From 02f91e3feb5735b5b727fff0ea89e9053a7fa39c Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Mon, 25 Dec 2017 23:57:11 -0500 Subject: [PATCH] adding reverse engineering and mobile security references --- mobile_security/README.md | 9 ++++++-- reverse_engineering/README.md | 40 +++++++++++++++++++++++++++++++++++ 2 files changed, 47 insertions(+), 2 deletions(-) create mode 100644 reverse_engineering/README.md diff --git a/mobile_security/README.md b/mobile_security/README.md index 0a8c3a6..5110f63 100644 --- a/mobile_security/README.md +++ b/mobile_security/README.md @@ -18,8 +18,13 @@ The following are several of the resources covered in the Wireless Networks, IoT ## Android -### Android Studio -* https://developer.android.com/sdk/index.html +### Android Research and Reverse Tools +* [Android Developer Studio](http://developer.android.com/sdk/index.html) +* [APKtool](http://ibotpeaches.github.io/Apktool/) +* [dex2jar](https://github.com/pxb1988/dex2jar) +* [Bytecode Viewer](https://bytecodeviewer.com/) +* [IDA Pro](https://www.hex-rays.com/products/ida/index.shtml) + ### Android Reverse Engineering Arsenals * https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=M-Tools diff --git a/reverse_engineering/README.md b/reverse_engineering/README.md new file mode 100644 index 0000000..67ff5c5 --- /dev/null +++ b/reverse_engineering/README.md @@ -0,0 +1,40 @@ +# Reverse Engineer References + +## Hex Editors + +* [010 Editor](http://www.sweetscape.com/010editor/) +* [Hex Workshop](http://www.hexworkshop.com/) +* [HexFiend](http://ridiculousfish.com/hexfiend/) +* [Hiew](http://www.hiew.ru/) +* [HxD](https://mh-nexus.de/en/hxd/) + +## Disassemblers + +* [Binary Ninja](https://binary.ninja/) +* [Capstone](http://www.capstone-engine.org/) +* [fREedom](https://github.com/cseagle/fREedom) +* [Hopper](http://hopperapp.com/) +* [IDA Pro](https://www.hex-rays.com/products/ida/index.shtml) +* [JEB](https://www.pnfsoftware.com/jeb2/) +* [objdump](http://linux.die.net/man/1/objdump) +* [Radare](http://www.radare.org/r/) + +## Awesome Reversing +* https://github.com/fdivrp/awesome-reversing - a plethora of references of tools, practice sites, and other reverse engineering information + +## Reverse Engineering Tutorials + +* [ARM Assembly Basics](https://azeria-labs.com/writing-arm-assembly-part-1/) +* [Binary Auditing Course](http://www.binary-auditing.com/) +* [Corelan Training](https://www.corelan-training.com/) +* [Dr. Fu's Malware Analysis](http://fumalwareanalysis.blogspot.sg/p/malware-analysis-tutorials-reverse.html) +* [Legend of Random](https://tuts4you.com/download.php?list.97) +* [Lenas Reversing for Newbies](https://tuts4you.com/download.php?list.17) +* [Modern Binary Exploitation](http://security.cs.rpi.edu/courses/binexp-spring2015/) +* [Offensive and Defensive Android Reversing](https://github.com/rednaga/training/raw/master/DEFCON23/O%26D%20-%20Android%20Reverse%20Engineering.pdf) +* [Offensive Security](https://www.offensive-security.com/information-security-training/) +* [Open Security Training](http://opensecuritytraining.info/Training.html) +* [REcon Training](https://recon.cx/2015/training.html) +* [Reverse Engineering Malware 101](https://securedorg.github.io/RE101/) +* [RPISEC Malware Course](https://github.com/RPISEC/Malware) +* [TiGa's Video Tutorials](http://www.woodmann.com/TiGa/)