├── .gitignore └── history └── ReverseEngineering_20191223120344.md /.gitignore: -------------------------------------------------------------------------------- 1 | .directory 2 | -------------------------------------------------------------------------------- /history/ReverseEngineering_20191223120344.md: -------------------------------------------------------------------------------- 1 | # 所有收集类项目: 2 | - [收集的所有开源工具](https://github.com/alphaSeclab/sec-tool-list): 超过18K, 包括Markdown和Json两种格式 3 | - [逆向资源](https://github.com/alphaSeclab/awesome-reverse-engineering): IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/iOS安全/Window安全/Linux安全/macOS安全/游戏Hacking/Bootkit/Rootkit/Angr/Shellcode/进程注入/代码注入/DLL注入/WSL/Sysmon/... 4 | - [网络相关的安全资源](https://github.com/alphaSeclab/awesome-network-stuff): 代理/GFW/反向代理/隧道/VPN/Tor/I2P,以及中间人/PortKnocking/嗅探/网络分析/网络诊断等 5 | - [攻击性网络安全资源](https://github.com/alphaSeclab/awesome-cyber-security): 漏洞/渗透/物联网安全/数据渗透/Metasploit/BurpSuite/KaliLinux/C&C/OWASP/免杀/CobaltStrike/侦查/OSINT/社工/密码/凭证/威胁狩猎/Payload/WifiHacking/无线攻击/后渗透/提权/UAC绕过/... 6 | 7 | 8 | 9 | 10 | # ReverseEngineering 11 | 12 | 13 | - 跟逆向有关的资源收集。当前包括的工具个数4600+,并根据功能进行了粗糙的分类。部分工具添加了中文描述。当前包括文章数600左右。 14 | - 此页只包含部分内容. [查看完整版](https://github.com/alphaSeclab/awesome-reverse-engineering/blob/master/Readme_full.md) 15 | 16 | 17 | 18 | # 说明 19 | [EnglishVersion](https://github.com/alphaSeclab/awesome-reverse-engineering/blob/master/Readme_en.md) 20 | 21 | 22 | # 目录 23 | - [IDA](#08e59e476824a221f6e4a69c0bba7d63) 24 | - [插件&&脚本](#f11ab1ff46aa300cc3e86528b8a98ad7) 25 | - [(97) 未分类](#c39a6d8598dde6abfeef43faf931beb5) 26 | - [结构体&&类的检测&&创建&&恢复](#fb4f0c061a72fc38656691746e7c45ce) 27 | - [(6) 未分类](#fa5ede9a4f58d4efd98585d3158be4fb) 28 | - [(8) C++类&&虚表](#4900b1626f10791748b20630af6d6123) 29 | - [(3) 收集](#a7dac37cd93b8bb42c7d6aedccb751b3) 30 | - [(9) 外观&&主题](#fabf03b862a776bbd8bcc4574943a65a) 31 | - [(4) 固件&&嵌入式设备](#a8f5db3ab4bc7bc3d6ca772b3b9b0b1e) 32 | - [签名(FLIRT等)&&比较(Diff)&&匹配](#02088f4884be6c9effb0f1e9a3795e58) 33 | - [(17) 未分类](#cf04b98ea9da0056c055e2050da980c1) 34 | - [FLIRT签名](#19360afa4287236abe47166154bc1ece) 35 | - [(3) FLIRT签名收集](#1c9d8dfef3c651480661f98418c49197) 36 | - [(2) FLIRT签名生成](#a9a63d23d32c6c789ca4d2e146c9b6d0) 37 | - [(11) Diff&&Match工具](#161e5a3437461dc8959cc923e6a18ef7) 38 | - [(7) Yara](#46c9dfc585ae59fe5e6f7ddf542fb31a) 39 | - [(6) IDB操作](#5e91b280aab7f242cbc37d64ddbff82f) 40 | - [(5) 协作逆向&&多人操作相同IDB文件](#206ca17fc949b8e0ae62731d9bb244cb) 41 | - [(9) 与调试器同步&&通信&&交互](#f7d311685152ac005cfce5753c006e4b) 42 | - [导入导出&与其他工具交互](#6fb7e41786c49cc3811305c520dfe9a1) 43 | - [(13) 未分类](#8ad723b704b044e664970b11ce103c09) 44 | - [(5) Ghidra](#c7066b0c388cd447e980bf0eb38f39ab) 45 | - [(3) BinNavi](#11139e7d6db4c1cef22718868f29fe12) 46 | - [(3) BinaryNinja](#d1ff64bee76f6749aef6100d72bfbe3a) 47 | - [(2) Radare2](#21ed198ae5a974877d7a635a4b039ae3) 48 | - [(4) Frida](#a1cf7f7f849b4ca2101bd31449c2a0fd) 49 | - [(2) IntelPin](#dd0332da5a1482df414658250e6357f8) 50 | - [针对特定分析目标](#004c199e1dbf71769fbafcd8e58d1ead) 51 | - [(26) 未分类](#5578c56ca09a5804433524047840980e) 52 | - [(2) GoLang](#1b17ac638aaa09852966306760fda46b) 53 | - [(4) Windows驱动](#4c158ccc5aee04383755851844fdd137) 54 | - [(4) PS3&&PS4](#315b1b8b41c67ae91b841fce1d4190b5) 55 | - [(33) Loader&Processor](#cb59d84840e41330a7b5e275c0b81725) 56 | - [(4) PDB](#f5e51763bb09d8fd47ee575a98bedca1) 57 | - [(2) Flash&&SWF](#7d0681efba2cf3adaba2780330cd923a) 58 | - [(4) 特定样本家族](#841d605300beba45c3be131988514a03) 59 | - [(1) CTF](#ad44205b2d943cfa2fa805b2643f4595) 60 | - [IDAPython本身](#ad68872e14f70db53e8d9519213ec039) 61 | - [(8) 未分类](#2299bc16945c25652e5ad4d48eae8eca) 62 | - [(1) cheatsheets](#c42137cf98d6042372b1fd43c3635135) 63 | - [(6) 指令参考&文档](#846eebe73bef533041d74fc711cafb43) 64 | - [辅助脚本编写](#c08ebe5b7eec9fc96f8eff36d1d5cc7d) 65 | - [(9) 未分类](#45fd7cfce682c7c25b4f3fbc4c461ba2) 66 | - [(3) Qt](#1a56a5b726aaa55ec5b7a5087d6c8968) 67 | - [(3) 控制台&&窗口界面](#1721c09501e4defed9eaa78b8d708361) 68 | - [(2) 插件模板](#227fbff77e3a13569ef7b007344d5d2e) 69 | - [(2) 其他语言](#8b19bb8cf9a5bc9e6ab045f3b4fabf6a) 70 | - [(16) 古老的](#dc35a2b02780cdaa8effcae2b6ce623e) 71 | - [调试&&动态运行&动态数据](#e3e7030efc3b4de3b5b8750b7d93e6dd) 72 | - [(10) 未分类](#2944dda5289f494e5e636089db0d6a6a) 73 | - [(10) DBI数据](#0fbd352f703b507853c610a664f024d1) 74 | - [(4) 调试数据](#b31acf6c84a9506066d497af4e702bf5) 75 | - [(14) 反编译器&&AST](#d2166f4dac4eab7fadfe0fd06467fbc9) 76 | - [(7) 反混淆](#7199e8787c0de5b428f50263f965fda7) 77 | - [效率&&导航&&快速访问&&图形&&图像&&可视化 ](#fcf75a0881617d1f684bc8b359c684d7) 78 | - [(15) 其他](#c5b120e1779b928d860ad64ff8d23264) 79 | - [(9) 显示增强](#03fac5b3abdbd56974894a261ce4e25f) 80 | - [(3) 图形&&图像](#3b1dba00630ce81cba525eea8fcdae08) 81 | - [(3) 搜索](#8f9468e9ab26128567f4be87ead108d7) 82 | - [(7) Android](#66052f824f5054aa0f70785a2389a478) 83 | - [Apple&&macOS&&iXxx&&Objective-C&&SWift&&Mach-O](#2adc0044b2703fb010b3bf73b1f1ea4a) 84 | - [(5) 未分类](#8530752bacfb388f3726555dc121cb1a) 85 | - [(3) 内核缓存](#82d0fa2d6934ce29794a651513934384) 86 | - [(3) Mach-O](#d249a8d09a3f25d75bb7ba8b32bd9ec5) 87 | - [(3) Swift](#1c698e298f6112a86c12881fbd8173c7) 88 | - [(9) ELF](#e5e403123c70ddae7bd904d3a3005dbb) 89 | - [(5) Microcode](#7a2977533ccdac70ee6e58a7853b756b) 90 | - [(6) 模拟器集成](#b38dab81610be087bd5bc7785269b8cc) 91 | - [新添加的](#c39dbae63d6a3302c4df8073b4d1cdc8) 92 | - [(4) 作为辅助&&构成其他的一环](#83de90385d03ac8ef27360bfcdc1ab48) 93 | - [漏洞](#1ded622dca60b67288a591351de16f8b) 94 | - [(7) 未分类](#385d6777d0747e79cccab0a19fa90e7e) 95 | - [(2) ROP](#cf2efa7e3edb24975b92d2e26ca825d2) 96 | - [(7) 补丁&&Patch](#7d557bc3d677d206ef6c5a35ca8b3a14) 97 | - [(3) 其他](#7dfd8abad50c14cd6bdc8d8b79b6f595) 98 | - [函数相关](#90bf5d31a3897400ac07e15545d4be02) 99 | - [(4) 未分类](#347a2158bdd92b00cd3d4ba9a0be00ae) 100 | - [(6) 重命名&&前缀&&标记](#73813456eeb8212fd45e0ea347bec349) 101 | - [(5) 导航&&查看&&查找](#e4616c414c24b58626f834e1be079ebc) 102 | - [(2) demangle](#cadae88b91a57345d266c68383eb05c5) 103 | - [(3) 污点分析&&符号执行](#34ac84853604a7741c61670f2a075d20) 104 | - [(8) 字符串](#9dcc6c7dd980bec1f92d0cc9a2209a24) 105 | - [(3) 加密解密](#06d2caabef97cf663bd29af2b1fe270c) 106 | - [文章](#18c6a45392d6b383ea24b363d2f3e76b) 107 | - [(6) 系列文章-Labeless插件介绍](#04cba8dbb72e95d9c721fe16a3b48783) 108 | - [(24) 系列文章-使用IDA从零开始学逆向](#1a2e56040cfc42c11c5b4fa86978cc19) 109 | - [系列文章-IDAPython-让你的生活更美好](#e838a1ecdcf3d068547dd0d7b5c446c6) 110 | - [(6) 原文](#7163f7c92c9443e17f3f76cc16c2d796) 111 | - [(5) 译文](#fc62c644a450f3e977af313edd5ab124) 112 | - [工具&&插件&&脚本介绍](#3d3bc775abd7f254ff9ff90d669017c9) 113 | - [(56) 未分类](#cd66794473ea90aa6241af01718c3a7d) 114 | - [(3) Loader&&Processor](#43a4761e949187bf737e378819752c3b) 115 | - [(1) 与其他工具交互](#c7483f3b20296ac68084a8c866230e15) 116 | - [(10) Tips&&Tricks](#a4bd25d3dc2f0be840e39674be67d66b) 117 | - [(125) 未分类](#4187e477ebc45d1721f045da62dbf4e8) 118 | - [(5) 翻译-TheIDAProBook](#ea11818602eb33e8b165eb18d3710965) 119 | - [(2) 