/ghidra 軟件逆向框架
新添加的
- [ 455星][9m] [YARA] ghidraninja/ghidra_scripts Ghidra腳本
- binwalk 對當前程序運行BinWalk, 標註找到的內容
- yara 使用Yara查找加密常量
- swift_demangler 自動demangle Swift函數名
- golang_renamer 恢復stripped Go二進製文件的函數名
- [ 204星][8m] [Java] rolfrolles/ghidrapal Ghidra 程序分析庫(無文檔)
特定分析目標
未分類
Loader&&Processor
Xbox
與其他工具交互
未分類
Radare2
IDA
- [ 299星][4m] [Py] cisco-talos/ghida 在IDA中集成Ghidra反編譯器
- 重複區段: IDA->插件->導入導出->Ghidra |
- [ 238星][9m] [Py] daenerys-sre/source 使IDA和Ghidra腳本通用, 無需修改
- 重複區段: IDA->插件->導入導出->Ghidra |
DBI
偵錯工具
外觀&&主題
腳本編寫
其他
程式設計語言
文章&&視頻
新添加的1
- 2019.12 [shogunlab] Here Be Dragons: Reverse Engineering with Ghidra - Part 1 [Data, Functions & Scripts]
- 2019.11 [freebuf] 使用Ghidra分析phpStudy後門
- 2019.10 [4hou] 使用Ghidra 分析phpStudy 後門
- 2019.10 [knownsec] 使用Ghidra 分析phpStudy 後門
- 2019.10 [venus] 使用Ghidra 分析phpStudy 後門
- 2019.10 [WarrantyVoider] C64LoaderWV - Loading C64 programs into Ghidra
- 2019.08 [pentestpartners] CVE-2019-12103 – Analysis of a Pre-Auth RCE on the TP-Link M7350, with Ghidra!
- 2019.08 [xpnsec] Analysing RPC With Ghidra and Neo4j
- 2019.04 [X0x6d696368] ghidra_scripts: GoogleSearch.py (to lookup function names via Google)
- 2019.04 [X0x6d696368] ghidra_scripts: SimpleStackStrings.py (to reassemble "stack strings")
- 2019.04 [X0x6d696368] ghidra_scripts: colorCallGraphCallsTo.py (using SetBackroundColor and traversing the call graph)
- 2019.04 [4hou] 利用GHIDRA逆向Tytera MD380的固件
- 2019.04 [jeanmichel] First steps with Ghidra: crackme01
- 2019.03 [GynvaelEN] Hacking Livestream #74: Ghidra
- 2019.01 [sans] How to Train Your Dragon: Ghidra Basics
新添加的
- 2019.09 [dustri] Radare2, IDA Pro, and Binary ninja, a metaphoric comparison
- 2019.05 [vimeo] Three Heads are Better Than One: Mastering Ghidra - Alexei Bulazel, Jeremy Blackthorne - INFILTRATE 2019
- 2019.04 [X0x6d696368] Ghidra: Stack Depth (to detect stack manipulation)
- 2019.04 [X0x6d696368] Ghidra: Version Tracking
- 2019.04 [X0x6d696368] Ghidra: Export Symbols and Load External Libraries (to resolve imported function names)
- 2019.04 [X0x6d696368] Ghidra: Data Type Manager / Archives and Parse C Source... (resolve function signatures)
- 2019.04 [X0x6d696368] Ghidra: Generate Checksum... (to extract hashes of embedded malware artifacts)
- 2019.04 [msreverseengineering] An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra
- 2019.04 [X0x6d696368] Ghidra: FunctionID (to identify libraries and code reuse)
- 2019.04 [X0x6d696368] Ghidra: Server / Shared Projects (using ghidra-server.org)
- 2019.04 [X0x6d696368] Ghidra: Bytes View (to patch binary and export to a working PE file)
- 2019.04 [X0x6d696368] Ghidra: Fixing Bugs (Fixing PE section import size alignment)
- 2019.04 [X0x6d696368] Ghidra: Clear Flow and Repair, and Patch Instruction (to defeat anti-disassembly)
- 2019.04 [X0x6d696368] Ghidra: Scripting (Python) (a quick introduction by implementing pipeDecoder.py)
- 2019.04 [X0x6d696368] Ghidra: Decompile and compile (to quickly reimplement malware decoding functions)
- 2019.04 [X0x6d696368] Ghidra: EditBytesScript (to fix/manipulate PE header to load ShadowHammer setup.exe sample)
- 2019.04 [X0x6d696368] Ghidra: Extract and Import ... (to extract resources from PE binaries)
- 2019.04 [X0x6d696368] Ghidra: YaraGhidraGUIScript (to generate a YARA signature for threat/retro hunting)
- 2019.04 [X0x6d696368] Ghidra: XORMemoryScript (to XOR decode strings)
- 2019.04 [yoroi] Ghidra SRE: The AZORult Field Test
Ghidra漏洞
- 2019.10 [securityaffairs] Ghidra 9.0.4及之前版本的代碼執行漏洞
- 2019.10 [4hou] CVE-2019-16941: NSA Ghidra工具RCE漏洞
- 2019.03 [venus] Ghidra 從XXE 到RCE
- 2019.03 [tencent] Ghidra 從XXE 到RCE
實戰分析
未分類
- 2019.09 [venus] 使用Ghidra 對iOS 應用進行msgSend 分析
- 2019.09 [4hou] 使用Ghidra對iOS應用進行msgSend分析
- 2019.09 [WarrantyVoider] X360 XEX Decompiling With Ghidra
- 2019.08 [WarrantyVoider] N64 ROM Decompiling With Ghidra - N64LoaderWV
- 2019.08 [4hou] 基於Ghidra和Neo4j的RPC分析技術
- 2019.04 [X0x6d696368] Ghidra: Search Program Text... (to find XOR decoding functions in malware)
- 2019.04 [shogunlab] Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe]
- 2019.03 [GhidraNinja] Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme
- 2019.03 [GhidraNinja] Ghidra quickstart & tutorial: Solving a simple crackme
漏洞分析&&挖掘
- 2019.11 [4hou] 使用Ghidra對WhatsApp VOIP Stack 溢出漏洞的補丁對比分析
- 2019.09 [4hou] 利用Ghidra分析TP-link M7350 4G隨身WiFi的RCE漏洞
- 2019.08 [aliyun] CVE-2019-12103 使用Ghidra分析TP-Link M7350上的預認證RCE
惡意代碼
- 2019.06 [dawidgolak] IcedID aka #Bokbot Analysis with Ghidra.
- 2019.04 [aliyun] 利用Ghidra分析惡意軟件Emotet
- 2019.04 [X0x6d696368] Ghidra: Shadow Hammer (Stage 1: Setup.exe) complete static Analysis
- 2019.04 [X0xd0cf11e] Analyzing Emotet with Ghidra — Part 2
- 2019.04 [X0x6d696368] Ghidra: Android APK (it's basically dex2jar with a .dex decompiler)
- 2019.04 [X0xd0cf11e] Analyzing Emotet with Ghidra — Part 1
- 2019.03 [GhidraNinja] Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra
- 2019.03 [HackerSploit] Malware Analysis With Ghidra - Stuxnet Analysis
- 2019.03 [sans] Analysing meterpreter payload with Ghidra
其他
Tips&&Tricks
工具&&插件&&腳本
- 2019.11 [deadc0de] 使用Python編寫Ghidra腳本示例
- 2019.04 [X0x6d696368] ghidra_scripts: RC4Decryptor.py
- 2019.04 [aliyun] 如何開髮用於漏洞研究的Ghidra插件,Part 1
- 2019.04 [somersetrecon] Ghidra Plugin Development for Vulnerability Research - Part-1
- 2019.03 [wololo] PS4 release: GhidraPS4Loader and Playstation 4 Flash tool
x64dbg
插件&&腳本
x64dbg
- [ 34576星][1m] [C++] x64dbg/x64dbg Windows平台x32/x64調試器
新添加的
- [ 1672星][7m] [C++] yegord/snowman Snowman反編譯器,支持x86, AMD64, ARM。有獨立的GUI工具、命令行工具、IDA/Radare2/x64dbg插件,也可以作為庫使用
- 重複區段: IDA->插件->反編譯器|
- IDA插件
- snowman QT界面
- nocode 命令行工具
- nc 核心代碼,可作為庫使用
- [ 1341星][1m] [C] x64dbg/x64dbgpy Automating x64dbg using Python, Snapshots:
- [ 972星][2m] [Py] x64dbg/docs x64dbg文檔
- [ 471星][13d] [C] bootleg/ret-sync 在反彙編工具和調試器之間同步調試會話
- 重複區段: IDA->插件->與調試器同步|
- GDB插件
- Ghidra插件
- IDA插件
- LLDB
- OD
- OD2
- WinDgb
- x64dbg
- [ 363星][9m] fr0gger/awesome-ida-x64-olly-plugin IDA x64DBG OllyDBG 插件收集
文章&&視頻
- 2019.02 [freebuf] 使用x64dbg分析微信並獲取所有聯繫人信息
- 2018.03 [freebuf] 使用x64dbg分析微信聊天函數並實現發信息
- 2018.03 [360] 使用x64dbg脫殼之開源殼upx
- 2018.02 [360] 使用x64dbg分析微信防多開功能
- 2018.02 [360] 使用x64dbg 分析TIM2.0 QQ撤銷功能
- 2018.02 [KirbiflintCracking] Patching a Keygenme with x64dbg [Learning Cracking]
- 2018.01 [KirbiflintCracking] Cracking & Keygen a crackme with x64dbg [Learning Cracking]
- 2018.01 [KirbiflintCracking] Cracking the new Steam Stub drm with x64dbg [Learning Cracking]
- 2018.01 [KirbiflintCracking] Cracking a simple crackme & bypassing Anti-debugger protection with x64dbg [Learning Cracking]
- 2017.12 [KirbiflintCracking] Cracking some Crackmes with x64dbg [Learning Cracking]
- 2017.12 [KirbiflintCracking] Cracking a simple Crackme with x64dbg [Learning cracking]
- 2017.10 [x64dbg] Limitations in x64dbg
- 2017.09 [pediy] [翻譯]消息斷點在x64dbg中的應用by lantie@15PB
- 2017.07 [pediy] [原創]使用x64dbg+VS2015 Spy++去除WinRAR5.40(64位)廣告彈框
- 2017.06 [seowhistleblower] Channel Update + Let's Hack: Sniper Elite 4 (Cheat Engine and x64dbg Tutorial)
- 2016.10 [x64dbg] Architecture of x64dbg
- 2016.07 [x64dbg] x64dbg plugin SDK
- 2016.07 [adelmas] Introducing x64dbg and Pizzacrypts Ransomware Unpacking
- 2015.12 [pediy] [原創]源碼編譯x64dbg
- 2015.10 [pediy] [原創]win7X64DBGPORT移位數據
OllyDbg
插件&&腳本
新添加的
文章&&視頻
- 2019.04 [freebuf] 緩衝區溢出實戰教程系列(三):利用OllyDbg了解程序運行機制
- 2018.10 [pediy] [原創]使用“PE文件加區段工具”、“LordPE”、“WinHex”、“OllyDbg”為PE文件添加section、dll(API)
- 2018.10 [pediy] [原創]Ollydbg插件的編寫流程
- 2018.03 [pediy] [原創]業餘時間開發的類IDA靜態反彙編工具(仿Ollydbg界面)(內有傳送門)
- 2018.01 [kienbigmummy] OllyDbg_tut32
- 2018.01 [pediy] 如何實現自己的ollydbg調試器(1) 界面的實現
- 2017.12 [hackers] Reverse Engineering Malware, Part 5: OllyDbg Basics
- 2017.10 [4hou] 工具推薦:逆向破解利器OllyDbg
- 2017.07 [ColinHardy] Three and a half ways to unpack malware using Ollydbg
- 2016.12 [360] 利用OllyDbg跟踪分析Process Hollowing
- 2016.12 [airbuscybersecurity] Following Process Hollowing in OllyDbg
- 2015.11 [pediy] [原創][開源]OllyDbg 2.x插件編寫教程
- 2015.11 [pediy] [原創]科普文之如何編寫ollydbg插件
- 2015.11 [pediy] [翻譯]Ollydbg2.0X版本幫助手冊中文翻譯
- 2015.08 [pediy] [原創]《使用OllyDbg從零開始Cracking》第14課練習完整解答
- 2015.01 [pediy] [翻譯]使用OllyDbg從零開始Cracking 第五十八章-EXECryptor v2.2.50.h脫殼
- 2014.11 [reversec0de] OllyDbg Plugin Converter v0.1b
- 2014.10 [pediy] [翻譯]使用OllyDbg從零開始Cracking 第四十四章-ACProtect V1.09脫殼(修復AntiDump)
- 2014.10 [pediy] [翻譯]使用OllyDbg從零開始Cracking 第四十三章-ACProtect V1.09脫殼(編寫腳本修復IAT)
- 2014.10 [pediy] 使用OllyDbg從零開始Cracking 第四十二章-ACProtect V1.09脫殼(尋找OEP,繞過硬件斷點的檢測,修復Stolen code)
WinDBG
插件&&腳本
新添加的
- [ 564星][6m] [C#] fremag/memoscope.net Dump and analyze .Net applications memory ( a gui for WinDbg and ClrMd )
- [ 279星][1m] [Py] hugsy/defcon_27_windbg_workshop DEFCON 27 workshop - Modern Debugging with WinDbg Preview
- [ 230星][9m] [C++] microsoft/windbg-samples Sample extensions, scripts, and API uses for WinDbg.
文章&&視頻
- 2019.10 [freebuf] Iris:一款可執行常見Windows漏洞利用檢測的WinDbg擴展
- 2019.08 [lowleveldesign] Synthetic types and tracing syscalls in WinDbg
- 2019.08 [benoit] Portable WinDbg
- 2019.07 [osr] How L1 Terminal Fault (L1TF) Mitigation and WinDbg Wasted My Morning (aka Yak Shaving: WinDbg Edition)
- 2019.06 [360] 《Dive into Windbg系列》Explorer無法啟動排查
- 2019.05 [nul] 一個Windbg/cdb極其緩慢的例子
- 2019.04 [360] 《Dive into Windbg系列》AudioSrv音頻服務故障
- 2019.04 [freebuf] 如何為WinDbg編寫ClrMD插件
- 2019.03 [aliyun] 為WinDbg和LLDB編寫ClrMD擴展
- 2019.03 [offensive] Development of a new Windows 10 KASLR Bypass (in One WinDBG Command)
- 2019.02 [OALabs] WinDbg Basics for Malware Analysis
- 2019.01 [TheSourceLens] Windows Internals - Processes Part 6 of 20 - Process related windbg commands.
- 2019.01 [TheSourceLens] Introduction to Windbg Series 1 Part 23 - Time travellers tracing ( IDNA )
- 2018.09 [pediy] [原創] 《軟件調試》分頁機制windbg例子分析(各種填坑)
- 2018.08 [pediy] [翻譯]WinDbg內核調試配置方法介紹
- 2018.06 [pediy] [原創]讓Windbg在驅動入口前斷下來
- 2018.05 [criteo] Extending the new WinDbg, Part 3 – Embedding a C# interpreter
- 2018.04 [whereisk0shl] Windbg logviewer.exe緩衝區溢出漏洞
- 2018.04 [nettitude] WinDbg: using pykd to dump private symbols
- 2018.02 [comae] YARA scans in WinDbg
Android
工具
新添加的1
- [ 6101星][3m] [Java] google/android-classyshark 分析基於Android/Java的App或遊戲
- [ 6094星][5m] [Java] qihoo360/replugin RePlugin - A flexible, stable, easy-to-use Android Plug-in Framework
- [ 5195星][19d] [Py] mobsf/mobile-security-framework-mobsf Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
- [ 5084星][15d] [HTML] owasp/owasp-mstg 關於移動App安全開發、測試和逆向的相近手冊
- [ 4882星][24d] [Java] guardianproject/haven 通過Android應用和設備上的傳感器保護自己的個人空間和財產而又不損害
- [ 4776星][12d] [C++] facebook/redex Android App字節碼優化器
- [ 4306星][15d] [Shell] ashishb/android-security-awesome A collection of android security related resources
- [ 3649星][2m] [C++] anbox/anbox 在常規GNU / Linux系統上引導完整的Android系統,基於容器
- [ 2314星][1y] [Java] csploit/android cSploit - The most complete and advanced IT security professional toolkit on Android.
