Reverse Engineering
Browse 9 cybersecurity tools tagged with "Reverse Engineering"
Reverse Engineering Challenges
Cyber Range Training
Reverse Engineering Challenges on SecurityListing: A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.
Dr. Fu's Security
Guides
Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach on SecurityListing: A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.
Reversing and Exploiting
Offensive Security
Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
Hardwear.io Conference 2018
Guides
Hardwear.io Conference 2018 on SecurityListing: Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.
SmaliHook
Mobile App Security
SmaliHook on SecurityListing: Original SmaliHook Java source for Android cracking and reversing.
edb
Digital Forensics and Incident Response
edb on SecurityListing: edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.
Reversing With Lena
Guides
Reversing With Lena (Tutorials) on SecurityListing: Educational resources for reverse engineering tutorials by lena151.
Reverse Engineering for
Guides
Reverse Engineering for Beginners on SecurityListing: A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.
Security Trainings
Guides
Security Trainings on SecurityListing: Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.