翻译-ReverseEngineeringCodeWithIDAPro](#ec5f7b9ed06500c537aa25851a3f2d3a) 120 | - [(5) 系列文章-使用IDA逆向C代码](#8433dd5df40aaf302b179b1fda1d2863) 121 | - [逆向实战](#d8e48eb05d72db3ac1e050d8ebc546e1) 122 | - [(11) 未分类](#374c6336120363a5c9d9a27d7d669bf3) 123 | - [(15) 恶意代码分析](#0b3e1936ad7c4ccc10642e994c653159) 124 | - [(2) 漏洞分析&&挖掘](#03465020d4140590326ae12c9601ecfd) 125 | - [(26) 新添加的](#37634a992983db427ce41b37dd9a98c2) 126 | - [(4) IDA本身](#2120fe5420607a363ae87f5d2fed459f) 127 | - [(1) Microcode](#e9ce398c2c43170e69c95fe9ad8d22fc) 128 | - [(1) IDA对抗](#9c0ec56f402a2b9938417f6ecbaeaa72) 129 | - [Ghidra](#319821036a3319d3ade5805f384d3165) 130 | - [插件&&脚本](#fa45b20f6f043af1549b92f7c46c9719) 131 | - [(11) 新添加的](#ce70b8d45be0a3d29705763564623aca) 132 | - [特定分析目标](#69dc4207618a2977fe8cd919e7903fa5) 133 | - [(4) 未分类](#da5d2b05da13f8e65aa26d6a1c95a8d0) 134 | - [(18) Loader&&Processor](#058bb9893323f337ad1773725d61f689) 135 | - [(2) Xbox](#51a2c42c6d339be24badf52acb995455) 136 | - [与其他工具交互](#99e3b02da53f1dbe59e0e277ef894687) 137 | - [(2) Radare2](#e1cc732d1388084530b066c26e24887b) 138 | - [未分类](#5923db547e1f04f708272543021701d2) 139 | - [(5) IDA](#d832a81018c188bf585fcefa3ae23062) 140 | - [(1) DBI](#60e86981b2c98f727587e7de927e0519) 141 | - [(1) 调试器](#e81053b03a859e8ac72f7fe79e80341a) 142 | - [(1) 外观&&主题](#cccbd06c6b9b03152d07a4072152ae27) 143 | - [(4) Ghidra](#2ae406afda6602c8f02d73678b2ff040) 144 | - [脚本编写](#45910c8ea12447df9cdde2bea425f23f) 145 | - [(1) 其他](#c12ccb8e11ba94184f8f24767eb64212) 146 | - [(1) 编程语言](#b24e162720cffd2d2456488571c1a136) 147 | - [文章&&视频](#273df546f1145fbed92bb554a327b87a) 148 | - [(30) 新添加的](#ce49901b4914f3688ef54585c8f9df1a) 149 | - [(8) Ghidra漏洞](#b7fb955b670df2babc67e5942297444d) 150 | - [实战分析](#dd0d49a5e6bd34b372d9bbf4475e8024) 151 | - [(3) 漏洞分析&&挖掘](#375c75af4fa078633150415eec7c867d) 152 | - [(9) 未分类](#f0ab053d7a282ab520c3a327fc91ba2e) 153 | - [(9) 恶意代码](#4e3f53845efe99da287b2cea1bdda97c) 154 | - [其他](#92f60c044ed13b3ffde631794edd2756) 155 | - [Tips&&Tricks](#4bfa6dcf708b3f896870c9d3638c0cde) 156 | - [(5) 工具&&插件&&脚本](#0d086cf7980f65da8f7112b901fecdc1) 157 | - [新添加的1](#8962bde3fbfb1d1130879684bdf3eed0) 158 | - [x64dbg](#b1a6c053e88e86ce01bbd78c54c63a7c) 159 | - [插件&&脚本](#b4a856db286f9f29b5a32d477d6b3f3a) 160 | - [(63) 新添加的](#da5688c7823802e734c39b539aa39df7) 161 | - [(1) x64dbg](#353ea40f2346191ecb828210a685f9db) 162 | - [文章&&视频](#22894d6f2255dc43d82dd46bdbc20ba1) 163 | - [OllyDbg](#37e37e665eac00de3f55a13dcfd47320) 164 | - [插件&&脚本](#7834e399e48e6c64255a1a0fdb6b88f5) 165 | - [(13) 新添加的](#92c44f98ff5ad8f8b0f5e10367262f9b) 166 | - [文章&&视频](#8dd3e63c4e1811973288ea8f1581dfdb) 167 | - [WinDBG](#0a506e6fb2252626add375f884c9095e) 168 | - [插件&&脚本](#37eea2c2e8885eb435987ccf3f467122) 169 | - [(66) 新添加的](#2ef75ae7852daa9862b2217dca252cc3) 170 | - [(9) 文章&&视频](#6d8bac8bfb5cda00c7e3bd38d64cbce3) 171 | - [Cuckoo](#0ae4ddb81ff126789a7e08b0768bd693) 172 | - [工具](#5830a8f8fb3af1a336053d84dd7330a1) 173 | - [(40) 新添加的](#f2b5c44c2107db2cec6c60477c6aa1d0) 174 | - [(15) 文章&&视频](#ec0a441206d9a2fe1625dce0a679d466) 175 | - [Radare2](#86cb7d8f548ca76534b5828cb5b0abce) 176 | - [插件&&脚本](#0e08f9478ed8388319f267e75e2ef1eb) 177 | - [(62) 新添加的](#6922457cb0d4b6b87a34caf39aa31dfe) 178 | - [(1) Radare2](#ec3f0b5c2cf36004c4dd3d162b94b91a) 179 | - [与其他工具交互](#1a6652a1cb16324ab56589cb1333576f) 180 | - [(4) 未分类](#dfe53924d678f9225fc5ece9413b890f) 181 | - [(3) IDA](#1cfe869820ecc97204a350a3361b31a7) 182 | - [(5) GUI](#f7778a5392b90b03a3e23ef94a0cc3c6) 183 | - [(168) 文章&&视频](#95fdc7692c4eda74f7ca590bb3f12982) 184 | - [BinaryNinja](#afb7259851922935643857c543c4b0c2) 185 | - [插件&&脚本](#3034389f5aaa9d7b0be6fa7322340aab) 186 | - [(58) 新添加的](#a750ac8156aa0ff337a8639649415ef1) 187 | - [与其他工具交互](#bba1171ac550958141dfcb0027716f41) 188 | - [(2) 未分类](#c2f94ad158b96c928ee51461823aa953) 189 | - [(3) IDA](#713fb1c0075947956651cc21a833e074) 190 | - [(7) 文章&&视频](#2d24dd6f0c01a084e88580ad22ce5b3c) 191 | - [DBI](#7ab3a7005d6aa699562b3a0a0c6f2cff) 192 | - [DynamoRIO](#c8cdb0e30f24e9b7394fcd5681f2e419) 193 | - [工具](#6c4841dd91cb173093ea2c8d0b557e71) 194 | - [(7) 新添加的](#ff0abe26a37095f6575195950e0b7f94) 195 | - [(2) DynamoRIO](#3a577a5b4730a1b5b3b325269509bb0a) 196 | - [(3) 与其他工具交互](#928642a55eff34b6b52622c6862addd2) 197 | - [(16) 文章&&视频](#9479ce9f475e4b9faa4497924a2e40fc) 198 | - [IntelPin](#7b8a493ca344f41887792fcc008573e7) 199 | - [工具](#fe5a6d7f16890542c9e60857706edfde) 200 | - [(18) 新添加的](#78a2edf9aa41eb321436cb150ea70a54) 201 | - [与其他工具交互](#e6a829abd8bbc5ad2e5885396e3eec04) 202 | - [(8) 未分类](#e129288dfadc2ab0890667109f93a76d) 203 | - [文章&&视频](#226190bea6ceb98ee5e2b939a6515fac) 204 | - [Frida](#f24f1235fd45a1aa8d280eff1f03af7e) 205 | - [工具](#a5336a0f9e8e55111bda45c8d74924c1) 206 | - [(100) 新添加的](#54836a155de0c15b56f43634cd9cfecf) 207 | - [与其他工具交互](#74fa0c52c6104fd5656c93c08fd1ba86) 208 | - [(1) 未分类](#00a86c65a84e58397ee54e85ed57feaf) 209 | - [(3) IDA](#d628ec92c9eea0c4b016831e1f6852b3) 210 | - [(2) BinaryNinja](#f9008a00e2bbc7535c88602aa79c8fd8) 211 | - [(2) Radare2](#ac053c4da818ca587d57711d2ff66278) 212 | - [(1) Frida](#6d3c24e43835420063f9ca50ba805f15) 213 | - [(25) 文章&&视频](#a1a7e3dd7091b47384c75dba8f279caf) 214 | - [其他](#5a9974bfcf7cdf9b05fe7a7dc5272213) 215 | - [模拟器&&虚拟机](#747ddaa20f643da415284bfba9cda3a2) 216 | - [QEMU](#796b64906655228d8a1ff8c0dd390451) 217 | - [工具](#296c7f25266b25e5ee1107dd76e40dd2) 218 | - [(42) 新添加的](#82072558d99a6cf23d4014c0ae5b420a) 219 | - [文章&&视频](#5df30a166c2473fdadf5a578d1a70e32) 220 | - [其他](#a13effff89633708c814ae9410da835a) 221 | - [Android](#11a59671b467a8cdbdd4ea9d5e5d9b51) 222 | - [工具](#2110ded2aa5637fa933cc674bc33bf21) 223 | - [(182) 新添加的](#883a4e0dd67c6482d28a7a14228cd942) 224 | - [(4) HotFix](#fa49f65b8d3c71b36c6924ce51c2ca0c) 225 | - [(1) 打包](#ec395c8f974c75963d88a9829af12a90) 226 | - [(2) 收集](#767078c52aca04c452c095f49ad73956) 227 | - [(1) 各类App](#17408290519e1ca7745233afea62c43c) 228 | - [(30) Xposed](#7f353b27e45b5de6b0e6ac472b02cbf1) 229 | - [(19) 加壳&&脱壳](#50f63dce18786069de2ec637630ff167) 230 | - [(12) HOOK](#596b6cf8fd36bc4c819335f12850a915) 231 | - [(9) Emulator&&模拟器](#5afa336e229e4c38ad378644c484734a) 232 | - [(6) IDA](#0a668d220ce74e11ed2738c4e3ae3c9e) 233 | - [(11) Debug&&调试](#bb9f8e636857320abf0502c19af6c763) 234 | - [(34) Malware&&恶意代码](#f975a85510f714ec3cc2551e868e75b8) 235 | - [(5) Obfuscate&&混淆](#1d83ca6d8b02950be10ac8e4b8a2d976) 236 | - [(15) ReverseEngineering](#6d2b758b3269bac7d69a2d2c8b45194c) 237 | - [(319) 新添加的1](#63fd2c592145914e99f837cecdc5a67c) 238 | - [(2) 文章&&视频](#f0493b259e1169b5ddd269b13cfd30e6) 239 | - [Apple&&iOS&&iXxx](#069664f347ae73b1370c4f5a2ec9da9f) 240 | - [工具](#58cd9084afafd3cd293564c1d615dd7f) 241 | - [(345) 新添加的](#d0108e91e6863289f89084ff09df39d0) 242 | - [(16) XCode](#7037d96c1017978276cb920f65be2297) 243 | - [(91) 越狱](#ff19d5d94315d035bbcb3ef0c348c75b) 244 | - [(8) LLDB](#c20772abc204dfe23f3e946f8c73dfda) 245 | - [文章&&视频](#c97bbe32bbd26c72ceccb43400e15bf1) 246 | - [Windows](#2f81493de610f9b796656b269380b2de) 