- [ 2120星][9m] [Py] linkedin/qark 查找Android App的漏洞, 支持源碼或APK文件
- [ 2095星][10m] jermic/android-crack-tool
- [ 2051星][21d] [Py] sensepost/objection runtimemobile exploration
- [ 2011星][8m] [Py] fsecurelabs/drozer The Leading Security Assessment Framework for Android.
- [ 1976星][9d] [Java] kyson/androidgodeye AndroidGodEye:A performance monitor tool , like "Android Studio profiler" for Android , you can easily monitor the performance of your app real time in pc browser
- [ 1925星][7m] [Java] fuzion24/justtrustme An xposed module that disables SSL certificate checking for the purposes of auditing an app with cert pinning
- [ 1430星][11m] [Java] aslody/legend (Android)無需Root即可Hook Java方法的框架, 支持Dalvik和Art環境
- [ 1417星][1m] [Java] chrisk44/hijacker Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android
- [ 1241星][3m] [Java] whataa/pandora an android library for debugging what we care about directly in app.
- [ 1235星][2m] [Java] find-sec-bugs/find-sec-bugs The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
- [ 1213星][2m] [JS] megatronking/httpcanary A powerful capture and injection tool for the Android platform
- [ 1208星][4m] [Java] javiersantos/piracychecker An Android library that prevents your app from being pirated / cracked using Google Play Licensing (LVL), APK signature protection and more. API 14+ required.
- [ 1134星][1m] [Java] huangyz0918/androidwm 一個支持不可見數字水印(隱寫術)的android圖像水印庫。
- [ 885星][2m] [C] 504ensicslabs/lime LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures f…
- [ 820星][11d] proxymanapp/proxyman Modern and Delightful HTTP Debugging Proxy for macOS, iOS and Android
- [ 810星][4m] [Scala] antox/antox Android client for Project Tox - Secure Peer to Peer Messaging
- [ 800星][3m] sh4hin/androl4b 用於評估Android應用程序,逆向工程和惡意軟件分析的虛擬機
- [ 769星][1y] [C] ele7enxxh/android-inline-hook thumb16 thumb32 arm32 inlineHook in Android
- [ 668星][2m] doridori/android-security-reference A WIP Android Security Ref
- [ 608星][7m] [JS] vincentcox/stacoan StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
- [ 559星][14d] [Shell] owasp/owasp-masvs OWASP 移動App安全標準
- [ 546星][2m] nordicsemiconductor/android-nrf-connect Documentation and issue tracker for nRF Connect for Android.
- [ 541星][1y] [Java] jaredrummler/apkparser APK parser for Android
- [ 527星][4m] [JS] wooyundota/droidsslunpinning Android certificate pinning disable tools
- [ 518星][4m] [Java] megatronking/stringfog 一款自動對字節碼中的字符串進行加密Android插件工具
- [ 511星][9d] [Java] happylishang/cacheemulatorchecker Android模擬器檢測,檢測Android模擬器,獲取相對真實的IMEI AndroidId 序列號MAC地址等,作為DeviceID,應對防刷需求等
- [ 482星][2m] [JS] lyxhh/lxhtoolhttpdecrypt Simple Android/iOS protocol analysis and utilization tool
- [ 450星][12m] [Kotlin] shadowsocks/kcptun-android kcptun for Android.
- [ 443星][1m] [TS] shroudedcode/apk-mitm
- [ 431星][13d] [C] guardianproject/orbot The Github home of Orbot: Tor on Android (Also available on gitlab!)
- [ 426星][19d] [Py] thehackingsage/hacktronian All in One Hacking Tool for Linux & Android
- [ 412星][4m] [Java] megatronking/netbare Net packets capture & injection library designed for Android
- [ 409星][3m] [CSS] angea/pocorgtfo a "Proof of Concept or GTFO" mirror with extra article index, direct links and clean PDFs.
- [ 408星][1y] [Java] testwhat/smaliex A wrapper to get de-optimized dex from odex/oat/vdex.
- [ 379星][6m] [Makefile] crifan/android_app_security_crack 安卓應用的安全和破解
- [ 379星][1y] [CSS] nowsecure/secure-mobile-development A Collection of Secure Mobile Development Best Practices
- [ 358星][5m] b3nac/android-reports-and-resources A big list of Android Hackerone disclosed reports and other resources.
- [ 358星][5m] [C] the-cracker-technology/andrax-mobile-pentest ANDRAX The first and unique Penetration Testing platform for Android smartphones
- [ 333星][25d] [Java] datatheorem/trustkit-android Easy SSL pinning validation and reporting for Android.
- [ 284星][9m] [Py] micropyramid/forex-python Foreign exchange rates, Bitcoin price index and currency conversion using ratesapi.io
- [ 267星][4m] [Py] amimo/dcc DCC (Dex-to-C Compiler) is method-based aot compiler that can translate DEX code to C code.
- [ 265星][11d] [Py] den4uk/andriller a collection of forensic tools for smartphones
- [ 251星][10m] [C] chef-koch/android-vulnerabilities-overview An small overview of known Android vulnerabilities
- [ 234星][3m] [C] grant-h/qu1ckr00t A PoC application demonstrating the power of an Android kernel arbitrary R/W.
- [ 234星][1y] [Ruby] hahwul/droid-hunter (deprecated) Android application vulnerability analysis and Android pentest tool
- [ 229星][8m] [Java] jieyushi/luffy Android字節碼插件,編譯期間動態修改代碼,改造添加全埋點日誌採集功能模塊,對常見控件進行監聽處理
- [ 225星][3m] [Java] virb3/trustmealready Disable SSL verification and pinning on Android, system-wide
- [ 208星][26d] [C] derrekr/fastboot3ds A homebrew bootloader for the Nintendo 3DS that is similar to android's fastboot.
新添加的
HotFix
- [ 14557星][13d] [Java] tencent/tinker Tinker is a hot-fix solution library for Android, it supports dex, library and resources update without reinstall apk.
- [ 3462星][27d] [Java] meituan-dianping/robust Robust is an Android HotFix solution with high compatibility and high stability. Robust can fix bugs immediately without a reboot.
- [ 1117星][6m] [Java] manbanggroup/phantom 唯一零Hook 穩定佔坑類Android 熱更新插件化方案
打包
- [ 5080星][2m] [Java] meituan-dianping/walle Android Signature V2 Scheme簽名下的新一代渠道包打包神器
收集
各類App
- [ 12285星][11d] [Java] signalapp/signal-android A private messenger for Android.
Xposed
- [ 8756星][2m] [Java] android-hacker/virtualxposed A simple app to use Xposed without root, unlock the bootloader or modify system image, etc.
- [ 2559星][7m] taichi-framework/taichi A framework to use Xposed module with or without Root/Unlock bootloader, supportting Android 5.0 ~ 10.0
- [ 2034星][12d] [Java] elderdrivers/edxposed Elder driver Xposed Framework.
- [ 1726星][1y] [Java] ac-pm/inspeckage Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
- [ 1655星][2m] [Java] tiann/epic Dynamic java method AOP hook for Android(continution of Dexposed on ART), Supporting 4.0~10.0
- [ 1296星][2m] [Java] android-hacker/exposed A library to use Xposed without root or recovery(or modify system image etc..).
- [ 790星][8m] [Java] blankeer/mdwechat 一個能讓微信Material Design 化的Xposed 模塊
- [ 669星][12d] [Java] ganyao114/sandhook Android ART Hook/Native Inline Hook/Single Instruction Hook - support 4.4 - 10.0 32/64 bit - Xposed API Compat
- [ 478星][2m] [Java] tornaco/x-apm 應用管理Xposed
- [ 322星][1y] [C] smartdone/dexdump 一個用來快速脫一代殼的工具(稍微改下就可以脫類抽取那種殼)(Android)
- [ 309星][1m] bigsinger/androididchanger Xposed Module for Changing Android Device Info
- [ 309星][13d] [Java] ganyao114/sandvxposed Xposed environment without root (OS 5.0 - 10.0)
- [ 204星][1y] [C] gtoad/android_inline_hook Build an so file to automatically do the android_native_hook work. Supports thumb-2/arm32 and ARM64 ! With this, tools like Xposed can do android native hook.
加殼&&脫殼
- [ 1793星][8m] [C++] wrbug/dumpdex Android脫殼
- [ 1465星][3m] [C++] vaibhavpandeyvpz/apkstudio Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.
- [ 811星][4m] [C] strazzere/android-unpacker Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0
- [ 712星][2m] [YARA] rednaga/apkid Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
- [ 366星][3m] [Java] patrickfav/uber-apk-signer A cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided release certificates. It supports v1, v2 and v3 Android signing scheme has an embedded debug keystore and auto verifies after signing.
- [ 322星][6m] [Shell] 1n3/reverseapk Quickly analyze and reverse engineer Android packages
HOOK
- [ 1500星][27d] [C] iqiyi/xhook a PLT (Procedure Linkage Table) hook library for Android native ELF
- [ 1494星][9d] [C++] jmpews/dobby a lightweight, multi-platform, multi-architecture hook framework.
- [ 804星][25d] [C++] aslody/whale Hook Framework for Android/IOS/Linux/MacOS
- [ 530星][7m] [Java] aslody/andhook Android dynamic instrumentation framework
- [ 361星][8m] [C] turing-technician/fasthook Android ART Hook
Emulator&&模擬器
- [ 1492星][1y] [C++] f1xpl/openauto AndroidAuto headunit emulator
- [ 532星][7m] [Java] limboemu/limbo Limbo is a QEMU-based emulator for Android. It currently supports PC & ARM emulation for Intel x86 and ARM architecture. See our wiki
- [ 471星][3m] [Java] strazzere/anti-emulator Android Anti-Emulator
IDA
Debug&&調試
- [ 10794星][1m] [Java] konloch/bytecode-viewer A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
- [ 6762星][10m] [Java] amitshekhariitbhu/android-debug-database A library for debugging android databases and shared preferences - Make Debugging Great Again
Malware&&惡意代碼
- [ 429星][4m] [Shell] ashishb/android-malware Collection of android malware samples
- [ 347星][3m] [Java] droidefense/engine Droidefense: Advance Android Malware Analysis Framework
Obfuscate&&混淆
- [ 3078星][2m] [Java] calebfenton/simplify Generic Android Deobfuscator
- [ 294星][4m] [C] shadowsocks/simple-obfs-android A simple obfuscating tool for Android
ReverseEngineering
- [ 9285星][1m] [Java] ibotpeaches/apktool A tool for reverse engineering Android apk files
- [ 2053星][1m] [Java] genymobile/gnirehtet Gnirehtet provides reverse tethering for Android
- [ 585星][3m] [C++] secrary/andromeda Andromeda - Interactive Reverse Engineering Tool for Android Applications [This project is not maintained anymore]
- [ 545星][20d] maddiestone/androidappre Android App Reverse Engineering Workshop
- [ 267星][10m] [Dockerfile] cryptax/androidre 用於Android 逆向的Docker 容器
- [ 246星][28d] [C++] strazzere/android-scripts Android逆向腳本收集
文章&&視頻
- 2019.12 [aliyun] Android智能終端系統的安全加固(上)
- 2019.11 [venus] Android勒索病毒分析(上)
Apple&&iOS&&iXxx
Mach-O
工具
- [ 2540星][10m] [ObjC] nygard/class-dump Generate Objective-C headers from Mach-O files.
- [ 2140星][2m] [Py] jonathansalwan/ropgadget This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
- [ 399星][2m] [Logos] limneos/classdump-dyld Class-dump any Mach-o file without extracting it from dyld_shared_cache
- [ 265星][8m] [ObjC] devaukz/macho-kit AC/Objective-C library for parsing Mach-O files.
文章
- 2017.11 [pnfsoftware] Having Fun with Obfuscated Mach-O Files
- 2017.03 [lse] Playing with Mach-O binaries and dyld
- 2017.03 [lse] Playing with Mach-O binaries and dyld
- 2017.02 [venus] Mach-O 脫殼技巧一則
- 2016.05 [turingh] nlist-Mach-O文件重定向信息數據結構分析
- 2016.05 [pediy] [原創]初探Mach-O學習小記(附源碼)
- 2016.03 [turingh] OSX內核加載mach-o流程分析
- 2016.03 [pediy] [原創]Mach-O動態連接的簡單分析(延時綁定)
- 2016.03 [turingh] Mach-O的動態鏈接相關知識
- 2016.03 [pediy] [原創]Mach-O格式分析
- 2016.03 [turingh] mach-o格式分析
- 2016.03 [pediy] [原創]dyld加載mach-o文件分析
- 2016.03 [turingh] dyld中mach-o文件加載的簡單分析
- 2014.09 [pediy] [原創]mach-o文件格式學習記錄
- 2014.09 [cerbero] Stripping symbols from a Mach-O
- 2014.08 [secureallthethings] Patching the Mach-o Format the Simple and Easy Way
- 2013.06 [cerbero] Mach-O support (including Universal Binaries and Apple Code Signatures)
- 2013.05 [volatility] MoVP II - 1.1 - Mach-O Address Space
- 2013.03 [reverse] OS.X/Boubou – Mach-O infector PoC source code
- 2012.02 [reverse] A little more fun with Mach-O headers: adding and spoofing a constructor
越獄
工具
- [ 5451星][3m] [Py] axi0mx/ipwndfu open-source jailbreaking tool for many iOS devices
- [ 5390星][6m] [C] pwn20wndstuff/undecimus unc0ver jailbreak for iOS 11.0 - 12.4
- [ 4248星][8m] [ObjC] alonemonkey/monkeydev CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak.
- [ 3221星][5m] [ObjC] naituw/ipapatch Patch iOS Apps, The Easy Way, Without Jailbreak.
- [ 1193星][15d] [JS] alonemonkey/frida-ios-dump pull decrypted ipa from jailbreak device
- 重複區段: DBI->Frida->工具->新添加的|
- [ 404星][1y] [C] coalfire-research/ios-11.1.2-15b202-jailbreak iOS 11.1.2 (15B202) Jailbreak
- [ 287星][7m] [Shell] 0ki/mikrotik-tools Tools for Mikrotik devices - universal jailbreak tool
- [ 237星][11m] [C] geosn0w/osirisjailbreak12 iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)
文章
- 2019.10 [talosintelligence] Checkrain fake iOS jailbreak leads to click fraud
- 2019.08 [elcomsoft] Why iOS 12.4 Jailbreak Is a Big Deal for the Law Enforcement
- 2019.05 [elcomsoft] Step by Step Guide to iOS Jailbreaking and Physical Acquisition
- 2019.02 [securityinnovation] iOS 12 Jailbreak
- 2019.02 [elcomsoft] iOS 12 Rootless Jailbreak
- 2019.01 [] IPC Voucher UaF Remote Jailbreak Stage 2
- 2019.01 [] IPC Voucher UaF Remote Jailbreak Stage 2 (EN)
- 2018.07 [elcomsoft] Using iOS 11.2-11.3.1 Electra Jailbreak for iPhone Physical Acquisition
- 2017.12 [venus] GreatiOSJailbreakMaterial - Only List the Most Useful Materials Here!
