Radare2 Tutorials for beginners

Radare2 Archives - MOVEAX.ME 有一系列的教程, 非常适合初学者. Radare Basics - MOVEAX.ME - 教授了几个常用的命令 Crackme0x01 Dissected with Radare2 - MOVEAX.ME - 第一个 crackme, 最紧要它有 YouTube Video 一步步讲解. Crackme0x02 Dissected with Radare2 - MOVEAX.ME - 第二个 crackme, 讲述了两种方法 CTF. 其中一个是 nop. 同样有 YouTube Video.…

Uncovering OWASP’s Mobile Risks in iOS Apps - Patrick Wardle - OWASP AppSec California 2015

On YouTube Synack at AppSec California with Patrick Wardle from Synack Slide 讲座中提及的Tools iOSOpenDev filemon - An FSEvents client 讲座中提及的exploit PuffChat Steal WhatsApp database (PoC) | Bas Bosschert Snapchat Security Disclosure - Gibson Security iOS App File Structure App Binary App Binary Decryption GitHub - dumpdecrypted 未知与Clutch有何不同. iOS Reverse Engineering Techniques…

frida-cycript

项目地址: nowsecure/frida-cycript: Cycript fork powered by Frida Prerequisite Node 使用6.10.3 - nvm alias default 6.10.3 Readline - Mac 自带 readline, brew install readline会将 readline 安装为 keg-only. brew info readline brew switch readline 6.3.8 ls -la /usr/local/opt/readline/lib - 查看安装情况 更改…

iOS Security Bypass

Login bypass iOS App Hacking - Myriam iOS Security App Released (For Beginners) - YouTube Jailbreak detection bypass iOS Application Hacking - Bypassing In-App Locks (Reverse Engineering) - YouTube Michael Gianarakis - iOS Runtime Hacking Crash Course Watch on YouTube class-dump-z -aAkRzb Evernote >> evernote_dump ANZJailbreakDetector.messages['isDeviceJailBroken']…

Reverse Engineering iOS Apps

Reverse Engineering iOS Apps | White Hack 本篇文章介绍了, 如何使用 Hopper, cycript, otool, MachOView. $ otool -l App | grep -A 4 LC_ENCRYPTION [If cryptid=1, you need to crack it. If cryptid=0, you’re good to go] $ otool -l App [All load commands, very useful] $ otool -f -a -h -v App…