247 | - [工具](#b478e9a9a324c963da11437d18f04998) 248 | - [(213) 其他](#1afda3039b4ab9a3a1f60b179ccb3e76) 249 | - [(10) 事件日志&&事件追踪&&ETW](#0af4bd8ca0fd27c9381a2d1fa8b71a1f) 250 | - [(12) Sysmon](#d48f038b58dc921660be221b4e302f70) 251 | - [(18) WSL](#8ed6f25b321f7b19591ce2908b30cc88) 252 | - [(10) .NET](#d90b60dc79837e06d8ba2a7ee1f109d3) 253 | - [新添加的](#f9fad1d4d1f0e871a174f67f63f319d8) 254 | - [(5) Environment&&环境&&配置](#6d2fe834b7662ecdd48c17163f732daf) 255 | - [进程注入](#8bfd27b42bb75956984994b3419fb582) 256 | - [(1) DLL注入](#b0d50ee42d53b1f88b32988d34787137) 257 | - [代码注入](#1c6069610d73eb4246b58d78c64c9f44) 258 | - [内存模块](#7c1541a69da4c025a89b0571d8ce73d2) 259 | - [(115) Shellcode](#16001cb2fae35b722deaa3b9a8e5f4d5) 260 | - [(6) VT&&虚拟化&&Hypbervisor](#19cfd3ea4bd01d440efb9d4dd97a64d0) 261 | - [(8) 内核&&驱动](#c3cda3278305549f4c21df25cbf638a4) 262 | - [(3) 注册表](#920b69cea1fc334bbc21a957dd0d9f6f) 263 | - [(4) 系统调用](#d295182c016bd9c2d5479fe0e98a75df) 264 | - [加壳&&脱壳](#a82bb5fff6cb644fb34db2b257f2061b) 265 | - [(25) 新添加的](#ccd2a4f85dbac99ccbedc745c2768f01) 266 | - [(1) Themida](#197f3a24a98c86c065273c3121d13f3b) 267 | - [VMProtect](#d4b660c75f60ee317569b6eac48e117f) 268 | - [文章](#3939f5e83ca091402022cb58e0349ab8) 269 | - [(48) Themida](#cd60c8e438bde4b3da791eabf845f679) 270 | - [Linux](#dc664c913dc63ec6b98b47fcced4fdf0) 271 | - [(101) 工具](#89e277bca2740d737c1aeac3192f374c) 272 | - [文章](#f6d78e82c3e5f67d13d9f00c602c92f0) 273 | - [Hook](#3f1fde99538be4662dca6747a365640b) 274 | - [(252) 工具](#cfe974d48bbb90a930bf667c173616c7) 275 | - [Monitor&&监控&&Trace&&追踪](#70e64e3147675c9bcd48d4f475396e7f) 276 | - [(29) 工具](#cd76e644d8ddbd385939bb17fceab205) 277 | - [Malware&&恶意代码](#09fa851959ff48f5667a2099c861eab8) 278 | - [(574) 工具](#e781a59e4f4daab058732cf66f77bfb9) 279 | - [Game&&游戏](#28aa8187f8a1e38ca5a55aa31a5ee0c3) 280 | - [(180) 工具](#07f0c2cbf63c1d7de6f21fa43443ede3) 281 | - [其他](#d3690e0b19c784e104273fe4d64b2362) 282 | - [ 文章-新添加的](#9162e3507d24e58e9e944dd3f6066c0e) 283 | - [(284) 工具-新添加的](#1d9dec1320a5d774dc8e0e7604edfcd3) 284 | - [(3) 工具-其他](#bc2b78af683e7ba983205592de8c3a7a) 285 | - [angr](#4fe330ae3e5ce0b39735b1bfea4528af) 286 | - [(26) 工具](#1ede5ade1e55074922eb4b6386f5ca65) 287 | - [文章](#042ef9d415350eeb97ac2539c2fa530e) 288 | - [Debug&&调试](#324874bb7c3ead94eae6f1fa1af4fb68) 289 | - [(116) 工具](#d22bd989b2fdaeda14b64343b472dfb6) 290 | - [文章](#136c41f2d05739a74c6ec7d8a84df1e8) 291 | - [BAP](#9f8d3f2c9e46fbe6c25c22285c8226df) 292 | - [(26) 工具](#f10e9553770db6f98e8619dcd74166ef) 293 | - [文章](#e111826dde8fa44c575ce979fd54755d) 294 | - [BinNavi](#2683839f170250822916534f1db22eeb) 295 | - [(3) 工具](#2e4980c95871eae4ec0e76c42cc5c32f) 296 | - [文章](#ff4dc5c746cb398d41fb69a4f8dfd497) 297 | - [Decompiler&&反编译器](#0971f295b0f67dc31b7aa45caf3f588f) 298 | - [(73) 工具](#e67c18b4b682ceb6716388522f9a1417) 299 | - [文章](#a748b79105651a8fd8ae856a7dc2b1de) 300 | - [Disassemble&&反汇编](#2df6d3d07e56381e1101097d013746a0) 301 | - [(30) 工具](#59f472c7575951c57d298aef21e7d73c) 302 | - [文章](#a6eb5a22deb33fc1919eaa073aa29ab5) 303 | - [GDB](#975d9f08e2771fccc112d9670eae1ed1) 304 | - [(80) 工具](#5f4381b0a90d88dd2296c2936f7e7f70) 305 | - [文章](#37b17362d72f9c8793973bc4704893a2) 306 | - [Captcha&&验证码](#9526d018b9815156cb001ceee36f6b1d) 307 | - [(55) 工具](#1c6fda19fd076dcbda3ad733d7349e44) 308 | - [文章](#685f244ad7368e43dbde0a0966095066) 309 | - [Rootkit&&Bootkit](#5fdcfc70dd87360c2dddcae008076547) 310 | - [(148) 工具](#b8d6f237c04188a10f511cd8988de28a) 311 | - [(100) 文章](#8645e29263f0886344127d352ebd6884) 312 | - [硬件](#069468057aac03c102abdbeb7a5decf6) 313 | - [固件](#3574d46dd09566f898b407cebe9df29b) 314 | - [(44) Firmware&&固件](#649d2aece91551af8b48d29f52943804) 315 | - [(3) Intel](#fff92e7d304e2c927ef3530f4d327456) 316 | - [Crypto&&加密&&算法](#948dbc64bc0ff4a03296988574f5238c) 317 | - [(117) 工具](#a6b0a9b9184fd78c8b87ccfe48a8e544) 318 | - [TODO](#35f8efcff18d0449029e9d3157ac0899) 319 | 320 | 321 | # TODO 322 | 323 | 324 | - 对工具进行更细致的分类 325 | - 为工具添加详细的中文描述,包括其内部实现原理和使用方式 326 | - 添加非Github repo 327 | - 补充文章 328 | - 修改已添加文章的描述 329 | 330 | 331 | # IDA 332 | 333 | 334 | *** 335 | 336 | 337 | ## 插件&&脚本 338 | 339 | 340 | - 以Github开源工具为主 341 | 342 | 343 | ### 新添加的 344 | 345 | 346 | 347 | 348 | ### 未分类 349 | 350 | 351 | - [**1058**星][9d] [Py] [fireeye/flare-ida](https://github.com/fireeye/flare-ida) 多工具 352 | - [StackStrings](https://github.com/fireeye/flare-ida/blob/master/plugins/stackstrings_plugin.py) 自动恢复手动构造的字符串 353 | - [Struct Typer](https://github.com/fireeye/flare-ida/blob/master/plugins/struct_typer_plugin.py) implements the struct typing described [here](https://www.mandiant.com/blog/applying-function-types-structure-fields-ida/) 354 | - [ApplyCalleeType](https://github.com/fireeye/flare-ida/blob/master/python/flare/apply_callee_type.py) specify or choose a function type for indirect calls as described [here](https://www.fireeye.com/blog/threat-research/2015/04/flare_ida_pro_script.html) 355 | - [argtracker](https://github.com/fireeye/flare-ida/blob/master/python/flare/argtracker.py) 识别函数使用的静态参数 356 | - [idb2pat](https://github.com/fireeye/flare-ida/blob/master/python/flare/idb2pat.py) FLIRT签名生成 357 | - [objc2_analyzer](https://github.com/fireeye/flare-ida/blob/master/python/flare/objc2_analyzer.py) 在目标Mach-O可执行文件的与Objective-C运行时相关的部分中定义的选择器引用及其实现之间创建交叉引用 358 | - [MSDN Annotations](https://github.com/fireeye/flare-ida/tree/master/python/flare/IDB_MSDN_Annotator) 从XML文件中提取MSDN信息,添加到IDB数据库中 359 | - [ironstrings](https://github.com/fireeye/flare-ida/tree/master/python/flare/ironstrings) 使用代码模拟执行(flare-emu), 恢复构造的字符串 360 | - [Shellcode Hashes](https://github.com/fireeye/flare-ida/tree/master/shellcode_hashes) 生成Hash数据库 361 | - [**737**星][7m] [Py] [devttys0/ida](https://github.com/devttys0/ida) IDA插件/脚本/模块收集 362 | - [wpsearch](https://github.com/devttys0/ida/blob/master/scripts/wpsearch.py) 查找在MIPS WPS checksum实现中常见的立即数 363 | - [md5hash](https://github.com/devttys0/ida/tree/master/modules/md5hash) 纯Python版的MD5 hash实现(IDA的hashlib有问题) 364 | - [alleycat](https://github.com/devttys0/ida/tree/master/plugins/alleycat) 查找向指定的函数内代码块的路径、查找两个或多个函数之间的路径、生成交互式调用图、可编程 365 | - [codatify](https://github.com/devttys0/ida/tree/master/plugins/codatify) 定义IDA自动化分析时miss的ASCII字符串、函数、代码。将data段的所有未定义字节转换为DWORD(于是IDA可识别函数和跳转表指针) 366 | - [fluorescence](https://github.com/devttys0/ida/tree/master/plugins/fluorescence) 高亮函数调用指令 367 | - [leafblower](https://github.com/devttys0/ida/tree/master/plugins/leafblower) 识别常用的POSIX函数:printf, sprintf, memcmp, strcpy等 368 | - [localxrefs](https://github.com/devttys0/ida/tree/master/plugins/localxrefs) 在当前函数内部查找所有对任意选择文本的引用 369 | - [mipslocalvars](https://github.com/devttys0/ida/tree/master/plugins/mipslocalvars) 对栈上只用于存储寄存器的变量进行命名,简化栈数据分析(MISP) 370 | - [mipsrop](https://github.com/devttys0/ida/tree/master/plugins/mipsrop) 在MIPS可执行代码中搜寻ROP。