- 2015.10 [welivesecurity] New YiSpecter malware attacks iOS devices without jailbreak
- 2011.07 [sans] Jailbreakme Takes Advantage of 0-day PDF Vuln in Apple iOS Devices
- 2010.09 [securelist] iPhone Jailbreaking, Greenpois0n and SHAtter Trojans
- 2010.08 [trendmicro] The Security Implications of iOS Jailbreaking
- 2010.08 [trendmicro] Online iPhone Jailbreak Uses iOS Vulnerabilities
LLDB
工具
- [ 8031星][3m] [Py] facebook/chisel Chisel is a collection of LLDB commands to assist debugging iOS apps.
- [ 784星][3m] [C++] nodejs/llnode An lldb plugin for Node.js and V8, which enables inspection of JavaScript states for insights into Node.js processes and their core dumps.
- [ 636星][2m] [C++] apple/swift-lldb This is the version of LLDB that supports the Swift programming language & REPL.
- [ 492星][28d] [Rust] vadimcn/vscode-lldb A native debugger extension for VSCode based on LLDB
- [ 388星][2m] [C++] llvm-mirror/lldb Mirror of official lldb git repository located at
文章
- 2019.11 [4hou] 一款實用的macOS內核調試工具——LLDBagility
- 2019.11 [reverse] How to make LLDB a real debugger
- 2019.08 [trendmicro] LLDBFuzzer: Debugging and Fuzzing the Apple Kernel with LLDB Script
- 2019.06 [quarkslab] LLDBagility: practical macOS kernel debugging
- 2018.05 [freebuf] 如何在Electra越獄的設備上使用LLDB調試應用程序
- 2018.01 [reverse] lldbinit - Improving LLDB
- 2017.10 [venus] Native LLDB(v3.8) for iOS
- 2017.10 [pediy] [原創]4s的9.3.5嘗試Proteas大神的Native lldb
- 2017.07 [pediy] [[分享]]編譯mac下的lldb](https://bbs.pediy.com/thread-219717.htm)
- 2016.09 [pediy] [原創]lldb使用方法(學習筆記)
- 2015.01 [pediy] [原創]修正lldb-310及以後版本的Thumb反彙編問題
- 2014.08 [3xp10it] lldb命令
- 2014.08 [3xp10it] lldb命令
- 2014.05 [pediy] [原創]gikdbg v1.1攜手lldb震撼來襲,求內測夥伴!
- 2013.03 [it] iTunes debugging disabling ptrace with LLDB
- 2005.08 [pediy] [原創]借第一篇破文吹一下olldbg
- 2004.06 [pediy] 用olldbg破解,分析ocx控件
XCode
工具
- [ 6203星][3m] [ObjC] johnno1962/injectionforxcode Runtime Code Injection for Objective-C & Swift
- [ 2057星][19d] [ObjC] ios-control/ios-deploy Install and debug iPhone apps from the command line, without using Xcode
- [ 1606星][2m] [Swift] indragiek/inappviewdebugger A UIView debugger (like Reveal or Xcode) that can be embedded in an app for on-device view debugging
- [ 1409星][1m] [Swift] johnno1962/injectioniii Re-write of Injection for Xcode in (mostly) Swift4
- [ 572星][1m] [ObjC] hdb-li/lldebugtool LLDebugTool is a debugging tool for developers and testers that can help you analyze and manipulate data in non-xcode situations.
- [ 384星][3m] [JS] johnno1962/xprobeplugin Live Memory Browser for Apps & Xcode
文章
- 2019.07 [pewpewthespells] Using Xcode Targets
- 2019.07 [pewpewthespells] Xcode Build Locations
- 2019.07 [pewpewthespells] Migrating Code Signing Configurations to Xcode 8
- 2019.06 [pewpewthespells] Xcode SDKs
- 2019.04 [pewpewthespells] Xcode Build Settings Reference
- 2019.03 [pewpewthespells] Xcode DerivedData Hashes
- 2019.02 [pewpewthespells] The Xcode Build System
- 2019.02 [pewpewthespells] Managing Xcode
- 2019.02 [hakin9] Building an iOS App Without Xcode's Build System by Vojta Stavik
- 2018.11 [CodeColorist] Xcode Instruments for iOS: reversing and abuse
- 2018.06 [applehelpwriter] Xcode 10: where did snippets go?
- 2018.05 [freecodecamp] How to convert your Xcode plugins to Xcode extensions
- 2017.07 [pediy] [原創] iOSOpenDev修改版MonkeyDev,最新theos和Xcode 9測試通過!
- 2017.06 [alonemonkey] 0x01 Xcode調試一個LLVM Pass
- 2017.03 [360] XcodeGhost或重出江湖,Google Play大量APP被植入惡意代碼
- 2016.05 [rachelbythebay] Go upgrade Xcode. Fix your git security hole.
- 2015.12 [metricpanda] Compiling NASM Assembly with Xcode in a C/C++ Project
- 2015.12 [360] Xcode 7 Bitcode的工作流程及安全性評估
- 2015.12 [freebuf] Xcode 7 Bitcode的工作流程及安全性評估
- 2015.11 [freebuf] XcodeGhost S:變種帶來的又一波影響
工具
新添加的
- [ 10966星][10d] [ObjC] flipboard/flex An in-app debugging and exploration tool for iOS
- [ 5775星][4m] [ObjC] square/ponydebugger Remote network and data debugging for your native iOS app using Chrome Developer Tools
- [ 4663星][1m] [C] google/ios-webkit-debug-proxy A DevTools proxy (Chrome Remote Debugging Protocol) for iOS devices (Safari Remote Web Inspector).
- [ 4397星][12d] [Swift] signalapp/signal-ios A private messenger for iOS.
- [ 3686星][4m] [C] facebook/fishhook A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS.
- [ 3414星][2m] icodesign/potatso Potatso is an iOS client that implements different proxies with the leverage of NetworkExtension framework in iOS 10+.
- [ 3327星][3m] [Swift] yagiz/bagel a little native network debugging tool for iOS
- [ 3071星][10m] [JS] jipegit/osxauditor OS X Auditor is a free Mac OS X computer forensics tool
- [ 2867星][12d] [ObjC] facebook/idb idb is a flexible command line interface for automating iOS simulators and devices
- [ 2795星][24d] [Swift] kasketis/netfox A lightweight, one line setup, iOS / OSX network debugging library!
- [ 2753星][1m] [Makefile] theos/theos A cross-platform suite of tools for building and deploying software for iOS and other platforms.
- [ 2733星][26d] [ObjC] dantheman827/ios-app-signer This is an app for OS X that can (re)sign apps and bundle them into ipa files that are ready to be installed on an iOS device.
- [ 2708星][2m] [ObjC] kjcracks/clutch Fast iOS executable dumper
- [ 1801星][1y] aozhimin/ios-monitor-platform
- [ 1695星][6m] [Py] yelp/osxcollector A forensic evidence collection & analysis toolkit for OS X
- [ 1683星][2m] [Swift] pmusolino/wormholy iOS network debugging, like a wizard ?♂️
- [ 1642星][7m] [Objective-C++] tencent/oomdetector OOMDetector is a memory monitoring component for iOS which provides you with OOM monitoring, memory allocation monitoring, memory leak detection and other functions.
- [ 1630星][1m] ivrodriguezca/re-ios-apps A completely free, open source and online course about Reverse Engineering iOS Applications.
- [ 1442星][28d] [ObjC] nabla-c0d3/ssl-kill-switch2 Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps
- [ 1299星][6m] [JS] feross/spoof Easily spoof your MAC address in macOS, Windows, & Linux!
- [ 1291星][1m] [JS] icymind/vrouter 一個基於VirtualBox 和openwrt 構建的項目, 旨在實現macOS / Windows 平台的透明代理.
- [ 1253星][2m] [Vue] chaitin/passionfruit iOSapp 黑盒評估工具。功能豐富,自帶基於web的GUI
- [ 1252星][17d] michalmalik/osx-re-101 OSX/iOS逆向資源收集
- [ 1239星][8d] [C] datatheorem/trustkit Easy SSL pinning validation and reporting for iOS, macOS, tvOS and watchOS.
- [ 1215星][16d] [YARA] horsicq/detect-it-easy Program for determining types of files for Windows, Linux and MacOS.
- [ 1113星][1y] [ObjC] neoneggplant/eggshell iOS/macOS/Linux Remote Administration Tool
- [ 1001星][2m] [ObjC] lmirosevic/gbdeviceinfo Detects the hardware, software and display of the current iOS or Mac OS X device at runtime.
- [ 907星][4m] [ObjC] ptoomey3/keychain-dumper A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken
- [ 866星][16d] [ObjC] meitu/mthawkeye Profiling / Debugging assist tools for iOS. (Memory Leak, OOM, ANR, Hard Stalling, Network, OpenGL, Time Profile ...)
- [ 840星][9d] [JS] cypress-io/cypress-example-recipes Various recipes for testing common scenarios with Cypress
- [ 796星][13d] [Shell] aqzt/kjyw 快捷運維,代號kjyw,項目基於shell、python,運維腳本工具庫,收集各類運維常用工具腳本,實現快速安裝nginx、mysql、php、redis、nagios、運維經常使用的腳本等等...
- [ 662星][1y] [Py] deepzec/bad-pdf create malicious PDF file to steal NTLM(NTLMv1/NTLMv2) Hashes from windows machines
- [ 651星][9m] [ObjC] chenxiancai/stcobfuscator iOS全局自動化代碼混淆工具!支持cocoapod組件代碼一併混淆,完美避開hardcode方法、靜態庫方法和系統庫方法!
- [ 604星][2m] siguza/ios-resources Useful resources for iOS hacking
- [ 500星][27d] [Swift] google/science-journal-ios Use the sensors in your mobile devices to perform science experiments. Science doesn't just happen in the classroom or lab—tools like Science Journal let you see how the world works with just your phone.
- [ 482星][1y] [Swift] icepa/icepa iOS system-wide VPN based Tor client
- [ 478星][15d] pixelcyber/thor HTTP Sniffer/Capture on iOS for Network Debug & Inspect.
- [ 471星][8m] [C++] everettjf/machoexplorer MachO文件查看器,支持Windows和macOS
- [ 462星][15d] [Java] dsheirer/sdrtrunk A cross-platform java application for decoding, monitoring, recording and streaming trunked mobile and related radio protocols using Software Defined Radios (SDR). Website:
- [ 430星][11m] captainarash/the_holy_book_of_x86 A simple guide to x86 architecture, assembly, memory management, paging, segmentation, SMM, BIOS....
- [ 396星][4m] ansjdnakjdnajkd/ios iOS滲透測試最有用的工具
- [ 382星][11m] [C] coolstar/electra1131 electra1131: Electra for iOS 11.0 - 11.3.1
- [ 375星][29d] [Swift] justeat/justlog JustLog brings logging on iOS to the next level. It supports console, file and remote Logstash logging via TCP socket with no effort. Support for logz.io available.
- [ 371星][18d] [Shell] matthewpierson/1033-ota-downgrader First ever tool to downgrade ANY iPhone 5s, ANY iPad Air and (almost any) iPad Mini 2 to 10.3.3 with OTA blobs + checkm8!
- [ 349星][19d] [C] jedisct1/swift-sodium Safe and easy to use crypto for iOS and macOS
- [ 346星][4m] [TS] bacher09/pwgen-for-bios Password generator for BIOS
- [ 340星][3m] [C] trailofbits/cb-multios DARPA Challenges Sets for Linux, Windows, and macOS
- [ 322星][2m] [ObjC] auth0/simplekeychain A Keychain helper for iOS to make it very simple to store/obtain values from iOS Keychain
- [ 310星][28d] [Swift] securing/iossecuritysuite iOS platform security & anti-tampering Swift library
- [ 263星][14d] [ObjC] strongbox-password-safe/strongbox A KeePass/Password Safe Client for iOS and OS X
- [ 247星][1m] [C++] s0uthwest/futurerestore iOS upgrade and downgrade tool utilizing SHSH blobs
- [ 244星][7m] [JS] we11cheng/wcshadowrocket iOS Shadowrocket(砸殼重簽,僅供參考,添加節點存在問題)。另一個fq項目potatso源碼參見:
- [ 239星][1y] [ObjC] lmirosevic/gbping Highly accurate ICMP Ping controller for iOS
- [ 238星][4m] [Swift] shadowsocksr-live/ishadowsocksr ShadowsocksR for iOS, come from
- [ 223星][12m] [AppleScript] lifepillar/csvkeychain Import/export between Apple Keychain.app and plain CSV file.
- [ 219星][6m] [ObjC] rickyzhang82/tethering Proxy and DNS Server on iOS
- [ 213星][8m] [C] owasp/igoat OWASP iGoat - A Learning Tool for iOS App Pentesting and Security by Swaroop Yermalkar
- [ 211星][13d] [TS] bevry/getmac Get the mac address of the current machine you are on via Node.js
- [ 203星][5m] [Py] googleprojectzero/ios-messaging-tools several tools Project Zero uses to test iPhone messaging
- [ 200星][6m] [PS] mkellerman/invoke-commandas Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects.
文章&&視頻
新添加
Cuckoo
工具
新添加的
- [ 4042星][3m] [JS] cuckoosandbox/cuckoo Cuckoo Sandbox is an automated dynamic malware analysis system
- [ 308星][2m] [Py] hatching/vmcloak Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.
- [ 238星][7m] [Py] cuckoosandbox/community Repository of modules and signatures contributed by the community
- [ 236星][4m] [Py] brad-sp/cuckoo-modified Modified edition of cuckoo
- [ 225星][1y] [PHP] cuckoosandbox/monitor The new Cuckoo Monitor.
