Reverse Engineering
Browse 9 cybersecurity tools tagged with "Reverse Engineering"

Reverse Engineering Challenges
Cyber Range Training
Reverse Engineering Challenges on SecurityListing: A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

Dr. Fu's Security
Guides
Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach on SecurityListing: A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.

Reversing and Exploiting
Offensive Security
Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

Hardwear.io Conference 2018
Guides
Hardwear.io Conference 2018 on SecurityListing: Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.

SmaliHook
Mobile App Security
SmaliHook on SecurityListing: Original SmaliHook Java source for Android cracking and reversing.

edb
Digital Forensics and Incident Response
edb on SecurityListing: edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.

Reversing With Lena
Guides
Reversing With Lena (Tutorials) on SecurityListing: Educational resources for reverse engineering tutorials by lena151.

Reverse Engineering for
Guides
Reverse Engineering for Beginners on SecurityListing: A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

Security Trainings
Guides
Security Trainings on SecurityListing: Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.