查找常见的ROP 371 | - [rizzo](https://github.com/devttys0/ida/tree/master/plugins/rizzo) 对2个或多个IDB之间的函数进行识别和重命名,基于:函数签名、对唯一字符串/常量的引用、模糊签名、调用图 372 | - [**318**星][2m] [C] [ohjeongwook/darungrim](https://github.com/ohjeongwook/darungrim) 软件补丁分析工具 373 | - [IDA插件](https://github.com/ohjeongwook/darungrim/tree/master/Src/IDAPlugin) 374 | - [DGEngine](https://github.com/ohjeongwook/darungrim/tree/master/Src/DGEngine) 375 | - [**277**星][4m] [Py] [jpcertcc/aa-tools](https://github.com/jpcertcc/aa-tools) 多脚本 376 | - [apt17scan.py](https://github.com/jpcertcc/aa-tools/blob/master/apt17scan.py) Volatility插件, 检测APT17相关的恶意代码并提取配置 377 | - [emdivi_postdata_decoder](https://github.com/jpcertcc/aa-tools/blob/master/emdivi_postdata_decoder.py) 解码Emdivi post的数据 378 | - [emdivi_string_decryptor](https://github.com/jpcertcc/aa-tools/blob/master/emdivi_string_decryptor.py) IDAPython脚本, 解密Emdivi内的字符串 379 | - [citadel_decryptor](https://github.com/jpcertcc/aa-tools/tree/master/citadel_decryptor) Data decryption tool for Citadel 380 | - [adwind_string_decoder](https://github.com/jpcertcc/aa-tools/blob/master/adwind_string_decoder.py) Python script for decoding strings inside Adwind 381 | - [redleavesscan](https://github.com/jpcertcc/aa-tools/blob/master/redleavesscan.py) Volatility plugin for detecting RedLeaves and extracting its config 382 | - [datper_splunk](https://github.com/jpcertcc/aa-tools/blob/master/datper_splunk.py) Python script for detects Datper communication and adds result field to Splunk index 383 | - [datper_elk](https://github.com/jpcertcc/aa-tools/blob/master/datper_elk.py) Python script for detects Datper communication and adds result field to Elasticsearch index 384 | - [tscookie_decode](https://github.com/jpcertcc/aa-tools/blob/master/tscookie_decode.py) Python script for decrypting and parsing TSCookie configure data 385 | - [wellmess_cookie_decode](https://github.com/jpcertcc/aa-tools/blob/master/wellmess_cookie_decode.py) Python script for decoding WellMess's cookie data (support Python2) 386 | - [cobaltstrikescan](https://github.com/jpcertcc/aa-tools/blob/master/cobaltstrikescan.py) Volatility plugin for detecting Cobalt Strike Beacon and extracting its config 387 | - [tscookie_data_decode](https://github.com/jpcertcc/aa-tools/blob/master/tscookie_data_decode.py) Python script for decrypting and parsing TSCookie configure data 388 | 389 | 390 | ### 结构体&&类的检测&&创建&&恢复 391 | 392 | 393 | #### 未分类 394 | 395 | 396 | - [**931**星][16d] [OCaml] [airbus-seclab/bincat](https://github.com/airbus-seclab/bincat) 二进制代码静态分析工具。值分析(寄存器、内存)、污点分析、类型重建和传播(propagation)、前向/后向分析 397 | - 重复区段: [IDA->插件->污点分析](#34ac84853604a7741c61670f2a075d20) | 398 | - [**664**星][19d] [Py] [igogo-x86/hexrayspytools](https://github.com/igogo-x86/hexrayspytools) 结构体和类重建插件 399 | 400 | 401 | #### C++类&&虚表 402 | 403 | 404 | - [**607**星][3m] [Py] [0xgalz/virtuailor](https://github.com/0xgalz/virtuailor) 利用IDA调试获取的信息,自动创建C++的虚表 405 | - 重复区段: [IDA->插件->调试->调试数据](#b31acf6c84a9506066d497af4e702bf5) | 406 |
407 | 查看详情 408 | 409 | 410 | ## 静态部分: 411 | - 检测非直接调用 412 | - 利用条件断点, Hook非直接调用的值赋值过程 413 | 414 | ## 动态 部分 415 | - 创建虚表结构 416 | - 重命名函数和虚表地址 417 | - 给反汇编非直接调用添加结构偏移 418 | - 给非直接调用到虚表之间添加交叉引用 419 | 420 | ## 使用 421 | - File -> Script File -> Main.py(设置断点) -> IDA调试器执行 422 |
423 | 424 | 425 | 426 | 427 | 428 | 429 | ### 收集 430 | 431 | 432 | - [**1771**星][2d] [onethawt/idaplugins-list](https://github.com/onethawt/idaplugins-list) IDA插件收集 433 | - [**363**星][9m] [fr0gger/awesome-ida-x64-olly-plugin](https://github.com/fr0gger/awesome-ida-x64-olly-plugin) IDA x64DBG OllyDBG 插件收集 434 | - 重复区段: [x64dbg->插件->新添加的](#da5688c7823802e734c39b539aa39df7) | 435 | 436 | 437 | ### 外观&&主题 438 | 439 | 440 | - [**723**星][6m] [Py] [zyantific/idaskins](https://github.com/zyantific/idaskins) 皮肤插件 441 | 442 | 443 | ### 固件&&嵌入式设备 444 | 445 | 446 | - [**5228**星][1m] [Py] [refirmlabs/binwalk](https://github.com/ReFirmLabs/binwalk) 固件分析工具(命令行+IDA插件) 447 | - [IDA插件](https://github.com/ReFirmLabs/binwalk/tree/master/src/scripts) 448 | - [binwalk](https://github.com/ReFirmLabs/binwalk/tree/master/src/binwalk) 449 | - [**492**星][4m] [Py] [maddiestone/idapythonembeddedtoolkit](https://github.com/maddiestone/idapythonembeddedtoolkit) 自动分析嵌入式设备的固件 450 | 451 | 452 | ### 签名(FLIRT等)&&比较(Diff)&&匹配 453 | 454 | 455 | #### 未分类 456 | 457 | 458 | - [**421**星][30d] [C] [mcgill-dmas/kam1n0-community](https://github.com/McGill-DMaS/Kam1n0-Community) 汇编代码管理与分析平台(独立工具+IDA插件) 459 | - 重复区段: [IDA->插件->作为辅助](#83de90385d03ac8ef27360bfcdc1ab48) | 460 | - [IDA插件](https://github.com/McGill-DMaS/Kam1n0-Community/tree/master2.x/kam1n0-clients/ida-plugin) 461 | - [kam1n0](https://github.com/McGill-DMaS/Kam1n0-Community/tree/master2.x/kam1n0) 462 | 463 | 464 | #### FLIRT签名 465 | 466 | 467 | ##### FLIRT签名收集 468 | 469 | 470 | - [**605**星][1m] [Max] [maktm/flirtdb](https://github.com/Maktm/FLIRTDB) A community driven collection of IDA FLIRT signature files 471 | - [**321**星][5m] [push0ebp/sig-database](https://github.com/push0ebp/sig-database) IDA FLIRT Signature Database 472 | 473 | 474 | ##### FLIRT签名生成 475 | 476 | 477 | 478 | 479 | 480 | 481 | #### Diff&&Match工具 482 | 483 | 484 | - [**1554**星][5d] [Py] [joxeankoret/diaphora](https://github.com/joxeankoret/diaphora) program diffing 485 | - [**360**星][25d] [Py] [checkpointsw/karta](https://github.com/checkpointsw/karta) source code assisted fast binary matching plugin for IDA 486 | - [**332**星][1y] [Py] [joxeankoret/pigaios](https://github.com/joxeankoret/pigaios) A tool for matching and diffing source codes directly against binaries. 487 | 488 | 489 | #### Yara 490 | 491 | 492 | - [**449**星][2m] [Py] [polymorf/findcrypt-yara](https://github.com/polymorf/findcrypt-yara) 使用Yara规则查找加密常量 493 | - 重复区段: [IDA->插件->加密解密](#06d2caabef97cf663bd29af2b1fe270c) | 494 | 495 | 496 | 497 | 498 | ### IDB操作 499 | 500 | 501 | - [**316**星][6m] [Py] [williballenthin/python-idb](https://github.com/williballenthin/python-idb) idb 文件解析和分析工具 502 | 503 | 504 | ### 协作逆向&&多人操作相同IDB文件 505 | 506 | 507 | - [**508**星][11m] [Py] [idarlingteam/idarling](https://github.com/IDArlingTeam/IDArling) 多人协作插件 508 | - [**258**星][1y] [C++] [dga-mi-ssi/yaco](https://github.com/dga-mi-ssi/yaco) 利用Git版本控制,同步多人对相同二进制文件的修改 509 | 510 | 511 | ### 与调试器同步&&通信&&交互 512 | 513 | 514 | - [**471**星][5d] [C] [bootleg/ret-sync](https://github.com/bootleg/ret-sync) 在反汇编工具和调试器之间同步调试会话 515 | - 重复区段: [x64dbg->插件->新添加的](#da5688c7823802e734c39b539aa39df7) | 516 | - [GDB插件](https://github.com/bootleg/ret-sync/tree/master/ext_gdb) 517 | - [Ghidra插件](https://github.com/bootleg/ret-sync/tree/master/ext_ghidra) 518 | - [IDA插件](https://github.com/bootleg/ret-sync/tree/master/ext_ida) 519 | - [LLDB](https://github.com/bootleg/ret-sync/tree/master/ext_lldb) 520 | - [OD](https://github.com/bootleg/ret-sync/tree/master/ext_olly1) 521 | - [OD2](https://github.com/bootleg/ret-sync/tree/master/ext_olly2) 522 | - [WinDgb](https://github.com/bootleg/ret-sync/tree/master/ext_windbg/sync) 523 | - [x64dbg](https://github.com/bootleg/ret-sync/tree/master/ext_x64dbg) 