- [ 220星][4m] [Shell] blacktop/docker-cuckoo Cuckoo Sandbox Dockerfile
文章&&視頻
- 2019.04 [eforensicsmag] How to Integrate RSA Malware Analysis with Cuckoo Sandbox | By Luiz Henrique Borges
- 2019.02 [thehive] Cortex-Analyzers 1.15.3 get ready for URLhaus and Cuckoo
- 2018.07 [360] 一例IRC Bot針對Cuckoo沙箱的猥瑣對抗分析
- 2018.05 [trustedsec] Malware Analysis is for the (Cuckoo) Birds – Working with Proxmox
- 2018.05 [trustedsec] Protected: Malware Analysis is for the (Cuckoo) Birds
- 2018.05 [trustedsec] Protected: Malware Analysis is for the (Cuckoo) Birds – Cuckoo Installation Notes for Debian
- 2018.04 [ly0n] Automating malware analysis, cuckoo api + postfix
- 2018.04 [ly0n] Automating malware analysis, cuckoo api + postfix
- 2018.04 [nviso] Painless Cuckoo Sandbox Installation
- 2018.03 [rapid7] Next Threat Intel Book Club 4/5: Recapping The Cuckoo's Egg
- 2018.03 [ensurtec] Cuckoo Sandbox Setup Tutorial
- 2018.01 [fortinet] Prevalent Threats Targeting Cuckoo Sandbox Detection and Our Mitigation
- 2018.01 [fortinet] Prevalent Threats Targeting Cuckoo Sandbox Detection and Our Mitigation
- 2017.09 [360] 在細節中捕捉惡魔:提升Cuckoo沙箱捕獲惡意Office樣本行為的能力
- 2017.08 [trustwave] Cuckoo & Linux Subsystem: Some Love for Windows 10
- 2017.08 [n0where] Automated Android Malware Analysis: CuckooDroid
- 2017.05 [robertputt] Basic Malware Analysis with Cuckoo Sandbox
- 2017.05 [rastamouse] Playing with Cuckoo
- 2017.04 [mcafee] OpenDXL Case Study: Sandbox Mania featuring Cuckoo and Wildfire
- 2016.11 [tribalchicken] Guide: Cuckoo Sandbox on FreeBSD
DBI
DynamoRIO
工具
DynamoRIO
- [ 1388星][12d] [C] dynamorio/drmemory Memory Debugger for Windows, Linux, Mac, and Android
- [ 1228星][12d] [C] dynamorio/dynamorio Dynamic Instrumentation Tool Platform
新添加的
- [ 1364星][3m] [C] googleprojectzero/winafl A fork of AFL for fuzzing Windows binaries
- [ 249星][5m] [C] ampotos/dynstruct Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone
與其他工具交互
文章&&視頻
- 2019.10 [freebuf] DrSemu:基於動態行為的惡意軟件檢測與分類工具
- 2019.06 [freebuf] Functrace:使用DynamoRIO追踪函數調用
- 2019.01 [360] 深入淺出——基於DynamoRIO的strace和ltrace
- 2018.08 [n0where] Dynamic API Call Tracer for Windows and Linux Applications: Drltrace
- 2018.07 [topsec] 動態二進制修改(Dynamic Binary Instrumentation)入門:Pin、DynamoRIO、Frida
- 2017.11 [SECConsult] The Art of Fuzzing - Demo 10: In-memory Fuzzing HashCalc using DynamoRio
- 2017.11 [SECConsult] The Art of Fuzzing - Demo 6: Extract Coverage Information using DynamoRio
- 2017.04 [pediy] [原創]通過Selife學習使用DynamoRIO動態插樁
- 2016.11 [360] “Selfie”:利用DynamoRIO實現自修改代碼自動脫殼的神器
- 2016.09 [securitygossip] Practical Memory Checking With Dr. Memory
- 2016.09 [sjtu] Practical Memory Checking With Dr. Memory
- 2016.08 [n0where] Dynamic Instrumentation Tool Platform: DynamoRIO
- 2014.01 [dustri] Memory debugging under Windows with drmemory
- 2012.10 [redplait] building dynamorio
- 2011.06 [redplait] dynamorio
IntelPin
工具
新添加的
- [ 299星][2m] [C] vusec/vuzzer depends heavily on a modeified version of DataTracker, which in turn depends on LibDFT pintool.
與其他工具交互
未分類
- [ 943星][1y] [Py] gaasedelen/lighthouse 從DBI中收集代碼覆蓋情況,在IDA/Binja中映射、瀏覽、查看
- 重複區段: IDA->插件->調試->DBI數據|DBI->Frida->工具->與其他工具交互->IDA |DBI->Frida->工具->與其他工具交互->BinaryNinja |
- coverage-frida 使用Frida收集信息
- coverage-pin 使用Pin收集覆蓋信息
- 插件支持IDA和BinNinja
文章&&視頻
Frida
工具
Frida
- [ 4516星][13d] [Makefile] frida/frida Clone this repo to build Frida
新添加的
- [ 1193星][15d] [JS] alonemonkey/frida-ios-dump pull decrypted ipa from jailbreak device
- [ 895星][5m] [JS] dpnishant/appmon 用於監視和篡改本地macOS,iOS和android應用程序的系統API調用的自動化框架。基於Frida。
- [ 645星][16d] [Py] igio90/dwarf Full featured multi arch/os debugger built on top of PyQt5 and frida
- [ 559星][1m] [JS] nccgroup/house 運行時手機App 分析工具包, 帶Web GUI
- [ 513星][1m] [JS] iddoeldor/frida-snippets Hand-crafted Frida examples
- [ 422星][1y] [Py] dstmath/frida-unpack 基於Frida的脫殼工具
- [ 420星][13d] [C] frida/frida-python Frida Python bindings
- [ 332星][15d] [JS] chichou/bagbak Yet another frida based iOS dumpdecrypted, works on iOS 13 with checkra1n and supports decrypting app extensions
- [ 321星][1m] [C] frida/frida-core Frida core library intended for static linking into bindings
- [ 308星][4m] [JS] smartdone/frida-scripts 一些frida腳本
- [ 283星][8m] [Py] nightbringer21/fridump A universal memory dumper using Frida
- [ 243星][19d] [JS] frenchyeti/dexcalibur Dynamic binary instrumentation tool designed for Android application and powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
- [ 228星][13d] [C] frida/frida-gum Low-level code instrumentation library used by frida-core
與其他工具交互
未分類
- [ 584星][1y] [Java] federicodotta/brida The new bridge between Burp Suite and Frida!
IDA
- [ 943星][1y] [Py] gaasedelen/lighthouse 從DBI中收集代碼覆蓋情況,在IDA/Binja中映射、瀏覽、查看
- 重複區段: IDA->插件->調試->DBI數據|DBI->IntelPin->工具->與其他工具交互->未分類|DBI->Frida->工具->與其他工具交互->BinaryNinja |
- coverage-frida 使用Frida收集信息
- coverage-pin 使用Pin收集覆蓋信息
- 插件支持IDA和BinNinja
BinaryNinja
- [ 943星][1y] [Py] gaasedelen/lighthouse 從DBI中收集代碼覆蓋情況,在IDA/Binja中映射、瀏覽、查看
- 重複區段: IDA->插件->調試->DBI數據|DBI->IntelPin->工具->與其他工具交互->未分類|DBI->Frida->工具->與其他工具交互->IDA |
- coverage-frida 使用Frida收集信息
- coverage-pin 使用Pin收集覆蓋信息
- 插件支持IDA和BinNinja
Radare2
- [ 378星][27d] [JS] nowsecure/r2frida Radare2 and Frida better together.
- 重複區段: Radare2->插件->與其他工具交互->未分類|
文章&&視頻
- 2019.12 [xakcop] Cloning RSA tokens with Frida
- 2019.09 [freebuf] Dwarf:一款基於Pyqt5和Frida的逆向分析調試工具
- 2019.06 [two06] Fun With Frida
- 2019.05 [nsfocus] 基於Frida進行通信數據“解密”
- 2019.05 [nsfocus] Frida應用基礎及APP https證書驗證破解
- 2019.05 [nsfocus] Frida應用基礎及APP https證書驗證破解
- 2019.05 [nsfocus] Frida應用基礎及APP https證書驗證破解
- 2019.05 [CodeColorist] Trace child process with frida on macOS
- 2019.05 [360] FRIDA腳本系列(四)更新篇:幾個主要機制的大更新
- 2019.03 [360] FRIDA腳本系列(三)超神篇:百度AI“調教”抖音AI
- 2019.03 [securityinnovation] Setting up Frida Without Jailbreak on the Latest iOS 12.1.4 Device
- 2019.02 [nowsecure] Frida 12.3 Debuts New Crash Reporting Feature
- 2019.01 [fuzzysecurity] Windows Hacking 之:ApplicationIntrospection & Hooking With Frida
- 2019.01 [fuping] 安卓APP測試之HOOK大法-Frida篇
- 2019.01 [360] FRIDA腳本系列(二)成長篇:動靜態結合逆向WhatsApp
- 2019.01 [pediy] [原創]介召幾個frida在安卓逆向中使用的腳本以及延時Hook手法
- 2018.12 [360] FRIDA腳本系列(一)入門篇:在安卓8.1上dump藍牙接口和實例
- 2018.12 [pediy] [原創]CVE-2017-4901 VMware虛擬機逃逸漏洞分析【Frida Windows實例】
- 2018.12 [freebuf] 一篇文章帶你領悟Frida的精髓(基於安卓8.1)
- 2018.12 [pediy] [原創] Frida操作手冊-Android環境準備
QBDI
工具
- [ 578星][1y] [C++] qbdi/qbdi A Dynamic Binary Instrumentation framework based on LLVM.
文章&&視頻
- 2019.09 [quarkslab] QBDI 0.7.0
- 2019.07 [freebuf] 教你如何使用QBDI動態二進制檢測框架
- 2019.06 [quarkslab] Android Native Library Analysis with QBDI
- 2018.01 [quarkslab] Slaying Dragons with QBDI
- 2018.01 [pentesttoolz] QBDI – QuarkslaB Dynamic binary Instrumentation
- 2018.01 [n0where] QuarkslaB Dynamic binary Instrumentation: QBDI
其他
工具
文章&&視頻
- 2018.08 [4hou] 動態二進制插樁的原理和基本實現過程(一)
其他
文章-新添加的
工具-新添加的
- [ 19766星][3m] [Jupyter Notebook] camdavidsonpilon/probabilistic-programming-and-bayesian-methods-for-hackers aka "Bayesian Methods for Hackers": An introduction to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view. All in pure Python ;)
- [ 14349星][2m] [Py] corentinj/real-time-voice-cloning Clone a voice in 5 seconds to generate arbitrary speech in real-time
- [ 11402星][10d] [Java] oracle/graal Run Programs Faster Anywhere
- [ 11213星][2m] [Jupyter Notebook] selfteaching/the-craft-of-selfteaching One has no future if one couldn't teach themself.
- [ 10378星][11d] [Go] goharbor/harbor An open source trusted cloud native registry project that stores, signs, and scans content.
- [ 7748星][10d] [Go] git-lfs/git-lfs Git extension for versioning large files
- [ 7020星][14d] [Go] nats-io/nats-server High-Performance server for NATS, the cloud native messaging system.
- [ 6894星][2m] [Go] sqshq/sampler A tool for shell commands execution, visualization and alerting. Configured with a simple YAML file.
- [ 6454星][9m] [HTML] open-power-workgroup/hospital OpenPower工作組收集匯總的醫院開放數據
- [ 6353星][2m] [Py] seatgeek/fuzzywuzzy Fuzzy String Matching in Python
- [ 6055星][7m] [JS] haotian-wang/google-access-helper 谷歌訪問助手破解版
- [ 5876星][3m] [Gnuplot] nasa-jpl/open-source-rover A build-it-yourself, 6-wheel rover based on the rovers on Mars!
- [ 5829星][7m] [JS] sindresorhus/fkill-cli Fabulously kill processes. Cross-platform.
- [ 5753星][18d] [Go] casbin/casbin An authorization library that supports access control models like ACL, RBAC, ABAC in Golang
- [ 5751星][9m] [C] xoreaxeaxeax/movfuscator C編譯器,編譯的二進製文件只有1個代碼塊。
- [ 5717星][28d] [JS] swagger-api/swagger-editor Swagger Editor
- [ 5420星][12d] [Py] mlflow/mlflow Open source platform for the machine learning lifecycle
- [ 5229星][4m] [Py] ytisf/thezoo A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
- [ 5226星][13d] [Shell] denisidoro/navi An interactive cheatsheet tool for the command-line
- [ 5116星][11d] [ASP] hq450/fancyss fancyss is a project providing tools to across the GFW on asuswrt/merlin based router.
- [ 5007星][2m] [Py] snare/voltron A hacky debugger UI for hackers
- [ 4857星][13d] [Go] gcla/termshark A terminal UI for tshark, inspired by Wireshark
- [ 4810星][8m] [Py] 10se1ucgo/disablewintracking Uses some known methods that attempt to minimize tracking in Windows 10
- [ 4747星][8d] [C++] paddlepaddle/paddle-lite Multi-platform high performance deep learning inference engine (『飛槳』多平台高性能深度學習預測引擎)
- [ 4651星][13d] powershell/win32-openssh Win32 port of OpenSSH
- [ 4610星][1y] [C] upx/upx UPX - the Ultimate Packer for eXecutables
- [ 4600星][12m] [Py] ecthros/uncaptcha2 defeating the latest version of ReCaptcha with 91% accuracy
- [ 4597星][12d] [C++] mozilla/rr 記錄與重放App的調試執行過程
- [ 4541星][4m] [TS] apis-guru/graphql-voyager
- [ 4352星][1y] [Py] lennylxx/ipv6-hosts Fork of
- [ 4314星][15d] [Rust] timvisee/ffsend Easily and securely share files from the command line
- [ 4258星][12m] [JS] butterproject/butter-desktop All the free parts of Popcorn Time
- [ 4062星][3m] [Java] jesusfreke/smali smali/baksmali
- [ 4060星][2m] [JS] sigalor/whatsapp-web-reveng WhatsApp Web API逆向與重新實現
- [ 4003星][11d] [Go] dexidp/dex OpenID Connect Identity (OIDC) and OAuth 2.0 Provider with Pluggable Connectors
- [ 3980星][1m] [Rust] svenstaro/genact a nonsense activity generator
- [ 3960星][11d] [Py] angr/angr A powerful and user-friendly binary analysis platform!
- [ 3954星][16d] [Go] eranyanay/1m-go-websockets handling 1M websockets connections in Go
- [ 3939星][15d] [C] aquynh/capstone Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
- [ 3908星][12d] [C++] baldurk/renderdoc RenderDoc is a stand-alone graphics debugging tool.
- [ 3844星][2m] [ObjC] sveinbjornt/sloth Mac app that shows all open files, directories and sockets in use by all running processes. Nice GUI for lsof.
- [ 3773星][25d] jjqqkk/chromium Chromium browser with SSL VPN. Use this browser to unblock websites.
- [ 3768星][2m] [Go] microsoft/ethr Ethr is a Network Performance Measurement Tool for TCP, UDP & HTTP.
- [ 3749星][12d] [Go] hashicorp/consul-template Template rendering, notifier, and supervisor for
- [ 3690星][21d] [JS] lesspass/lesspass
- [ 3688星][29d] [HTML] hamukazu/lets-get-arrested This project is intended to protest against the police in Japan
- [ 3627星][26d] [HTML] consensys/smart-contract-best-practices A guide to smart contract security best practices
- [ 3608星][9d] [Pascal] cheat-engine/cheat-engine Cheat Engine. A development environment focused on modding
- [ 3538星][5m] [Shell] chengr28/revokechinacerts Revoke Chinese certificates.
- [ 3505星][16d] [C] cyan4973/xxhash Extremely fast non-cryptographic hash algorithm
- [ 3451星][19d] [C] mikebrady/shairport-sync AirPlay audio player. Shairport Sync adds multi-room capability with Audio Synchronisation
- [ 3306星][19d] [C] microsoft/windows-driver-samples This repo contains driver samples prepared for use with Microsoft Visual Studio and the Windows Driver Kit (WDK). It contains both Universal Windows Driver and desktop-only driver samples.
- [ 3295星][15d] [JS] koenkk/zigbee2mqtt Zigbee
- [ 3289星][15d] [C] virustotal/yara The pattern matching swiss knife
- [ 3280星][29d] [Java] oldmanpushcart/greys-anatomy Java診斷工具
- [ 3243星][14d] [Shell] gfw-breaker/ssr-accounts 一鍵部署Shadowsocks服務;免費Shadowsocks賬號分享;免費SS賬號分享; 翻牆;無界,自由門,SquirrelVPN
- [ 3233星][25d] [C] tmate-io/tmate Instant Terminal Sharing
- [ 3219星][2m] [TS] google/incremental-dom An in-place DOM diffing library
- [ 3202星][1y] [Shell] toyodadoubi/doubi 一個逗比寫的各種逗比腳本~
- [ 3188星][11d] [C] meetecho/janus-gateway Janus WebRTC Server
- [ 3131星][2m] [CSS] readthedocs/sphinx_rtd_theme Sphinx theme for readthedocs.org
- [ 3129星][13d] [C] qemu/qemu Official QEMU mirror. Please see
- [ 3120星][11d] [Go] tencent/bk-cmdb 藍鯨智雲配置平台(BlueKing CMDB)
- [ 3108星][1m] [C] unicorn-engine/unicorn Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
- [ 3052星][4m] [C++] google/robotstxt The repository contains Google's robots.txt parser and matcher as a C++ library (compliant to C++11).