524 | - [**292**星][10m] [C] [a1ext/labeless](https://github.com/a1ext/labeless) 在IDA和调试器之间无缝同步Label/注释等 525 | - [IDA插件](https://github.com/a1ext/labeless/tree/master/labeless_ida) 526 | - [OD](https://github.com/a1ext/labeless/tree/master/labeless_olly) 527 | - [OD2](https://github.com/a1ext/labeless/tree/master/labeless_olly2) 528 | - [x64dbg](https://github.com/a1ext/labeless/tree/master/labeless_x64dbg) 529 | 530 | 531 | ### 导入导出&与其他工具交互 532 | 533 | 534 | #### 未分类 535 | 536 | 537 | 538 | 539 | #### Ghidra 540 | 541 | 542 | - [**299**星][4m] [Py] [cisco-talos/ghida](https://github.com/cisco-talos/ghida) 在IDA中集成Ghidra反编译器 543 | - 重复区段: [Ghidra->插件->与其他工具交互->IDA](#d832a81018c188bf585fcefa3ae23062) | 544 | - [**238**星][9m] [Py] [daenerys-sre/source](https://github.com/daenerys-sre/source) 使IDA和Ghidra脚本通用, 无需修改 545 | - 重复区段: [Ghidra->插件->与其他工具交互->IDA](#d832a81018c188bf585fcefa3ae23062) | 546 | 547 | 548 | #### BinNavi 549 | 550 | 551 | - [**382**星][18d] [C++] [google/binexport](https://github.com/google/binexport) 将反汇编以Protocol Buffer的形式导出为PostgreSQL数据库, 导入到BinNavi中使用 552 | - 重复区段: [其他->BinNavi->工具](#2e4980c95871eae4ec0e76c42cc5c32f) | 553 | 554 | 555 | #### BinaryNinja 556 | 557 | 558 | 559 | 560 | #### Radare2 561 | 562 | 563 | 564 | 565 | #### Frida 566 | 567 | 568 | 569 | 570 | #### IntelPin 571 | 572 | 573 | 574 | 575 | 576 | 577 | ### 针对特定分析目标 578 | 579 | 580 | #### 未分类 581 | 582 | 583 | 584 | 585 | #### Loader&Processor 586 | 587 | 588 | - [**205**星][1y] [Py] [fireeye/idawasm](https://github.com/fireeye/idawasm) WebAssembly的加载器和解析器 589 | 590 | 591 | #### GoLang 592 | 593 | 594 | - [**376**星][9m] [Py] [sibears/idagolanghelper](https://github.com/sibears/idagolanghelper) 解析Go语言编译的二进制文件中的GoLang类型信息 595 | - [**297**星][2m] [Py] [strazzere/golang_loader_assist](https://github.com/strazzere/golang_loader_assist) 辅助Go逆向 596 | 597 | 598 | #### Windows驱动 599 | 600 | 601 | - [**306**星][1y] [Py] [fsecurelabs/win_driver_plugin](https://github.com/FSecureLABS/win_driver_plugin) A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers. 602 | - [**218**星][1y] [Py] [nccgroup/driverbuddy](https://github.com/nccgroup/driverbuddy) 辅助逆向Windows内核驱动 603 | 604 | 605 | #### PS3&&PS4 606 | 607 | 608 | 609 | 610 | #### PDB 611 | 612 | 613 | 614 | 615 | #### Flash&&SWF 616 | 617 | 618 | 619 | 620 | #### 特定样本家族 621 | 622 | 623 | 624 | 625 | #### CTF 626 | 627 | 628 | 629 | 630 | 631 | 632 | ### IDAPython本身 633 | 634 | 635 | #### 未分类 636 | 637 | 638 | - [**720**星][7d] [Py] [idapython/src](https://github.com/idapython/src) IDAPython源码 639 | - [**373**星][2m] [Py] [tmr232/sark](https://github.com/tmr232/sark) IDAPython的高级抽象 640 | 641 | 642 | #### cheatsheets 643 | 644 | 645 | - [**258**星][20d] [Py] [inforion/idapython-cheatsheet](https://github.com/inforion/idapython-cheatsheet) Scripts and cheatsheets for IDAPython 646 | 647 | 648 | 649 | 650 | ### 指令参考&文档 651 | 652 | 653 | - [**497**星][1y] [PLpgSQL] [nologic/idaref](https://github.com/nologic/idaref) 指令参考插件. 654 | - [**449**星][4m] [C++] [alexhude/friend](https://github.com/alexhude/friend) 反汇编显示增强, 文档增强插件 655 | - 重复区段: [IDA->插件->效率->其他](#c5b120e1779b928d860ad64ff8d23264) | 656 | 657 | 658 | ### 辅助脚本编写 659 | 660 | 661 | #### 未分类 662 | 663 | 664 | - [**282**星][1m] [Py] [fireeye/flare-emu](https://github.com/fireeye/flare-emu) 结合Unicorn引擎, 简化模拟脚本的编写 665 | - 重复区段: [IDA->插件->模拟器集成](#b38dab81610be087bd5bc7785269b8cc) | 666 | 667 | 668 | #### Qt 669 | 670 | 671 | 672 | 673 | #### 控制台&&窗口界面 674 | 675 | 676 | - [**269**星][30d] [Py] [eset/ipyida](https://github.com/eset/ipyida) 集成IPython控制台 677 | 678 | 679 | #### 插件模板 680 | 681 | 682 | 683 | 684 | #### 其他语言 685 | 686 | 687 | 688 | 689 | 690 | 691 | ### 古老的 692 | 693 | 694 | 695 | 696 | ### 调试&&动态运行&动态数据 697 | 698 | 699 | #### 未分类 700 | 701 | 702 | - [**395**星][1y] [C++] [cseagle/sk3wldbg](https://github.com/cseagle/sk3wldbg) 用Unicorn引擎做后端的调试插件 703 | - 重复区段: [IDA->插件->模拟器集成](#b38dab81610be087bd5bc7785269b8cc) | 704 | 705 | 706 | #### DBI数据 707 | 708 | 709 | - [**943**星][1y] [Py] [gaasedelen/lighthouse](https://github.com/gaasedelen/lighthouse) 从DBI中收集代码覆盖情况,在IDA/Binja中映射、浏览、查看 710 | - 重复区段: [DBI->IntelPin->工具->与其他工具交互->未分类](#e129288dfadc2ab0890667109f93a76d) |[DBI->Frida->工具->与其他工具交互->IDA](#d628ec92c9eea0c4b016831e1f6852b3) |[DBI->Frida->工具->与其他工具交互->BinaryNinja](#f9008a00e2bbc7535c88602aa79c8fd8) | 711 | - [coverage-frida](https://github.com/gaasedelen/lighthouse/blob/master/coverage/frida/README.md) 使用Frida收集信息 712 | - [coverage-pin](https://github.com/gaasedelen/lighthouse/blob/master/coverage/pin/README.md) 使用Pin收集覆盖信息 713 | - [插件](https://github.com/gaasedelen/lighthouse/blob/master/plugin/lighthouse_plugin.py) 支持IDA和BinNinja 714 | 715 | 716 | #### 调试数据 717 | 718 | 719 | - [**607**星][3m] [Py] [0xgalz/virtuailor](https://github.com/0xgalz/virtuailor) 利用IDA调试获取的信息,自动创建C++的虚表 720 | - 重复区段: [IDA->插件->结构体->C++类](#4900b1626f10791748b20630af6d6123) | 721 |
722 | 查看详情 723 | 724 | 725 | ## 静态部分: 726 | - 检测非直接调用 727 | - 利用条件断点, Hook非直接调用的值赋值过程 728 | 729 | ## 动态 部分 730 | - 创建虚表结构 731 | - 重命名函数和虚表地址 732 | - 给反汇编非直接调用添加结构偏移 733 | - 给非直接调用到虚表之间添加交叉引用 734 | 735 | ## 使用 736 | - File -> Script File -> Main.py(设置断点) -> IDA调试器执行 737 |
738 | 739 | 740 | - [**386**星][5m] [Py] [ynvb/die](https://github.com/ynvb/die) 使用IDA调试器收集动态运行信息, 辅助静态分析 741 | 742 | 743 | 744 | 745 | ### 反编译器&&AST 746 | 747 | 748 | - [**1672**星][7m] [C++] [yegord/snowman](https://github.com/yegord/snowman) Snowman反编译器,支持x86, AMD64, ARM。有独立的GUI工具、命令行工具、IDA/Radare2/x64dbg插件,也可以作为库使用 749 | - 重复区段: [x64dbg->插件->新添加的](#da5688c7823802e734c39b539aa39df7) | 750 | - [IDA插件](https://github.com/yegord/snowman/tree/master/src/ida-plugin) 751 | - [snowman](https://github.com/yegord/snowman/tree/master/src/snowman) QT界面 752 | - [nocode](https://github.com/yegord/snowman/tree/master/src/nocode) 命令行工具 753 | - [nc](https://github.com/yegord/snowman/tree/master/src/nc) 核心代码,可作为库使用 754 | - [**1329**星][1y] [C++] [rehints/hexrayscodexplorer](https://github.com/rehints/hexrayscodexplorer) 反编译插件, 多功能 755 | - 重复区段: [IDA->插件->效率->其他](#c5b120e1779b928d860ad64ff8d23264) | 756 |
757 | 查看详情 758 | 759 | 760 | - 自动类型重建 761 | - 虚表识别/导航(反编译窗口) 762 | - C-tree可视化与导出 763 | - 对象浏览 764 |
765 | 766 | 767 | - [**418**星][3m] [C++] [avast/retdec-idaplugin](https://github.com/avast/retdec-idaplugin) retdec 的 IDA 插件 768 | - [**235**星][7m] [Py] [patois/dsync](https://github.com/patois/dsync) 反汇编和反编译窗口同步插件 769 | - 重复区段: [IDA->插件->效率->其他](#c5b120e1779b928d860ad64ff8d23264) | 770 | 771 | 772 | ### 反混淆 773 | 774 | 775 | - [**1365**星][3m] [Py] [fireeye/flare-floss](https://github.com/fireeye/flare-floss) 自动从恶意代码中提取反混淆后的字符串 776 | - 重复区段: [IDA->插件->字符串](#9dcc6c7dd980bec1f92d0cc9a2209a24) | 777 | - [floss](https://github.com/fireeye/flare-floss/tree/master/floss) 778 | - [IDA插件](https://github.com/fireeye/flare-floss/blob/master/scripts/idaplugin.py) 779 | - [**304**星][4m] [C++] [rolfrolles/hexraysdeob](https://github.com/rolfrolles/hexraysdeob) 利用Hex-Rays microcode API破解编译器级别的混淆 780 | - 重复区段: [IDA->插件->Microcode](#7a2977533ccdac70ee6e58a7853b756b) | 781 | 782 | 783 | ### 效率&&导航&&快速访问&&图形&&图像&&可视化 784 | 785 | 786 | #### 其他 787 | 788 | 789 | - [**1329**星][1y] [C++] [rehints/hexrayscodexplorer](https://github.com/rehints/hexrayscodexplorer) 反编译插件, 多功能 790 | - 重复区段: [IDA->插件->反编译器](#d2166f4dac4eab7fadfe0fd06467fbc9) | 791 |