- [ 2993星][18d] [Py] quantaxis/quantaxis 支持任務調度分佈式部署的股票/期貨/自定義市場數據/回測/模擬/交易/可視化純本地PAAS量化解決方案
- [ 2980星][14d] [ObjC] google/santa 用於Mac系統的二進製文件白名單/黑名單系統
- [ 2948星][1m] [C] libfuse/sshfs A network filesystem client to connect to SSH servers
- [ 2898星][8m] [C] phc/phc-winner-argon2 The password hash Argon2, winner of PHC
- [ 2872星][14d] [C] lxc/lxc LXC - Linux Containers
- [ 2854星][1m] [Py] espressif/esptool ESP8266 and ESP32 serial bootloader utility
- [ 2848星][6m] [Py] instantbox/instantbox Get a clean, ready-to-go Linux box in seconds.
- [ 2833星][2m] [Assembly] cirosantilli/x86-bare-metal-examples 幾十個用於學習x86 系統編程的小型操作系統
- [ 2815星][20d] [C] processhacker/processhacker A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
- [ 2808星][10m] [Py] plasma-disassembler/plasma Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
- [ 2789星][13d] [C++] qtox/qtox qTox is a chat, voice, video, and file transfer IM client using the encrypted peer-to-peer Tox protocol.
- [ 2772星][2m] [JS] trufflesuite/ganache-cli Fast Ethereum RPC client for testing and development
- [ 2760星][10d] [TS] webhintio/hint
- [ 2718星][3m] [Py] drivendata/cookiecutter-data-science A logical, reasonably standardized, but flexible project structure for doing and sharing data science work.
- [ 2687星][11d] [Go] adguardteam/adguardhome Network-wide ads & trackers blocking DNS server
- [ 2631星][8m] leandromoreira/linux-network-performance-parameters Learn where some of the network sysctl variables fit into the Linux/Kernel network flow
- [ 2627星][23d] [JS] popcorn-official/popcorn-desktop Popcorn Time is a multi-platform, free software BitTorrent client that includes an integrated media player. Desktop ( Windows / Mac / Linux ) a Butter-Project Fork
- [ 2621星][2m] pditommaso/awesome-pipeline A curated list of awesome pipeline toolkits inspired by Awesome Sysadmin
- [ 2619星][2m] [Swift] zhuhaow/nekit A toolkit for Network Extension Framework
- [ 2615星][1m] [JS] knownsec/kcon KCon is a famous Hacker Con powered by Knownsec Team.
- [ 2587星][10d] [C] esnet/iperf A TCP, UDP, and SCTP network bandwidth measurement tool
- [ 2535星][3m] [Java] jboss-javassist/javassist Java bytecode engineering toolkit
- [ 2478星][11m] [JS] weixin/miaow A set of plugins for Sketch include drawing links & marks, UI Kit & Color sync, font & text replacing.
- [ 2474星][25d] [JS] vitaly-t/pg-promise PostgreSQL interface for Node.js
- [ 2391星][21d] [Java] mock-server/mockserver MockServer enables easy mocking of any system you integrate with via HTTP or HTTPS with clients written in Java, JavaScript and Ruby. MockServer also includes a proxy that introspects all proxied traffic including encrypted SSL traffic and supports Port Forwarding, Web Proxying (ie HTTP proxy), HTTPS Tunneling Proxying (using HTTP CONNECT) and…
- [ 2364星][10d] [C] domoticz/domoticz monitor and configure various devices like: Lights, Switches, various sensors/meters like Temperature, Rain, Wind, UV, Electra, Gas, Water and much more
- [ 2345星][4m] [Go] vuvuzela/vuvuzela Private messaging system that hides metadata
- [ 2344星][16d] [C] tsl0922/ttyd Share your terminal over the web
- [ 2340星][2m] [JS] pa11y/pa11y Pa11y is your automated accessibility testing pal
- [ 2305星][2m] [C] moby/hyperkit A toolkit for embedding hypervisor capabilities in your application
- [ 2286星][1m] [JS] talkingdata/inmap 大數據地理可視化
- [ 2260星][13d] dumb-password-rules/dumb-password-rules Shaming sites with dumb password rules.
- [ 2217星][14d] [Go] google/mtail extract whitebox monitoring data from application logs for collection in a timeseries database
- [ 2214星][18d] getlantern/lantern-binaries Lantern installers binary downloads.
- [ 2211星][1m] [C++] google/bloaty Bloaty McBloatface: a size profiler for binaries
- [ 2194星][13d] [C] armmbed/mbedtls An open source, portable, easy to use, readable and flexible SSL library
- [ 2137星][19d] [Assembly] pret/pokered disassembly of Pokémon Red/Blue
- [ 2132星][20d] goq/telegram-list List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов
- [ 2093星][10d] [C] flatpak/flatpak Linux application sandboxing and distribution framework
- [ 2092星][26d] swiftonsecurity/sysmon-config Sysmon configuration file template with default high-quality event tracing
- [ 2080星][2m] [Go] theupdateframework/notary Notary is a project that allows anyone to have trust over arbitrary collections of data
- [ 2053星][4m] [Go] maxmcd/webtty Share a terminal session over WebRTC
- [ 2053星][24d] [C#] mathewsachin/captura Capture Screen, Audio, Cursor, Mouse Clicks and Keystrokes
- [ 2052星][13d] [C++] openthread/openthread OpenThread released by Google is an open-source implementation of the Thread networking protocol
- [ 2031星][10m] [C] dekunukem/nintendo_switch_reverse_engineering A look at inner workings of Joycon and Nintendo Switch
- [ 2003星][2m] [C++] asmjit/asmjit Complete x86/x64 JIT and AOT Assembler for C++
- [ 1998星][2m] [Swift] github/softu2f Software U2F authenticator for macOS
- [ 1955星][11d] [Go] solo-io/gloo An Envoy-Powered API Gateway
- [ 1949星][17d] [C] microsoft/procdump-for-linux Linux 版本的ProcDump
- [ 1930星][22d] [C++] mhammond/pywin32 Python for Windows (pywin32) Extensions
- [ 1907星][18d] [Go] minishift/minishift Run OpenShift 3.x locally
- [ 1899星][25d] [C++] acidanthera/lilu Arbitrary kext and process patching on macOS
- [ 1877星][25d] [Java] adoptopenjdk/jitwatch Log analyser / visualiser for Java HotSpot JIT compiler. Inspect inlining decisions, hot methods, bytecode, and assembly. View results in the JavaFX user interface.
- [ 1863星][10d] [C++] pytorch/glow Compiler for Neural Network hardware accelerators
- [ 1859星][12m] [C++] googlecreativelab/open-nsynth-super Open NSynth Super is an experimental physical interface for the NSynth algorithm
- [ 1854星][19d] [C] github/glb-director GitHub Load Balancer Director and supporting tooling.
- [ 1852星][1y] [Py] jinnlynn/genpac PAC/Dnsmasq/Wingy file Generator, working with gfwlist, support custom rules.
- [ 1851星][1y] [Java] yeriomin/yalpstore Download apks from Google Play Store
- [ 1848星][9m] [Py] netflix-skunkworks/stethoscope Personalized, user-focused recommendations for employee information security.
- [ 1846星][3m] [C] retroplasma/earth-reverse-engineering Reversing Google's 3D satellite mode
- [ 1837星][3m] [Go] influxdata/kapacitor Open source framework for processing, monitoring, and alerting on time series data
- [ 1827星][13d] [Py] trailofbits/manticore 動態二進制分析工具,支持符號執行(symbolic execution)、污點分析(taint analysis)、運行時修改。
- [ 1816星][29d] [Go] gdamore/tcell Tcell is an alternate terminal package, similar in some ways to termbox, but better in others.
- [ 1786星][1m] [C++] apitrace/apitrace Tools for tracing OpenGL, Direct3D, and other graphics APIs
- [ 1781星][26d] [PHP] ezyang/htmlpurifier Standards compliant HTML filter written in PHP
- [ 1779星][29d] 17mon/china_ip_list
- [ 1761星][1y] [JS] puppeteer/examples Use case-driven examples for using Puppeteer and headless chrome
- [ 1761星][13d] [C] google/wuffs Wrangling Untrusted File Formats Safely
- [ 1756星][16d] [PHP] wordpress/wordpress-coding-standards PHP_CodeSniffer rules (sniffs) to enforce WordPress coding conventions
- [ 1727星][8d] [TSQL] brentozarultd/sql-server-first-responder-kit sp_Blitz, sp_BlitzCache, sp_BlitzFirst, sp_BlitzIndex, and other SQL Server scripts for health checks and performance tuning.
- [ 1722星][4m] [Py] anorov/cloudflare-scrape A Python module to bypass Cloudflare's anti-bot page.
- [ 1714星][1m] [Go] hashicorp/memberlist Golang package for gossip based membership and failure detection
- [ 1698星][21d] [C++] microsoft/detours Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.
- [ 1676星][10d] [Java] apache/geode Apache Geode
- [ 1672星][7m] [C] easyhook/easyhook The reinvention of Windows API Hooking
- [ 1668星][3m] [Py] boppreh/keyboard Hook and simulate global keyboard events on Windows and Linux.
- [ 1659星][25d] [JS] tylerbrock/mongo-hacker MongoDB Shell Enhancements for Hackers
- [ 1650星][13d] sarojaba/awesome-devblog 어썸데브블로그. 국내개발블로그모음(only 실명으로).
- [ 1637星][12d] [JS] efforg/privacybadger Privacy Badger is a browser extension that automatically learns to block invisible trackers.
- [ 1624星][9m] [JS] localtunnel/server server for localtunnel.me
- [ 1620星][16d] [C++] lief-project/lief Library to Instrument Executable Formats
- [ 1592星][2m] [ObjC] ealeksandrov/provisionql Quick Look plugin for apps and provisioning profile files
- [ 1584星][1y] [C] qihoo360/phptrace A tracing and troubleshooting tool for PHP scripts.
- [ 1572星][1m] [C] codahale/bcrypt-ruby Ruby binding for the OpenBSD bcrypt() password hashing algorithm, allowing you to easily store a secure hash of your users' passwords.
- [ 1562星][1m] [C] p-gen/smenu Terminal utility that reads words from standard input or from a file and creates an interactive selection window just below the cursor. The selected word(s) are sent to standard output for further processing.
- [ 1562星][19d] [Java] gchq/gaffer A large-scale entity and relation database supporting aggregation of properties
- [ 966星][7m] [PHP] jenssegers/optimus id transformation With this library, you can transform your internal id's to obfuscated integers based on Knuth's integer has和
- [ 906星][7m] [C++] dfhack/dfhack Memory hacking library for Dwarf Fortress and a set of tools that use it
- [ 895星][12m] [JS] levskaya/jslinux-deobfuscated An old version of Mr. Bellard's JSLinux rewritten to be human readable, hand deobfuscated and annotated.
- [ 706星][1y] [Jupyter Notebook] anishathalye/obfuscated-gradients Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
- [ 658星][10m] [Jupyter Notebook] supercowpowers/data_hacking Data Hacking Project
- [ 657星][1y] [Rust] endgameinc/xori Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode
- [ 637星][21d] [PS] olafhartong/sysmon-modular sysmon配置模塊收集
- [ 587星][6m] nshalabi/sysmontools Utilities for Sysmon
- [ 568星][11m] [JS] raineorshine/solgraph Visualize Solidity control flow for smart contract security analysis.
- [ 523星][2m] mhaggis/sysmon-dfir Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
- [ 522星][4m] [Java] java-deobfuscator/deobfuscator Java 代碼反混淆工具
- [ 507星][8m] [JS] mindedsecurity/jstillery Advanced JavaScript Deobfuscation via Partial Evaluation
- [ 449星][12m] [C++] ntquery/scylla Imports Reconstructor
- [ 447星][3m] [Go] retroplasma/flyover-reverse-engineering Reversing Apple's 3D satellite mode
- [ 446星][11m] [Batchfile] ion-storm/sysmon-config Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing
- [ 408星][19d] [Py] crytic/slither Static Analyzer for Solidity
- [ 383星][1y] [HTML] maestron/reverse-engineering-tutorials Reverse Engineering Tutorials
- [ 344星][1y] [Ruby] calebfenton/dex-oracle A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
- [ 308星][25d] [Py] baderj/domain_generation_algorithms 域名生成算法
- [ 306星][2m] [C] nagyd/sdlpop An open-source port of Prince of Persia, based on the disassembly of the DOS version.
- [ 291星][28d] [C] tomb5/tomb5 Chronicles Disassembly translated to C source code.
- [ 265星][3m] [Assembly] pret/pokeyellow Disassembly of Pokemon Yellow
- [ 240星][4m] [JS] consensys/surya A set of utilities for exploring Solidity contracts
- [ 214星][2m] [Py] rpisec/llvm-deobfuscator
- [ 211星][12m] [Java] neo23x0/fnord Pattern Extractor for Obfuscated Code
工具-其他
angr
工具
- [ 534星][12d] [Py] angr/angr-doc Documentation for the angr suite
- [ 305星][2m] [Py] salls/angrop a rop gadget finder and chain builder
文章
- 2016.04 [] Solving kao's toy project with symbolic execution and angr
- 2016.02 [theobsidiantower] Angr and me
- 2014.08 [3xp10it] angr解題
- 2014.08 [3xp10it] angr解題
Debug&&調試
工具
- [ 1450星][10d] [Go] google/gapid Graphics API Debugger
- [ 1422星][17d] [C++] eteran/edb-debugger edb is a cross platform AArch32/x86/x86-64 debugger.
- [ 1413星][19d] [Go] cosmos72/gomacro Interactive Go interpreter and debugger with REPL, Eval, generics and Lisp-like macros
- [ 1275星][4m] [Go] solo-io/squash The debugger for microservices
- [ 1147星][5m] [C++] cgdb/cgdb Console front-end to the GNU debugger
- [ 1128星][20d] [C] blacksphere/blackmagic In application debugger for ARM Cortex microcontrollers.
- [ 899星][10d] [Py] derekselander/lldb A collection of LLDB aliases/regexes and Python scripts to aid in your debugging sessions
- [ 836星][8d] [C++] tasvideos/bizhawk BizHawk is a multi-system emulator written in C#. BizHawk provides nice features for casual gamers such as full screen, and joypad support in addition to full rerecording and debugging tools for all system cores.
- [ 560星][21d] [C#] microsoft/miengine The Visual Studio MI Debug Engine ("MIEngine") provides an open-source Visual Studio Debugger extension that works with MI-enabled debuggers such as gdb, lldb, and clrdbg.
- [ 521星][1y] [C] wubingzheng/memleax debugs memory leak of running process. Not maintained anymore, try
libleak please. - [ 462星][5m] [C++] emoon/prodbg Debugging the way it's meant to be done
- [ 423星][4m] [C++] cobaltfusion/debugviewpp DebugView++, collects, views, filters your application logs, and highlights information that is important to you!
- [ 418星][26d] [C++] simonkagstrom/kcov Code coverage tool for compiled programs, Python and Bash which uses debugging information to collect and report data without special compilation options
- [ 377星][1m] [Py] pdbpp/pdbpp pdb++, a drop-in replacement for pdb (the Python debugger)
- [ 332星][8m] [Py] romanvm/python-web-pdb Web-based remote UI for Python's PDB debugger
- [ 306星][21d] [Java] widdix/aws-s3-virusscan Free Antivirus for S3 Buckets
- [ 291星][12d] [Py] sosreport/sos A unified tool for collecting system logs and other debug information
- [ 285星][2m] [C++] changeofpace/viviennevmm VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.
- [ 272星][4m] [Py] mariovilas/winappdbg WinAppDbg Debugger
- [ 270星][21d] [Py] ionelmc/python-manhole Debugging manhole for python applications.
- [ 250星][2m] [Py] quantopian/qdb Quantopian Remote Debugger for Python
- [ 240星][6m] [C++] facebook/ds2 Debug server for lldb.
- [ 239星][8m] [C++] strivexjun/xantidebug VMProtect 3.x Anti-debug Method Improved
- [ 239星][8m] [Py] beeware/bugjar A interactive graphical debugger for Python code.
- [ 233星][2m] [Py] gilligan/vim-lldb lldb debugger integration plugin for vim
- [ 220星][9m] letoram/senseye Dynamic Visual Debugging / Reverse Engineering Toolsuite
- [ 218星][2m] [Py] nteseyes/pylane An python vm injector with debug tools, based on gdb.
- [ 213星][12d] [C++] thalium/icebox Virtual Machine Introspection, Tracing & Debugging
- [ 209星][2m] [C] joyent/mdb_v8 postmortem debugging for Node.js and other V8-based programs
- [ 200星][6m] [C++] rainers/cv2pdb converter of DMD CodeView/DWARF debug information to PDB files
文章
BAP
工具
- [ 1106星][14d] [OCaml] binaryanalysisplatform/bap Binary Analysis Platform
- [ 411星][13d] [HTML] w3c/webappsec Web App安全工作組
- [ 299星][17d] [JS] w3c/webappsec-trusted-types A browser API to prevent DOM-Based Cross Site Scripting in modern web applications.
文章
BinNavi
工具
- [ 382星][26d] [C++] google/binexport 將反彙編以Protocol Buffer的形式導出為PostgreSQL數據庫, 導入到BinNavi中使用
- 重複區段: IDA->插件->導入導出->BinNavi |
文章
- 2015.12 [summitroute] Setting up fREedom and BinNavi
- 2015.12 [addxorrol] Open-Source BinNavi ... and fREedom
- 2015.08 [freebuf] 逆向分析神器BinNavi開源了
- 2008.11 [addxorrol] BinDiff / BinNavi User Forum
- 2008.11 [addxorrol] BinNavi v2 and PHP !
Decompiler&&反編譯器
工具
- [ 20779星][8d] [Java] skylot/jadx dex 轉java 的反編譯器
- [ 7733星][1m] [Java] java-decompiler/jd-gui A standalone Java Decompiler GUI
- [ 3135星][26d] [Java] deathmarine/luyten An Open Source Java Decompiler Gui for Procyon
- [ 1867星][1y] [Java] jindrapetrik/jpexs-decompiler JPEXS Free Flash Decompiler
- [ 1652星][12m] [Java] fesh0r/fernflower Unofficial mirror of FernFlower Java decompiler (All pulls should be submitted upstream)
- [ 1466星][12d] [Py] rocky/python-uncompyle6 Python反編譯器,跨平台
- [ 1084星][4m] [Py] storyyeller/krakatau Java decompiler, assembler, and disassembler
- [ 764星][12m] [C++] comaeio/porosity UNMAINTAINED Decompiler and Security Analysis tool for Blockchain-based Ethereum Smart-Contracts
- [ 673星][18d] [C#] uxmal/reko Reko is a binary decompiler.
- [ 671星][11m] [C++] zrax/pycdc C++ python bytecode disassembler and decompiler
- [ 538星][6m] [Java] java-decompiler/jd-eclipse A Java Decompiler Eclipse plugin
- [ 347星][16d] [C#] steamdatabase/valveresourceformat Valve's Source 2 resource file format (also known as Stupid Valve Format) parser and decompiler.
- [ 331星][11d] [Java] leibnitz27/cfr This is the public repository for the CFR Java decompiler
- [ 327星][2m] [C++] silverf0x/rpcview RpcView is a free tool to explore and decompile Microsoft RPC interfaces
- [ 283星][8m] [Shell] venshine/decompile-apk APK 反編譯
- [ 243星][3m] [Java] kwart/jd-cmd Command line Java Decompiler
- [ 242星][11d] [C#] icsharpcode/avaloniailspy Avalonia-based .NET Decompiler (port of ILSpy)
- [ 240星][2m] [Java] ata4/bspsrc A Source engine map decompiler
- [ 232星][1y] [C++] wwwg/wasmdec WebAssembly to C decompiler
- [ 226星][11d] [C++] boomerangdecompiler/boomerang Boomerang Decompiler - Fighting the code-rot :)
文章
Disassemble&&反彙編
工具
- [ 1374星][20d] [C] zyantific/zydis 快速的輕量級x86/x86-64 反彙編庫
- [ 1346星][12m] [Rust] das-labor/panopticon A libre cross-platform disassembler.
- [ 877星][11m] [C++] wisk/medusa An open source interactive disassembler
- [ 835星][8d] [GLSL] khronosgroup/spirv-cross a practical tool and library for performing reflection on SPIR-V and disassembling SPIR-V back to high level languages.
- [ 828星][3m] [C++] redasmorg/redasm The OpenSource Disassembler
- [ 627星][3m] [C] gdabah/distorm Powerful Disassembler Library For x86/AMD64
- [ 430星][2m] [C#] 0xd4d/iced x86/x64 disassembler, instruction decoder & encoder
- [ 351星][21d] [Ruby] jjyg/metasm This is the main repository for metasm, a free assembler / disassembler / compiler written in ruby
- [ 246星][5m] [Py] bontchev/pcodedmp A VBA p-code disassembler
文章
GDB
工具
- [ 7019星][10d] [JS] cs01/gdbgui Browser-based frontend to gdb (gnu debugger). Add breakpoints, view the stack, visualize data structures, and more in C, C++, Go, Rust, and Fortran. Run gdbgui from the terminal and a new tab will open in your browser.
- [ 6052星][13d] [Py] cyrus-and/gdb-dashboard Modular visual interface for GDB in Python
- [ 3784星][11m] [Py] longld/peda Python Exploit Development Assistance for GDB
- [ 2568星][1m] [Py] hugsy/gef gdb增強工具,使用Python API,用於漏洞開發和逆向分析。
- [ 2439星][16d] [Py] pwndbg/pwndbg GDB插件,輔助漏洞開發和逆向
- [ 1417星][3m] [Go] hellogcc/100-gdb-tips A collection of gdb tips. 100 maybe just mean many here.
- [ 452星][3m] [Py] scwuaptx/pwngdb gdb for pwn
- [ 446星][1y] [Py] jfoote/exploitable The 'exploitable' GDB plugin. I don't work at CERT anymore, but here is the original homepage:
- [ 244星][2m] [JS] bet4it/hyperpwn A hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda
- [ 208星][2m] [Py] sakhnik/nvim-gdb Neovim thin wrapper for GDB, LLDB and PDB
文章
- 2019.11 [ocallahan] Supercharging Gdb With Pernosco
- 2019.10 [FOSSiFoundation] A Unified Debug Server for Deeply Embedded Systems and GDB/LLDB - Simon Cook - ORConf 2019
- 2019.10 [TheLinuxFoundation] Using Serial kdb / kgdb to Debug the Linux Kernel - Douglas Anderson, Google
- 2019.09 [GNUToolsCauldron] GDB: Tab-Completion & Command Options - GNU Tools Cauldron 2019
- 2019.09 [GNUToolsCauldron] GDB on s390x: To-dos and Challenges - GNU Tools Cauldron 2019
- 2019.09 [GNUToolsCauldron] GDB BoF - GNU Tools Cauldron 2019
- 2019.09 [GNUToolsCauldron] A New Debug Server for Supporting GDB on Embedded Platforms - GNU Tools Cauldron 2019
- 2019.05 [tunnelshade] Quick linux kernel with gdb setup with little help from Linux distros
- 2019.02 [360] ARM彙編之堆棧溢出實戰分析四(GDB)
- 2019.01 [freebuf] ARM彙編之堆棧溢出實戰分析三(GDB)
- 2019.01 [360] ARM彙編之堆棧溢出實戰分析二(GDB)
- 2019.01 [360] ARM彙編之堆棧溢出實戰分析(GDB)
- 2018.09 [blackroomsec] Reversing small crackme w/ GDB-Peda
- 2018.09 [doyler] Metasploit adduser Analysis via GDB (SLAE Exam Assignment #5.2)
- 2018.07 [pediy] [編程][翻譯] 用gdb 學C 語言
- 2018.05 [djmanilaice] Ignorance .gdbinit
- 2018.05 [360] DEFCON CHINA議題解讀| Triton和符號執行在GDB 上
- 2018.03 [aliyun] 利用GDB實現進程注入
- 2018.02 [freebuf] GDB調試CVE-2018-5711 PHP-GD拒絕服務漏洞
- 2018.02 [HITCON] [HITCON CMT 2017] R0D202 - 陳威伯- Triton and Symbolic execution on GDB
Monitor&&監控&&Trace&&追踪
工具
- [ 1419星][9m] [C] namhyung/uftrace Function (graph) tracer for user-space
Radare2
插件&&腳本
Radare2
- [ 11588星][12d] [C] radareorg/radare2 unix-like reverse engineering framework and commandline tools
新添加的
- [ 410星][6m] [Py] itayc0hen/a-journey-into-radare2 A series of tutorials about radare2 framework from
- [ 339星][28d] [TeX] radareorg/radare2book Radare2 official book
- [ 259星][1m] [C] radareorg/r2dec-js radare2插件,將彙編代碼反編譯為C偽代碼
- [ 258星][4m] [Rust] radareorg/radeco radare2-based decompiler and symbol executor
- [ 202星][3m] [PS] wiredpulse/posh-r2 PowerShell - Rapid Response... For the incident responder in you!
與其他工具交互
未分類
- [ 378星][27d] [JS] nowsecure/r2frida Radare2 and Frida better together.
- 重複區段: DBI->Frida->工具->與其他工具交互->Radare2 |
IDA
GUI
GUI
Cutter
- [ 6176星][8d] [C++] radareorg/cutter 逆向框架radare2的Qt界面,iaito的升級版
文章&&視頻
未分類
- 2019.10 [prsecurity] Radare2 for RE CTF
- 2019.09 [securityartwork] YaraRET (I): Carving with Radare2 & Yara
- 2019.07 [freebuf] 教你使用Cutter和Radare2對APT32惡意程序流程圖進行反混淆處理
- 2019.07 [THER] 0x0D - FLARE-On #3 Challenge Part 2 [Reversing with Radare2]
- 2019.07 [THER] 0x09 Cross References [Reversing with Radare2]
- 2019.07 [THER] 0x08 Navigation [Reversing with Radare2]
- 2019.07 [THER] 0x04 Target Application [Reversing with Radare2]
- 2019.06 [THER] 0x03 Environment Setup [Reversing with Radare2]
- 2019.06 [THER] 0x02 What is Radare2 [Reversing with Radare2]
- 2019.06 [THER] 0x00 Intro [Reversing with Radare2]
- 2019.06 [hitbsecconf] #HITB2019AMS D1T3 - Overcoming Fear: Reversing With Radare2 - Arnau Gamez Montolio
- 2019.05 [X0x0FFB347] Solving MalwareTech Shellcode challenges with some radare2 magic!
- 2019.05 [360] 使用Cutter和Radare2對APT32惡意程序流程圖進行反混淆處理
- 2019.05 [SagiDana] Radare2 — Keep It Or Leave It?
- 2019.04 [X0x0FFB347] Solving MalwareTech String Challenges With Some Radare2 Magic!
- 2019.04 [radare] Radare2 Summer of Code 2019 Selection Results
- 2019.04 [radare] Radare2 Summer of Code 2019 Selection Results
- 2019.03 [sans] Binary Analysis with Jupyter and Radare2
- 2019.02 [freebuf] Radare2:一款類Unix命令行逆向安全框架
- 2019.02 [radare] Radare2 Community Survey Results
Cutter
- 2019.12 [megabeets] 5 Ways to patch binaries with Cutter
- 2019.07 [THER] 0x0C - Cutter: FLARE-On #3 Challenge Part 1 [Reversing with Radare2]
- 2018.10 [PancakeNopcode] r2con2018 - Cutter by @xarkes
- 2018.08 [radare] GSoC 2018 Final: Debugging and Emulation Support for Cutter
- 2017.12 [n0where] Qt C++ radare2 GUI: Cutter
BinaryNinja
插件&&腳本
新添加的
- [ 2820星][1m] [Py] androguard/androguard Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
- [ 328星][5m] [Py] vector35/binaryninja-api Public API, examples, documentation and issues for Binary Ninja
- [ 280星][3m] [Py] pbiernat/ripr Package Binary Code as a Python class using Binary Ninja and Unicorn Engine
- [ 201星][14d] [JS] ret2got/disasm.pro A realtime assembler/disassembler (formerly known as disasm.ninja)
與其他工具交互
未分類
IDA
文章&&視頻
- 2019.08 [trailofbits] Reverse Taint Analysis Using Binary Ninja
- 2018.09 [aliyun] 使用Binary Ninja調試共享庫
- 2018.09 [kudelskisecurity] Analyzing ARM Cortex-based MCU firmwares using Binary Ninja
- 2018.07 [aliyun] WCTF 2018 - binja - rswc
- 2018.04 [trailofbits] 使用Binary Ninja的MLIL和SSA, 挖掘二進製文件的漏洞. (MLIL: Medium Level IL, 中間層IL)(SSA: Single Static Assignment)
- 2018.01 [pediy] [翻譯]逆向平台Binary Ninja介紹
- 2017.11 [] bnpy - A python architecture plugin for Binary Ninja
- 2017.10 [ret2] Untangling Exotic Architectures with Binary Ninja
- 2017.10 [chokepoint] Pin Visual Coverage Tool for Binary Ninja
- 2017.03 [GynvaelEN] Hacking Livestream #14: Binary Ninja Plugins (with carstein)
- 2016.12 [kchung] Binary Ninja: IPython and the Python Console
- 2016.03 [arm] Introduction to the Binary Ninja API
Windows
PE
工具
- [ 877星][8m] [Py] erocarrera/pefile pefile is a Python module to read and work with PE (Portable Executable) files
- [ 634星][10d] [C] thewover/donut Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
- [ 537星][1y] [C#] ghostpack/safetykatz Mimikatz和.NET PE Loader的結合
- [ 388星][1y] [Assembly] hasherezade/pe_to_shellcode Converts PE into a shellcode
- [ 385星][3m] [Jupyter Notebook] endgameinc/ember 110萬PE文件的數據集合, 可用於訓練相關模型. PE文件信息主要包括: SHA256/histogram(直方圖)/byteentropy(字節熵)/字符串/PE頭信息/段信息/導入表/導出表
- [ 344星][1y] [Assembly] egebalci/amber 反射式PE加殼器,用於繞過安全產品和緩解措施
- [ 337星][5m] [C] merces/pev The PE file analysis toolkit
- [ 316星][24d] [C++] trailofbits/pe-parse Principled, lightweight C/C++ PE parser
- [ 315星][14d] [VBA] itm4n/vba-runpe A VBA implementation of the RunPE technique or how to bypass application whitelisting.