792 | 查看详情 793 | 794 | 795 | - 自动类型重建 796 | - 虚表识别/导航(反编译窗口) 797 | - C-tree可视化与导出 798 | - 对象浏览 799 |
800 | 801 | 802 | - [**449**星][4m] [C++] [alexhude/friend](https://github.com/alexhude/friend) 反汇编显示增强, 文档增强插件 803 | - 重复区段: [IDA->插件->指令参考](#846eebe73bef533041d74fc711cafb43) | 804 | - [**372**星][2m] [Py] [l4ys/lazyida](https://github.com/l4ys/lazyida) 若干快速访问功能, 扫描字符串格式化漏洞 805 | - 重复区段: [IDA->插件->字符串](#9dcc6c7dd980bec1f92d0cc9a2209a24) |[IDA->插件->漏洞->未分类](#385d6777d0747e79cccab0a19fa90e7e) | 806 |
807 | 查看详情 808 | 809 | 810 | ### 功能 811 | - 快速移除函数返回类型 812 | - 数据格式(format)快速转换 813 | - 扫描字符串格式化漏洞 814 | - 双击跳转vtable函数 815 | - 快捷键: w/c/v 816 |
817 | 818 | 819 | - [**329**星][3m] [Py] [pfalcon/scratchabit](https://github.com/pfalcon/scratchabit) 交互式反汇编工具, 有与IDAPython兼容的插件API 820 | - [**235**星][7m] [Py] [patois/dsync](https://github.com/patois/dsync) 反汇编和反编译窗口同步插件 821 | - 重复区段: [IDA->插件->反编译器](#d2166f4dac4eab7fadfe0fd06467fbc9) | 822 | 823 | 824 | #### 显示增强 825 | 826 | 827 | - [**208**星][27d] [Py] [patois/idacyber](https://github.com/patois/idacyber) 交互式数据可视化插件 828 | 829 | 830 | #### 图形&&图像 831 | 832 | 833 | - [**2569**星][5m] [Java] [google/binnavi](https://github.com/google/binnavi) 二进制分析IDE, 对反汇编代码的控制流程图和调用图进行探查/导航/编辑/注释.(IDA插件的作用是导出反汇编) 834 | 835 | 836 | #### 搜索 837 | 838 | 839 | 840 | 841 | 842 | 843 | ### Android 844 | 845 | 846 | - [**246**星][20d] [C++] [strazzere/android-scripts](https://github.com/strazzere/android-scripts) Android逆向脚本收集 847 | - 重复区段: [Android->工具->ReverseEngineering](#6d2b758b3269bac7d69a2d2c8b45194c) | 848 | 849 | 850 | ### Apple&&macOS&&iXxx&&Objective-C&&SWift&&Mach-O 851 | 852 | 853 | #### 未分类 854 | 855 | 856 | 857 | 858 | #### 内核缓存 859 | 860 | 861 | 862 | 863 | #### Mach-O 864 | 865 | 866 | 867 | 868 | #### Swift 869 | 870 | 871 | 872 | 873 | 874 | 875 | ### ELF 876 | 877 | 878 | 879 | 880 | ### Microcode 881 | 882 | 883 | - [**304**星][4m] [C++] [rolfrolles/hexraysdeob](https://github.com/rolfrolles/hexraysdeob) 利用Hex-Rays microcode API破解编译器级别的混淆 884 | - 重复区段: [IDA->插件->反混淆](#7199e8787c0de5b428f50263f965fda7) | 885 | 886 | 887 | ### 模拟器集成 888 | 889 | 890 | - [**504**星][12d] [Py] [alexhude/uemu](https://github.com/alexhude/uemu) 基于Unicorn的模拟器插件 891 | - [**395**星][1y] [C++] [cseagle/sk3wldbg](https://github.com/cseagle/sk3wldbg) 用Unicorn引擎做后端的调试插件 892 | - 重复区段: [IDA->插件->调试->未分类](#2944dda5289f494e5e636089db0d6a6a) | 893 | - [**282**星][1m] [Py] [fireeye/flare-emu](https://github.com/fireeye/flare-emu) 结合Unicorn引擎, 简化模拟脚本的编写 894 | - 重复区段: [IDA->插件->辅助脚本编写->未分类](#45fd7cfce682c7c25b4f3fbc4c461ba2) | 895 | 896 | 897 | ### 作为辅助&&构成其他的一环 898 | 899 | 900 | - [**1542**星][20d] [Py] [lifting-bits/mcsema](https://github.com/lifting-bits/mcsema) 将x86, amd64, aarch64二进制文件转换成LLVM字节码 901 | - [IDA7插件](https://github.com/lifting-bits/mcsema/tree/master/tools/mcsema_disass/ida7) 用于反汇编二进制文件并生成控制流程图 902 | - [IDA插件](https://github.com/lifting-bits/mcsema/tree/master/tools/mcsema_disass/ida) 用于反汇编二进制文件并生成控制流程图 903 | - [Binja插件](https://github.com/lifting-bits/mcsema/tree/master/tools/mcsema_disass/binja) 用于反汇编二进制文件并生成控制流程图 904 | - [mcsema](https://github.com/lifting-bits/mcsema/tree/master/mcsema) 905 | - [**421**星][30d] [C] [mcgill-dmas/kam1n0-community](https://github.com/McGill-DMaS/Kam1n0-Community) 汇编代码管理与分析平台(独立工具+IDA插件) 906 | - 重复区段: [IDA->插件->签名(FLIRT等)->未分类](#cf04b98ea9da0056c055e2050da980c1) | 907 | - [IDA插件](https://github.com/McGill-DMaS/Kam1n0-Community/tree/master2.x/kam1n0-clients/ida-plugin) 908 | - [kam1n0](https://github.com/McGill-DMaS/Kam1n0-Community/tree/master2.x/kam1n0) 909 | 910 | 911 | ### 漏洞 912 | 913 | 914 | #### 未分类 915 | 916 | 917 | - [**492**星][7m] [Py] [danigargu/heap-viewer](https://github.com/danigargu/heap-viewer) 查看glibc堆, 主要用于漏洞开发 918 | - [**372**星][2m] [Py] [l4ys/lazyida](https://github.com/l4ys/lazyida) 若干快速访问功能, 扫描字符串格式化漏洞 919 | - 重复区段: [IDA->插件->字符串](#9dcc6c7dd980bec1f92d0cc9a2209a24) |[IDA->插件->效率->其他](#c5b120e1779b928d860ad64ff8d23264) | 920 |
921 | 查看详情 922 | 923 | 924 | ### 功能 925 | - 快速移除函数返回类型 926 | - 数据格式(format)快速转换 927 | - 扫描字符串格式化漏洞 928 | - 双击跳转vtable函数 929 | - 快捷键: w/c/v 930 |
931 | 932 | 933 | 934 | 935 | #### ROP 936 | 937 | 938 | 939 | 940 | 941 | 942 | ### 补丁&&Patch 943 | 944 | 945 | - [**727**星][1y] [Py] [keystone-engine/keypatch](https://github.com/keystone-engine/keypatch) 汇编/补丁插件, 支持多架构, 基于Keystone引擎 946 | 947 | 948 | ### 其他 949 | 950 | 951 | 952 | 953 | ### 函数相关 954 | 955 | 956 | #### 未分类 957 | 958 | 959 | 960 | 961 | #### 重命名&&前缀&&标记 962 | 963 | 964 | - [**291**星][2m] [Py] [a1ext/auto_re](https://github.com/a1ext/auto_re) 自动化函数重命名 965 | 966 | 967 | #### 导航&&查看&&查找 968 | 969 | 970 | 971 | 972 | #### demangle 973 | 974 | 975 | 976 | 977 | 978 | 979 | ### 污点分析&&符号执行 980 | 981 | 982 | - [**931**星][16d] [OCaml] [airbus-seclab/bincat](https://github.com/airbus-seclab/bincat) 二进制代码静态分析工具。值分析(寄存器、内存)、污点分析、类型重建和传播(propagation)、前向/后向分析 983 | - 重复区段: [IDA->插件->结构体->未分类](#fa5ede9a4f58d4efd98585d3158be4fb) | 984 | 985 | 986 | ### 字符串 987 | 988 | 989 | - [**1365**星][3m] [Py] [fireeye/flare-floss](https://github.com/fireeye/flare-floss) 自动从恶意代码中提取反混淆后的字符串 990 | - 重复区段: [IDA->插件->反混淆](#7199e8787c0de5b428f50263f965fda7) | 991 | - [floss](https://github.com/fireeye/flare-floss/tree/master/floss) 992 | - [IDA插件](https://github.com/fireeye/flare-floss/blob/master/scripts/idaplugin.py) 993 | - [**372**星][2m] [Py] [l4ys/lazyida](https://github.com/l4ys/lazyida) 若干快速访问功能, 扫描字符串格式化漏洞 994 | - 重复区段: [IDA->插件->效率->其他](#c5b120e1779b928d860ad64ff8d23264) |[IDA->插件->漏洞->未分类](#385d6777d0747e79cccab0a19fa90e7e) | 995 |
996 | 查看详情 997 | 998 | 999 | ### 功能 1000 | - 快速移除函数返回类型 1001 | - 数据格式(format)快速转换 1002 | - 扫描字符串格式化漏洞 1003 | - 双击跳转vtable函数 1004 | - 快捷键: w/c/v 1005 |