- [ 296星][12d] [C++] hasherezade/libpeconv 用於映射和取消映射PE 文件的庫
- [ 285星][7m] [Java] katjahahn/portex Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness
文章
- 2019.12 [aliyun] 手工shellcode注入PE文件
- 2019.10 [freebuf] PEpper:一款針對可執行程序的開源惡意軟件靜態分析工具
- 2019.09 [sevagas] Process PE Injection Basics
- 2019.07 [hexacorn] PE Section names – re-visited, again
- 2019.06 [hasherezade] PE-sieve v0.2.1 release notes - import recovery & unpacking ASPack (part 2)
- 2019.05 [0x00sec] Backdoorin pe files
- 2019.05 [360] Windows調試藝術——PE文件變形(一)
- 2019.05 [arxiv] [1905.01999] A Benchmark API Call Dataset for Windows PE Malware Classification
- 2019.04 [decoder] Combinig LUAFV PostLuafvPostReadWrite Race Condition PE with DiagHub collector exploit -> from standard user to SYSTEM
- 2019.04 [MalwareAnalysisForHedgehogs] Malware Theory - PE Malformations and Anomalies
- 2019.04 [freebuf] Xori:一款針對PE32和Shellcode的自動化反編譯與靜態分析庫
- 2019.03 [hexacorn] PE files and the DemoScene
- 2019.03 [] 攜帶惡意PE文件的壁紙類應用出現在Google Play
- 2019.03 [] 攜帶惡意PE文件的壁紙類應用出現在Google Play
- 2019.03 [] Malicious PE files discovered on Google Play
- 2019.03 [hexacorn] PE Compilation Timestamps vs. forensics
- 2019.03 [cristivlad25] Machine Learning for Malware Detection - 4 - Portable Executable (PE) Files
- 2019.03 [hexacorn] Extracting and Parsing PE signatures en masse
- 2019.02 [hexacorn] PE files and the Easy Programming Language (EPL)
- 2019.01 [pediy] [原創]PE加載器的簡單實現
DLL
新添加
工具
- [ 1915星][22d] [C#] lucasg/dependencies A rewrite of the old legacy software "depends.exe" in C# for Windows devs to troubleshoot dll load dependencies issues.
- [ 1333星][10m] [C] fancycode/memorymodule Library to load a DLL from memory.
- [ 1146星][27d] [C#] perfare/il2cppdumper Restore dll from Unity il2cpp binary file (except code)
- [ 793星][11m] [C#] terminals-origin/terminals Terminals is a secure, multi tab terminal services/remote desktop client. It uses Terminal Services ActiveX Client (mstscax.dll). The project started from the need of controlling multiple connections simultaneously. It is a complete replacement for the mstsc.exe (Terminal Services) client. This is official source moved from Codeplex.
- [ 388星][7m] [C++] hasherezade/dll_to_exe Converts a DLL into EXE
- [ 363星][19d] [C#] 3f/dllexport .NET DllExport
- [ 240星][10m] [C++] wbenny/detoursnt Detours with just single dependency - NTDLL
- [ 230星][1y] [C#] misaka-mikoto-tech/monohooker hook C# method at runtime without modify dll file (such as UnityEditor.dll)
- [ 215星][6m] [C#] erfg12/memory.dll C# Hacking library for making PC game trainers.
- [ 214星][26d] [C++] chuyu-team/mint Contains the definitions for the Windows Internal UserMode API from ntdll.dll, samlib.dll and winsta.dll.
文章
- 2019.12 [freebuf] 如何使用ADSI接口和反射型DLL枚舉活動目錄
- 2019.11 [tyranidslair] The Internals of AppLocker - Part 4 - Blocking DLL Loading
- 2019.09 [hexacorn] RunDll32 — API calling
- 2019.09 [4hou] 《MiniDumpWriteDump via COM+ Services DLL》的利用測試
- 2019.08 [osandamalith] Converting an EXE to a DLL
- 2019.06 [4hou] 域滲透——利用dnscmd在DNS服務器上實現遠程加載Dll
- 2019.06 [hexacorn] Playing with Delay-Loaded DLLs…
- 2019.05 [3gstudent] 域滲透——利用dnscmd在DNS服務器上實現遠程加載Dll
- 2019.05 [3gstudent] 域滲透——利用dnscmd在DNS服務器上實現遠程加載Dll
- 2019.05 [4sysops] PS Protector: Convert your PowerShell module into a .NET assembly DLL
- 2019.05 [0x00sec] Malicious DLL execution using Apple's APSDaemon.exe signed binary
- 2019.04 [4hou] Qt5漏洞導致Cisco WebEx和Malwarebytes反病毒產品可遠程加載任意DLL
- 2019.04 [id] DLL CryptoMix
- 2019.03 [CyborgElf] How To Make an Internal DLL Game Hack C++ (Rainbow Six Siege)
- 2019.02 [] No Source Code For a 14-Year Old Vulnerable DLL? No Problem. (CVE-2018-20250)
- 2018.12 [srcincite] 思科Webex桌面會議App提權漏洞, 可導致RCE
DLL注入
工具
- [ 713星][5m] [C++] darthton/xenos Windows DLL 注入器
- [ 588星][2m] [PS] monoxgas/srdi Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
文章
- 2019.12 [freebuf] 如何防止惡意的第三方DLL注入到進程
- 2019.06 [aliyun] Windows 10 Task Scheduler服務DLL注入漏洞分析
- 2018.10 [pediy] [原創]代替創建用戶線程使用ShellCode注入DLL的小技巧
- 2018.10 [4hou] 如何利用DLL注入繞過Win10勒索軟件保護
- 2018.10 [0x00sec] Reflective Dll Injection - Any Way to check If a process is already injected?
- 2018.09 [pediy] [原創]win10_arm64 驅動注入dll 到arm32程序
- 2018.08 [freebuf] sRDI:一款通過Shellcode實現反射型DLL注入的強大工具
- 2018.07 [4hou] 注入系列——DLL注入
- 2018.06 [0x00sec] Reflective DLL Injection - AV detects at runtime
- 2018.06 [qq] 【遊戲漏洞】注入DLL顯示遊戲窗口
- 2017.12 [secist] Mavinject | Dll Injected
- 2017.12 [secvul] SSM終結dll注入
- 2017.10 [nsfocus] 【乾貨分享】Sandbox技術之DLL注入
- 2017.10 [freebuf] DLL注入新姿勢:反射式DLL注入研究
- 2017.10 [pediy] [原創]通過Wannacry分析內核shellcode注入dll技術
- 2017.09 [360] Dll注入新姿勢:SetThreadContext注入
- 2017.08 [silentbreaksecurity] sRDI – Shellcode Reflective DLL Injection
- 2017.08 [360] DLL注入那些事
- 2017.08 [freebuf] 系統安全攻防戰:DLL注入技術詳解
- 2017.08 [pediy] [翻譯]多種DLL注入技術原理介紹
DLL劫持
工具
- [ 431星][7m] [Pascal] mojtabatajik/robber 查找易於發生DLL劫持的可執行文件
- [ 299星][11m] [C++] anhkgg/superdllhijack 一種通用Dll劫持技術,不再需要手工導出Dll的函數接口了
文章
- 2019.06 [4hou] 戴爾預裝的SupportAssist組件存在DLL劫持漏洞,全球超過1億台設備面臨網絡攻擊風險
- 2019.05 [4hou] 《Lateral Movement — SCM and DLL Hijacking Primer》的利用擴展
- 2019.04 [3gstudent] 《Lateral Movement — SCM and DLL Hijacking Primer》的利用擴展
- 2019.04 [3gstudent] 《Lateral Movement — SCM and DLL Hijacking Primer》的利用擴展
- 2019.04 [specterops] Lateral Movement — SCM and Dll Hijacking Primer
- 2019.01 [sans] DLL Hijacking Like a Boss!
- 2018.11 [t00ls] 一種通用DLL劫持技術研究
- 2018.11 [pediy] [原創]一種通用DLL劫持技術研究
- 2018.09 [DoktorCranium] Understanding how DLL Hijacking works
- 2018.09 [astr0baby] Understanding how DLL Hijacking works
- 2018.08 [parsiya] DVTA - Part 5 - Client-side Storage and DLL Hijacking
- 2018.08 [parsiya] DVTA - Part 5 - Client-side Storage and DLL Hijacking
- 2018.06 [cybereason] Attackers incriminate a signed Oracle process for DLL hijacking, running Mimikatz
- 2018.05 [360] 獨闢蹊徑:如何通過URL文件實現DLL劫持
- 2018.05 [insert] 利用URL文件實現DLL劫持
- 2017.10 [cybereason] Siofra, a free tool built by Cybereason researcher, exposes DLL hijacking vulnerabilities in Windows programs
- 2017.08 [securiteam] SSD Advisory – Dashlane DLL Hijacking
- 2017.05 [4hou] Windows 下的7 種DLL 劫持技術
- 2017.05 [pediy] [原創]讓代碼飛出一段鋼琴曲(freepiano小助手)(全局鍵盤鉤子+dll劫持)+有碼
- 2017.03 [pentestlab] DLL Hijacking
UAC
工具
- [ 2355星][11d] [C] hfiref0x/uacme Defeating Windows User Account Control
- [ 2307星][1m] [PS] k8gege/k8tools K8工具合集(內網滲透/提權工具/遠程溢出/漏洞利用/掃描工具/密碼破解/免殺工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
- [ 1688星][3m] [Py] rootm0s/winpwnage UAC bypass, Elevate, Persistence and Execution methods
文章
- 2019.11 [4hou] CVE-2019-1388: Windows UAC權限提升漏洞
- 2019.10 [freebuf] UAC繞過初探
- 2019.09 [4sysops] Security options in Windows Server 2016: Accounts and UAC
- 2019.08 [freebuf] SneakyEXE:一款嵌入式UAC繞過工具
- 2019.04 [markmotig] Brute Forcing Admin Passwords with UAC
- 2019.03 [4hou] 通過模擬可信目錄繞過UAC的利用分析
- 2019.03 [aliyun] 如何濫用Access Tokens UIAccess繞過UAC
- 2019.02 [3gstudent] 通過模擬可信目錄繞過UAC的利用分析
- 2019.02 [3gstudent] 通過模擬可信目錄繞過UAC的利用分析
- 2019.02 [sans] UAC is not all that bad really
- 2019.01 [fuzzysecurity] Anatomy of UAC Attacks
- 2019.01 [sevagas] Yet another sdclt UAC bypass
- 2018.11 [4hou] 利用metasploit繞過UAC的5種方式
- 2018.11 [tenable] UAC Bypass by Mocking Trusted Directories
- 2018.10 [0x000x00] How to bypass UAC in newer Windows versions
- 2018.10 [tyranidslair] Farewell to the Token Stealing UAC Bypass
- 2018.10 [freebuf] 使用Metasploit繞過UAC的多種方法
- 2018.09 [freebuf] 一種繞過UAC的技術介紹
- 2018.09 [hackingarticles] Multiple Ways to Bypass UAC using Metasploit
- 2018.09 [hexacorn] A bit of a qUACkery – how to elevate… w/o doing a single thing ;)
Sysmon
工具
- [ 206星][1y] [JS] jpcertcc/sysmonsearch Investigate suspicious activity by visualizing Sysmon's event log
文章
- 2019.12 [vanimpe] Use Sysmon DNS data for incident response
- 2019.11 [4hou] 你不知道的威脅狩獵技巧:Windows API 與Sysmon 事件的映射
- 2019.10 [HackersOnBoard] Subverting Sysmon Application of a Formalized Security Product Evasion Methodology
- 2019.09 [sans] Parsing Sysmon Events for IR Indicators
- 2019.09 [blackhillsinfosec] Getting Started With Sysmon
- 2019.09 [osandamalith] Unloading the Sysmon Minifilter Driver
- 2019.09 [specterops] Shhmon — Silencing Sysmon via Driver Unload
- 2019.09 [4hou] 如何逃逸Sysmon工具對DNS的監控
- 2019.09 [olafhartong] Sysmon 10.4 release
- 2019.09 [blackhillsinfosec] Webcast: Windows logging, Sysmon, and ELK
- 2019.08 [blackhillsinfosec] Webcast: Implementing Sysmon and Applocker
- 2019.07 [eforensicsmag] Using Sysmon and ETW For So Much More | By David Kennedy
- 2019.06 [nosecurecode] Sysmon in a Box
- 2019.06 [binarydefense] Using Sysmon and ETW For So Much More - Binary Defense
- 2019.06 [360] 如何規避Sysmon DNS監控
- 2019.06 [SecurityWeekly] Sysmon DNS Logging, Gravwell - PSW #608
- 2019.06 [xpnsec] Evading Sysmon DNS Monitoring
- 2019.06 [olafhartong] Using Sysmon in Azure Sentinel
- 2019.05 [olafhartong] Sysmon 10.0 - New features and changes
- 2019.02 [specterops] Putting Sysmon v9.0 AND/OR Grouping Logic to the Test
ETW
工具
- [ 1228星][10d] [JS] jpcertcc/logontracer 通過可視化和分析Windows事件日誌來調查惡意的Windows登錄
- [ 865星][22d] [C++] google/uiforetw User interface for recording and managing ETW traces
- [ 654星][10m] [Roff] palantir/windows-event-forwarding 使用Windows 事件轉發實現網絡事件監測和防禦
- [ 609星][19d] [PS] sbousseaden/evtx-attack-samples 與特定攻擊和利用後滲透技術相關的Windows事件樣例
- [ 504星][10m] [C#] lowleveldesign/wtrace Command line tracing tool for Windows, based on ETW.
- [ 479星][5m] [PS] sans-blue-team/deepbluecli a PowerShell Module for Threat Hunting via Windows Event Logs
- [ 446星][9m] [PS] nsacyber/event-forwarding-guidance 幫助管理員使用Windows事件轉發(WEF)收集與安全相關的Windows事件日誌
- [ 393星][10m] [Py] williballenthin/python-evtx 純Python編寫的Windows事件日誌解析器
- [ 341星][1y] [C++] qax-a-team/eventcleaner A tool mainly to erase specified records from Windows event logs, with additional functionalities.
- [ 306星][1m] [C#] zodiacon/procmonx 通過Windows事件日誌獲取與Process Monitor顯示的相同的信息,無需內核驅動
- [ 282星][3m] [C#] fireeye/silketw flexible C# wrappers for ETW
- [ 282星][10m] [C#] nsacyber/windows-event-log-messages 檢索Windows二進製文件中嵌入的Windows事件日誌消息的定義,並以discoverable的格式提供它們
- [ 261星][3m] [C++] gametechdev/presentmon Tool for collection and processing of ETW events related to DXGI presentation.
- [ 249星][3m] [C++] microsoft/krabsetw KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.
文章
- 2019.12 [Cooper] EventList, Matching Windows Event Log IDs With MITRE ATT&CK - Miriam Wiesner
- 2019.09 [adventuresincyberchallenges] Powershell Encoded Payload In Clear Text in Windows Event Log 4688
- 2019.09 [Cyb3rWard0g] Threat Hunting with ETW events and HELK — Part 2: Shipping ETW events to HELK ⚒
- 2019.09 [Cyb3rWard0g] Threat Hunting with ETW events and HELK — Part 1: Installing SilkETW ?♀?
- 2019.05 [freebuf] SilkETW:一款針對Windows事件追踪的自定義C#封裝工具
- 2019.04 [4sysops] Forward Windows events to a Syslog server with free SolarWinds Event Log Forwarder for Windows
- 2019.02 [360] ETW註冊表監控windows內核實現原理
- 2019.01 [sans] Rocking Your Windows EventID with ELK Stack
- 2019.01 [sans] Threat Hunting via Windows Event Logs
- 2019.01 [sans] Hunting for Lateral Movement Using Windows Event Log
- 2018.12 [palantir] Tampering with Windows Event Tracing: Background, Offense, and Defense
- 2018.12 [sophos] Hunting for threats with Intercept X and the Windows Event Collector
- 2018.08 [4sysops] Query multiple Windows event logs with PowerShell
- 2018.07 [criteo] Grab ETW Session, Providers and Events
- 2018.07 [3gstudent] Windows Event Viewer Log (EVT)單條日誌清除(三)——刪除當前系統指定指定時間段evt日誌記錄
- 2018.07 [3gstudent] Windows Event Viewer Log (EVT)單條日誌清除(三)——刪除當前系統指定指定時間段evt日誌記錄
- 2018.07 [pentesttoolz] LogonTracer – Investigate Malicious Windows Logon By Visualizing And Analyzing Windows Event Log
- 2018.07 [dragos] EvtxToElk: A Python Module to Load Windows Event Logs into ElasticSearch
- 2018.07 [3gstudent] Windows Event Viewer Log (EVT)單條日誌清除(二)——程序實現刪除evt文件指定時間段的日誌記錄
- 2018.07 [3gstudent] Windows Event Viewer Log (EVT)單條日誌清除(二)——程序實現刪除evt文件指定時間段的日誌記錄
AppLocker
工具
- [ 921星][7m] [PS] api0cradle/ultimateapplockerbypasslist The goal of this repository is to document the most common techniques to bypass AppLocker.