1006 | 1007 | 1008 | 1009 | 1010 | ### 加密解密 1011 | 1012 | 1013 | - [**449**星][2m] [Py] [polymorf/findcrypt-yara](https://github.com/polymorf/findcrypt-yara) 使用Yara规则查找加密常量 1014 | - 重复区段: [IDA->插件->签名(FLIRT等)->Yara](#46c9dfc585ae59fe5e6f7ddf542fb31a) | 1015 | 1016 | 1017 | 1018 | 1019 | *** 1020 | 1021 | 1022 | ## 文章 1023 | 1024 | 1025 | ### 新添加的 1026 | 1027 | 1028 | - 2019.12 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P26)](https://medium.com/p/f3fc8d187258) 1029 | - 2019.12 [knownsec] [使用 IDA 处理 U-Boot 二进制流文件](https://blog.knownsec.com/2019/12/%e4%bd%bf%e7%94%a8-ida-%e5%a4%84%e7%90%86-u-boot-%e4%ba%8c%e8%bf%9b%e5%88%b6%e6%b5%81%e6%96%87%e4%bb%b6/) 1030 | - 2019.12 [venus] [使用 IDA 处理 U-Boot 二进制流文件](https://paper.seebug.org/1090/) 1031 | - 2019.11 [hexblog] [Extending IDA processor modules for GDB debugging](http://www.hexblog.com/?p=1371) 1032 | - 2019.11 [0x48] [使用IDA处理U-Boot二进制流文件](https://nobb.site/2019/11/29/0x57/) 1033 | - 2019.11 [aliyun] [使用IDA microcode去除ollvm混淆(上)](https://xz.aliyun.com/t/6749) 1034 | - 2019.10 [cisco] [New IDA Pro plugin provides TileGX support](https://blogs.cisco.com/security/talos/new-ida-pro-plugin-provides-tilegx-support) 1035 | - 2019.09 [cisco] [GhIDA: Ghidra decompiler for IDA Pro](https://blogs.cisco.com/security/talos/ghida-ghidra-decompiler-for-ida-pro) 1036 | - 2019.09 [cn0xroot] [Fix IDA Crash bug on osx 10.14](https://cn0xroot.com/2019/09/02/fix-ida-crash-bug-on-osx-10-14/) 1037 | - 2019.08 [hexblog] [IDA 7.4: IDAPython and Python 3](http://www.hexblog.com/?p=1355) 1038 | - 2019.08 [hexblog] [IDA 7.4: Turning off IDA 6.x compatibility in IDAPython by default](http://www.hexblog.com/?p=1352) 1039 | - 2019.06 [hitbsecconf] [#HITB2019AMS D1T2 - fn_fuzzy: Fast Multiple Binary Diffing Triage With IDA - Takahiro Haruyama](https://www.youtube.com/watch?v=kkvNebE9amY) 1040 | - 2019.05 [aliyun] [欺骗IDA F5参数识别](https://xz.aliyun.com/t/5186) 1041 | - 2019.05 [aliyun] [混淆IDA F5的一个小技巧-x64](https://xz.aliyun.com/t/4994) 1042 | - 2018.11 [4hou] [使用IDAPython自动映射二进制文件替换默认函数名](http://www.4hou.com/technology/14149.html) 1043 | - 2018.10 [WarrantyVoider] [Ida Pro Tutorial - Compare Reverse Engineering](https://www.youtube.com/watch?v=7-OytQJRwtE) 1044 | - 2018.06 [freebuf] [MindshaRE:如何利用IDA Python浏览WINDOWS内核](http://www.freebuf.com/articles/system/173269.html) 1045 | - 2018.05 [WarrantyVoider] [Tutorial - Debugging In Source Code With IDA Pro](https://www.youtube.com/watch?v=Jgb3KTVg-rY) 1046 | - 2018.03 [BinaryAdventure] [x86 In-Depth 4: Labeling Structs Properly in IDA Pro](https://www.youtube.com/watch?v=X3xCwNt2ZVY) 1047 | - 2017.12 [BinaryAdventure] [Understanding the IDAPython API Docs](https://www.youtube.com/watch?v=QwOOzSx5g3w) 1048 | 1049 | 1050 | ### 未分类 1051 | 1052 | 1053 | - 2018.05 [tradahacking] [使用IDA和辅助工具比较二进制文件](https://medium.com/p/651e62117695) 1054 | - 2018.04 [pediy] [[翻译]IDAPython-Book(Alexander Hanel)](https://bbs.pediy.com/thread-225920.htm) 1055 | - 2018.03 [hexblog] [IDA on non-OS X/Retina Hi-DPI displays](http://www.hexblog.com/?p=1180) 1056 | - 2018.03 [pediy] [[翻译]IDA v6.5 文本执行](https://bbs.pediy.com/thread-225514.htm) 1057 | - 2018.02 [pediy] [[原创]逆向技术之熟悉IDA工具](https://bbs.pediy.com/thread-224499.htm) 1058 | - 2018.01 [pediy] [[原创]ARM Linux下搭建IDA Pro远程调试环境](https://bbs.pediy.com/thread-224337.htm) 1059 | - 2018.01 [pediy] [[翻译]对抗IDA Pro调试器ARM反汇编的技巧](https://bbs.pediy.com/thread-223894.htm) 1060 | - 2017.12 [OALabs] [Debugging shellcode using BlobRunner and IDA Pro](https://www.youtube.com/watch?v=q9q8dy-2Jeg) 1061 | - 2017.12 [pediy] [[原创]IDA7.0 Mac 插件编译指南](https://bbs.pediy.com/thread-223211.htm) 1062 | - 2017.12 [pediy] [[原创]IDA 插件- FRIEND 的安装和使用](https://bbs.pediy.com/thread-223156.htm) 1063 | - 2017.12 [BinaryAdventure] [IDAPython Tutorial with example script](https://www.youtube.com/watch?v=5ehI2wgcSGo) 1064 | - 2017.11 [OALabs] [How To Defeat Anti-VM and Anti-Debug Packers With IDA Pro](https://www.youtube.com/watch?v=WlE8abc8V-4) 1065 | - 2017.11 [pediy] [[原创]IDAPython脚本分享 - 自动在JNI_OnLoad下断点](https://bbs.pediy.com/thread-222998.htm) 1066 | - 2017.11 [pediy] [[求助]IDA Pro调试so,附加完毕,跳到目标so基址,但是内容都是DCB伪指令?](https://bbs.pediy.com/thread-222646.htm) 1067 | - 2017.11 [OALabs] [IDA Pro Malware Analysis Tips](https://www.youtube.com/watch?v=qCQRKLaz2nQ) 1068 | - 2017.10 [hexblog] [IDA and common Python issues](http://www.hexblog.com/?p=1132) 1069 | - 2017.10 [pediy] [[分享]IDA + VMware 调试win7 x64](https://bbs.pediy.com/thread-221884.htm) 1070 | - 2017.06 [pediy] [[翻译]IDA Hex-Rays反编译器使用的一些小技巧](https://bbs.pediy.com/thread-218780.htm) 1071 | - 2017.06 [qmemcpy] [IDA series, part 2: debugging a .NET executable](https://qmemcpy.io/post/ida-series-2-debugging-net) 1072 | - 2017.06 [qmemcpy] [IDA series, part 1: the Hex-Rays decompiler](https://qmemcpy.io/post/ida-series-1-hex-rays) 1073 | 1074 | 1075 | ### Tips&&Tricks 1076 | 1077 | 1078 | - 2019.07 [kienbigmummy] [Cách export data trong IDA](https://medium.com/p/d4c8128704f) 1079 | - 2019.07 [hexacorn] [Batch decompilation with IDA / Hex-Rays Decompiler](http://www.hexacorn.com/blog/2019/07/04/batch-decompilation-with-ida-hex-rays-decompiler/) 1080 | - 2019.06 [openanalysis] [Disable ASLR for Easier Malware Debugging With x64dbg and IDA Pro](https://oalabs.openanalysis.net/2019/06/12/disable-aslr-for-easier-malware-debugging/) 1081 | - 2019.06 [OALabs] [Disable ASLR For Easier Malware Debugging With x64dbg and IDA Pro](https://www.youtube.com/watch?v=DGX7oZvdmT0) 1082 | - 2019.06 [openanalysis] [Reverse Engineering C++ Malware With IDA Pro: Classes, Constructors, and Structs](https://oalabs.openanalysis.net/2019/06/03/reverse-engineering-c-with-ida-pro-classes-constructors-and-structs/) 1083 | - 2019.06 [OALabs] [Reverse Engineering C++ Malware With IDA Pro](https://www.youtube.com/watch?v=o-FFGIloxvE) 1084 | - 2019.03 [aliyun] [IDA Pro7.0使用技巧总结](https://xz.aliyun.com/t/4205) 1085 | - 2018.06 [checkpoint] [Scriptable Remote Debugging with Windbg and IDA Pro](https://research.checkpoint.com/scriptable-remote-debugging-windbg-ida-pro/) 1086 | - 2015.07 [djmanilaice] [在PyCharm中编写IDAPython脚本时自动提示](http://djmanilaice.blogspot.com/2015/07/pycharm-for-your-ida-development.html) 1087 | - 2015.07 [djmanilaice] [使用IDA自动打开当前目录下的DLL和EXE](http://djmanilaice.blogspot.com/2015/07/auto-open-dlls-and-exe-in-current.html) 1088 | 1089 | 1090 | ### 系列文章-Labeless插件介绍 1091 | 1092 | 1093 | - 2018.10 [checkpoint] [Labeless Part 6: How to Resolve Obfuscated API Calls in the Ngioweb Proxy Malware - Check Point Research](https://research.checkpoint.com/labeless-part-6-how-to-resolve-obfuscated-api-calls-in-the-ngioweb-proxy-malware/) 1094 | - 2018.10 [checkpoint] [Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm. - Check Point Research](https://research.checkpoint.com/labeless-part-5-how-to-decrypt-strings-in-boleto-banking-malware-without-reconstructing-decryption-algorithm/) 1095 | - 2018.10 [checkpoint] [Labeless Part 4: Scripting - Check Point Research](https://research.checkpoint.com/labeless-part-4-scripting/) 1096 | - 2018.08 [checkpoint] [Labeless Part 3: How to Dump and Auto-Resolve WinAPI Calls in LockPos Point-of-Sale Malware - Check Point Research](https://research.checkpoint.com/19558-2/) 1097 | - 2018.08 [checkpoint] [Labeless Part 2: Installation - Check Point Research](https://research.checkpoint.com/installing-labeless/) 1098 | - 2018.08 [checkpoint] [Labeless Part 1: An Introduction - Check Point Research](https://research.checkpoint.com/labeless-an-introduction/) 1099 | 1100 | 1101 | ### 系列文章-使用IDA从零开始学逆向 1102 | 1103 | 1104 | - 2019.11 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P25)](https://medium.com/p/304110bdf635) 1105 | - 2019.10 