文章
- 2019.11 [tyranidslair] The Internals of AppLocker - Part 3 - Access Tokens and Access Checking
- 2019.11 [tyranidslair] The Internals of AppLocker - Part 2 - Blocking Process Creation
- 2019.11 [tyranidslair] The Internals of AppLocker - Part 1 - Overview and Setup
- 2019.09 [blackhillsinfosec] Getting Started With AppLocker
- 2019.08 [p0w3rsh3ll] How to delete a single Applocker rule
- 2019.05 [oddvar] A small discovery about AppLocker
- 2019.04 [4hou] 通過regsrv32.exe繞過Applocker應用程序白名單的多種方法
- 2019.03 [4sysops] Application whitelisting: Software Restriction Policies vs. AppLocker vs. Windows Defender Application Control
- 2019.03 [4hou] 逃避手段再開花——從一個能逃避AppLocker和AMSI檢測的Office文檔講起
- 2019.03 [yoroi] The Document that Eluded AppLocker and AMSI
- 2019.03 [p0w3rsh3ll] Applocker and PowerShell: how do they tightly work together?
- 2019.02 [4hou] 如何以管理員身份繞過AppLocker
- 2019.02 [oddvar] Bypassing AppLocker as an admin
- 2019.01 [hackingarticles] Windows Applocker Policy – A Beginner's Guide
- 2019.01 [t00ls] 投稿文章:Bypass Applocker + 免殺執行任意shellcode [ csc + installUtil ]
- 2018.12 [hecfblog] Daily Blog #580: Applocker and Windows 10
- 2018.12 [hecfblog] Daily Blog #581: Forensic Lunch Test Kitchen 12/28/18 Syscache Applocker and Server 2012
- 2018.12 [360] 多維度對抗Windows AppLocker
- 2018.12 [tsscyber] BloodHound.xpab — Applocker bypass
- 2018.10 [tsscyber] AppLocker Bypass — presentationhost.exe
工具
新添加的
Procmon
.NET
- [ 12676星][14d] [C#] 0xd4d/dnspy .NET debugger and assembly editor
- [ 9261星][11d] [C#] icsharpcode/ilspy .NET Decompiler
- [ 3694星][27d] [C#] 0xd4d/de4dot .NET deobfuscator and unpacker.
- [ 3263星][7m] [JS] sindresorhus/speed-test Test your internet connection speed and ping using speedtest.net from the CLI
- [ 1657星][14d] [C#] jbevain/cecil C#庫, 探查/修改/生成.NET App/庫
- [ 217星][11m] [C#] rainwayapp/warden Warden.NET is an easy to use process management library for keeping track of processes on Windows.
Environment&&環境&&配置
- [ 1521星][11m] [PS] joefitzgerald/packer-windows 使用Packer創建Vagrant boxes的模板
- [ 1347星][1m] [Go] securitywithoutborders/hardentools 禁用許多有危險的Windows功能
- [ 1156星][1y] [HTML] nsacyber/windows-secure-host-baseline Windows 10和Windows Server 2016 DoD 安全主機基准設置的配置指南
- [ 1008星][6m] adolfintel/windows10-privacy Win10隱私指南
- [ 508星][17d] [PS] stefanscherer/packer-windows Windows Packer 模板:Win10, Server 2016, 1709, 1803, 1809, 2019, 1903, Insider with Docker
進程注入
代碼注入
內存模塊
VT&&虛擬化&&Hypbervisor
- [ 1348星][22d] [C] intel/haxm Intel 開源的英特爾硬件加速執行管理器,通過硬件輔助的虛擬化引擎,加速Windows/macOS 主機上的IA emulation((x86/ x86_64) )
- [ 1011星][1y] [C] ionescu007/simplevisor 英特爾VT-x虛擬機管理程序,簡單、可移植。支持Windows和UEFI
- [ 717星][23d] [C++] tandasat/hyperplatform 基於Intel VT-x的虛擬機管理程序,旨在在Windows上提供精簡的VM-exit過濾平台
- [ 570星][12m] [C] asamy/ksm 快速、hackable且簡單的x64 VT-x虛擬機管理程序,支持Windows和Linux
內核&&驅動
- [ 933星][9m] [C] microsoft/windows-driver-frameworks Windows驅動框架(WDF)
- [ 781星][19d] axtmueller/windows-kernel-explorer Windows內核研究工具
- [ 510星][5m] [Py] rabbitstack/fibratus Windows內核探索和跟踪工具
- [ 479星][1m] [C] jkornev/hidden Windows驅動,帶用戶模式接口:隱藏文件系統和註冊表對象、保護進程等
- [ 278星][12d] [PS] microsoftdocs/windows-driver-docs 官方Windows驅動程序工具包文檔
註冊表
- [ 490星][14d] [Batchfile] chef-koch/regtweaks Windows註冊表調整(Win 7-Win 10)
- [ 288星][8m] [Py] williballenthin/python-registry 用於對Windows NT註冊表文件進行純讀取訪問的Python庫
系統調用
- [ 725星][2m] [HTML] j00ru/windows-syscalls Windows 系統調用表(NT/2000/XP/2003/Vista/2008/7/2012/8/10)
- [ 328星][2m] [C] hfiref0x/syscalltables Windows NT x64系統調用表
其他
- [ 949星][3m] [C] basil00/divert 用戶模式數據包攔截庫,適用於Win 7/8/10
- [ 863星][14d] [C++] henrypp/simplewall 為Windows 過濾平台提供的配置界面
- [ 726星][2m] [Py] diyan/pywinrm Python實現的WinRM客戶端
- [ 570星][1m] [C] hfiref0x/winobjex64 Windows對象瀏覽器. x64
- [ 463星][8m] [C#] microsoft/dbgshell PowerShell編寫的Windows調試器引擎前端
- [ 418星][15d] [C] samba-team/samba 適用於Linux和Unix的標準Windows interoperability程序套件
- [ 389星][2m] [C#] microsoft/binskim 二進制靜態分析工具,可為PE和ELF二進制格式提供安全性和正確性分析
- [ 387星][19d] [Jupyter Notebook] microsoft/windowsdefenderatp-hunting-queries 在MS Defender ATP中進行高級查詢的示例
- [ 370星][27d] [Ruby] winrb/winrm 在Windows中使用WinRM的功能調用原生對象的SOAP庫。 Ruby編寫
- [ 360星][12d] [C#] digitalruby/ipban 監視Windows/Linux系統的登錄失敗和不良行為,並封禁對應的IP地址。高度可配置,精簡且功能強大。
- [ 269星][12m] [Py] hakril/pythonforwindows 簡化Python與Windows操作系統交互的庫
- [ 238星][5m] [PS] microsoft/aaronlocker Windows應用程序白名單
- [ 233星][10m] [Go] masterzen/winrm Windows遠程命令執行,命令行工具+庫,Go編寫
- [ 232星][1y] [C++] ionescu007/simpleator Windows x64用戶模式應用程序模擬器
- [ 229星][4m] [C] tishion/mmloader 繞過Windows PE Loader,直接從內存中加載DLL模塊(x86/x64)
- [ 228星][3m] [C] leecher1337/ntvdmx64 在64位版本上執行Windows DOS版的NTVDM
- [ 226星][1y] [C++] rexdf/commandtrayhost 監控Windows systray的命令行工具
- [ 210星][3m] adguardteam/adguardforwindows Windows系統範圍的AdBlocker
- [ 208星][10m] [C] hzqst/unicorn_pe 模擬Windows PE文件的代碼執行,基於Unicorn
- [ 205星][3m] [C] jasonwhite/ducible 使PE和PDB的構建具有可複制性
文章
新添加
DEP
- 2019.11 [aliyun] ARM EXP 開發- 繞過DEP 執行mprotect()
- 2019.07 [codingvision] Bypassing ASLR and DEP - Getting Shells with pwntools
- 2019.01 [fuzzysecurity] MS13-009 Use-After-Free IE8 (DEP)
- 2019.01 [fuzzysecurity] BlazeVideo HDTV Player 6.6 Professional SEH&DEP&ASLR
- 2019.01 [fuzzysecurity] NCMedia Sound Editor Pro v7.5.1 SEH&DEP&ASLR
- 2019.01 [fuzzysecurity] ALLMediaServer 0.8 SEH&DEP&ASLR
- 2018.12 [360] CoolPlayer bypass DEP(CVE-2008-3408)分析
- 2018.09 [duo] Weak Apple DEP Authentication Leaves Enterprises Vulnerable to Social Engineering Attacks and Rogue Devices
- 2018.09 [3or] ARM Exploitation - Defeating DEP - executing mprotect()
- 2018.09 [3or] ARM Exploitation - Defeating DEP - execute system()
- 2018.06 [pediy] [原創]Easy MPEG to DVD Burner 1.7.11 SEH + DEP Bypass Local Buffer Overflow
- 2018.05 [pediy] [翻譯]DEP緩解技術(一)
- 2017.12 [360] 利用緩解技術:數據執行保護(DEP)
- 2017.12 [0x00sec] Exploit Mitigation Techniques - Data Execution Prevention (DEP)
- 2017.10 [freebuf] 在64位系統中使用ROP+Return-to-dl-resolve來繞過ASLR+DEP
- 2017.10 [freebuf] 如何在32位系統中使用ROP+Return-to-dl來繞過ASLR+DEP
- 2017.08 [pediy] [原創]利用Ret2Libc挑戰DEP——利用ZwSetInformationProcess
- 2017.06 [360] ropasaurusrex:ROP入門教程——DEP(下)
- 2017.06 [360] ropasaurusrex:ROP入門教程——DEP(上)
- 2017.05 [myonlinesecurity] fake clothing order Berhanu (PURCHASE DEPARTMENT) using winace files delivers Loki bot
Procmon
- 2017.06 [lowleveldesign] How to decode managed stack frames in procmon traces
- 2017.02 [lowleveldesign] When procmon trace is not enough
- 2016.09 [dist67] Malware: Process Explorer & Procmon
- 2015.06 [guyrleech] Advanced Procmon Part 2 – Filtering inclusions
- 2014.12 [guyrleech] Advanced Procmon Part 1 – Filtering exclusions
Linux
ELF
工具
- [ 930星][15d] [Py] eliben/pyelftools Parsing ELF and DWARF in Python
- [ 787星][2m] [C] nixos/patchelf A small utility to modify the dynamic linker and RPATH of ELF executables
- [ 411星][9m] [Assembly] mewmew/dissection The dissection of a simple "hello world" ELF binary.
- [ 337星][9m] [Py] rek7/fireelf Fileless Linux Malware Framework
- [ 277星][4m] [Shell] cryptolok/aslray Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying
- [ 233星][2m] [C] elfmaster/libelfmaster Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools
文章
- 2019.10 [aliyun] 64 位elf 的one_gadget 通殺思路
- 2019.10 [HackersOnBoard] AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries
- 2019.10 [HackersOnBoard] Black Hat USA 2016 Intra-Process Memory Protection for App on ARM & X86 Leveraging the ELF ABI
- 2019.09 [freebuf] CVE-2018-6924:解析FreeBSD ELF 頭導致內核內存洩露
- 2019.07 [quarkslab] CVE-2018-6924: FreeBSD ELF Header Parsing Kernel Memory Disclosure
- 2019.07 [trendmicro] A Quick and Efficient Method For Locating the main() function of Linux ELF Malware Variants
- 2019.05 [0x00sec] Doubt infect ELF
- 2019.04 [guitmz] Linux ELF Runtime Crypter
- 2019.03 [guitmz] Running ELF executables from memory
- 2019.02 [icyphox] Python for Reverse Engineering #1: ELF Binaries
- 2019.01 [aliyun] 聖誕老人的ELFs:在沒有execve的情況下運行Linux可執行文件
- 2019.01 [freebuf] Pwntools之DynELF原理探究
- 2019.01 [rapid7] Santa's ELFs: Running Linux Executables Without execve
- 2018.12 [360] Linux系統內存執行ELF的多種方式
- 2018.12 [ZeroNights] Yaroslav Moskvin - ELF execution in Linux RAM
- 2018.11 [k3170makan] Introduction to the ELF Format (Part VII): Dynamic Linking / Loading and the .dynamic section
- 2018.10 [k3170makan] Introduction to the ELF Format (Part VI) : More Relocation tricks - r_addend execution (Part 3)
- 2018.10 [k3170makan] Introduction to The ELF Format (Part VI): The Symbol Table and Relocations (Part 2)
- 2018.10 [k3170makan] Introduction to the ELF Format (Part VI) : The Symbol Table and Relocations (Part 1)
- 2018.10 [k3170makan] Introduction to the ELF Format (Part V) : Understanding C start up .init_array and .fini_array sections
工具
新添加
- [ 1450星][2m] [C] feralinteractive/gamemode Optimise Linux system performance on demand
- [ 1413星][21d] [C++] google/nsjail A light-weight process isolation tool, making use of Linux namespaces and seccomp-bpf syscall filters (with help of the kafel bpf language)
- [ 895星][29d] [C] buserror/simavr simavr is a lean, mean and hackable AVR simulator for linux & OSX
- [ 759星][1m] [Py] korcankaraokcu/pince A reverse engineering tool that'll supply the place of Cheat Engine for linux
- [ 741星][2m] [C] yrp604/rappel A linux-based assembly REPL for x86, amd64, armv7, and armv8
- [ 731星][17d] [C] strace/strace strace is a diagnostic, debugging and instructional userspace utility for Linux
- [ 570星][12m] [C] asamy/ksm 快速、hackable且簡單的x64 VT-x虛擬機管理程序,支持Windows和Linux
- [ 565星][12d] [C++] intel/linux-sgx Intel SGX for Linux*
- [ 560星][2m] [Py] autotest/autotest Fully automated tests on Linux
- [ 536星][5m] [C++] nytrorst/shellcodecompiler 將C/C ++樣式代碼編譯成一個小的、與位置無關且無NULL的Shellcode,用於Windows(x86和x64)和Linux(x86和x64)
- [ 509星][8m] [C] iovisor/ply Dynamic Tracing in Linux
- [ 468星][9d] [C] libreswan/libreswan an Internet Key Exchange (IKE) implementation for Linux.
- [ 441星][12d] [C] facebook/openbmc OpenBMC is an open software framework to build a complete Linux image for a Board Management Controller (BMC).
- [ 405星][10m] [Shell] microsoft/linux-vm-tools Hyper-V Linux Guest VM Enhancements
- [ 393星][2m] [Shell] yadominjinta/atilo Linux installer for termux
- [ 354星][2m] [C] seccomp/libseccomp an easy to use, platform independent, interface to the Linux Kernel's syscall filtering mechanism
- [ 331星][5m] [Go] capsule8/capsule8 對雲本地,容器和傳統的基於Linux 的服務器執行高級的行為監控
- [ 282星][2m] [Py] facebook/fbkutils A variety of utilities built and maintained by Facebook's Linux Kernel Team that we wish to share with the community.
- [ 228星][8m] [C] wkz/ply Light-weight Dynamic Tracer for Linux
文章
新添加
貢獻
內容為系統自動導出, 有任何問題請提issue