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P24)](https://medium.com/p/66451e50163e) 1106 | - 2019.10 [tradahacking] [REVERSING WITH IDA FROM SCRATCH (P23)](https://medium.com/p/a03897f960be) 1107 | - 2019.09 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P21)](https://medium.com/p/17ce2ee804af) 1108 | - 2019.08 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P20)](https://medium.com/p/adc2bad58cc3) 1109 | - 2019.08 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P19)](https://medium.com/p/b8a5ccc0efbc) 1110 | - 2019.07 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P18)](https://medium.com/p/b9b5987eea22) 1111 | - 2019.07 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P17)](https://medium.com/p/13aae3c33824) 1112 | - 2019.06 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P16)](https://medium.com/p/66c697636724) 1113 | - 2019.06 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P15)](https://medium.com/p/9bb2bbdf6fbc) 1114 | - 2019.05 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P14)](https://medium.com/p/fd20c144c844) 1115 | - 2019.05 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P13)](https://medium.com/p/adc88403c295) 1116 | - 2019.04 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P12)](https://medium.com/p/6b19df3db60e) 1117 | - 2019.04 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P11)](https://medium.com/p/34e6214132d6) 1118 | - 2019.03 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P10)](https://medium.com/p/f054072cc4cd) 1119 | - 2019.03 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P9)](https://medium.com/p/3ead456499d2) 1120 | - 2019.03 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P8)](https://medium.com/p/c627c70b5efd) 1121 | - 2019.03 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P7)](https://medium.com/p/986cb6c09405) 1122 | - 2019.03 [tradahacking] [REVERSING WITH IDA FROM SCRATCH (P6)](https://medium.com/p/ec232b87a091) 1123 | - 2019.03 [kienbigmummy] [REVERSING WITH IDA FROM SCRATCH (P5)](https://medium.com/p/f153835b4ffc) 1124 | 1125 | 1126 | ### 系列文章-IDAPython-让你的生活更美好 1127 | 1128 | 1129 | #### 原文 1130 | 1131 | 1132 | - 2016.06 [paloaltonetworks] [ Using IDAPython to Make Your Life Easier, Part6](https://unit42.paloaltonetworks.com/unit42-using-idapython-to-make-your-life-easier-part-6/) 1133 | - 2016.01 [paloaltonetworks] [ Using IDAPython to Make Your Life Easier, Part5](https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/) 1134 | - 2016.01 [paloaltonetworks] [ Using IDAPython to Make Your Life Easier, Part4](https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/) 1135 | - 2016.01 [paloaltonetworks] [ Using IDAPython to Make Your Life Easier, Part3](https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/) 1136 | - 2015.12 [paloaltonetworks] [ Using IDAPython to Make Your Life Easier, Part2](https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/) 1137 | - 2015.12 [paloaltonetworks] [ Using IDAPython to Make Your Life Easier, Part1](https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/) 1138 | 1139 | 1140 | #### 译文 1141 | 1142 | 1143 | - 2016.01 [freebuf] [IDAPython:让你的生活更美好(五)](http://www.freebuf.com/articles/system/93440.html) 1144 | - 2016.01 [freebuf] [IDAPython:让你的生活更美好(四)](http://www.freebuf.com/articles/system/92505.html) 1145 | - 2016.01 [freebuf] [IDAPython:让你的生活更美好(三)](http://www.freebuf.com/articles/system/92488.html) 1146 | - 2016.01 [freebuf] [IDAPython:让你的生活更美好(二)](http://www.freebuf.com/sectool/92168.html) 1147 | - 2016.01 [freebuf] [IDAPython:让你的生活更美好(一)](http://www.freebuf.com/sectool/92107.html) 1148 | 1149 | 1150 | 1151 | 1152 | ### 系列文章-使用IDA逆向C代码 1153 | 1154 | 1155 | - 2019.01 [ly0n] [Reversing C code with IDA part V](https://paumunoz.tech/2019/01/12/reversing-c-code-with-ida-part-v/) 1156 | - 2019.01 [ly0n] [Reversing C code with IDA part IV](https://paumunoz.tech/2019/01/07/reversing-c-code-with-ida-part-iv/) 1157 | - 2019.01 [ly0n] [Reversing C code with IDA part III](https://paumunoz.tech/2019/01/02/reversing-c-code-with-ida-part-iii/) 1158 | - 2018.12 [ly0n] [Reversing C code with IDA part II](https://paumunoz.tech/2018/12/31/reversing-c-code-with-ida-part-ii/) 1159 | - 2018.01 [ly0n] [Reversing C code with IDA part I](https://paumunoz.tech/2018/01/11/reversing-c-code-with-ida-part-i/) 1160 | 1161 | 1162 | ### 工具&&插件&&脚本介绍 1163 | 1164 | 1165 | #### 未分类 1166 | 1167 | 1168 | - 2019.10 [vmray] [VMRay IDA Plugin v1.1: Streamlining Deep-Dive Malware Analysis](https://www.vmray.com/cyber-security-blog/vmray-ida-plugin-v1-1-streamlining-deep-dive-malware-analysis/) 1169 | - 2019.10 [talosintelligence] [New IDA Pro plugin provides TileGX support](https://blog.talosintelligence.com/2019/10/new-ida-pro-plugin-provides-tilegx.html) 1170 | - 2019.09 [talosintelligence] [GhIDA: Ghidra decompiler for IDA Pro](https://blog.talosintelligence.com/2019/09/ghida.html) 1171 | - 2019.05 [carbonblack] [fn_fuzzy: Fast Multiple Binary Diffing Triage with IDA](https://www.carbonblack.com/2019/05/09/fn_fuzzy-fast-multiple-binary-diffing-triage-with-ida/) 1172 | - 2019.04 [] [climacros – IDA productivity tool](http://0xeb.net/2019/04/climacros-ida-productivity-tool/) 1173 | - 2019.04 [] [QScripts – IDA Scripting productivity tool](http://0xeb.net/2019/04/ida-qscripts/) 1174 | - 2019.03 [] [Daenerys: IDA Pro and Ghidra interoperability framework](http://0xeb.net/2019/03/daenerys-ida-pro-and-ghidra-interoperability-framework/) 1175 | - 2019.03 [freebuf] [Ponce:一键即可实现符号执行(IDA插件)](https://www.freebuf.com/sectool/197708.html) 1176 | - 2019.02 [kitploit] [HexRaysCodeXplorer - Hex-Rays Decompiler Plugin For Better Code Navigation](https://www.kitploit.com/2019/02/hexrayscodexplorer-hex-rays-decompiler.html) 1177 | - 2019.02 [kitploit] [Ponce - IDA Plugin For Symbolic Execution Just One-Click Away!](https://www.kitploit.com/2019/02/ponce-ida-plugin-for-symbolic-execution.html) 1178 | - 2019.01 [talosintelligence] [Dynamic Data Resolver (DDR) - IDA Plugin](https://blog.talosintelligence.com/2019/01/ddr.html) 1179 | - 2018.12 [securityonline] [HexRaysCodeXplorer: Hex-Rays Decompiler plugin for better code navigation](https://securityonline.info/codexplorer/) 1180 | - 2018.11 [4hou] [FLARE脚本系列:使用idawasm IDA Pro插件逆向WebAssembly(Wasm)模块](http://www.4hou.com/reverse/13935.html) 1181 | - 2018.10 [aliyun] [用idawasm IDA Pro逆向WebAssembly模块](https://xz.aliyun.com/t/2854) 1182 | - 2018.10 [fireeye] [FLARE Script Series: Reverse Engineering WebAssembly Modules Using the 1183 | idawasm IDA Pro Plugin](https://www.fireeye.com/blog/threat-research/2018/10/reverse-engineering-webassembly-modules-using-the-idawasm-ida-pro-plugin.html) 1184 | - 2018.10 [vmray] [Introducing the IDA Plugin for VMRay Analyzer](https://www.vmray.com/cyber-security-blog/ida-plugin-vmray-analyzer/) 1185 | - 2018.10 [aliyun] [IDA-minsc在Hex-Rays插件大赛中获得第二名(2)](https://xz.aliyun.com/t/2842) 1186 | - 2018.10 [aliyun] [IDA-minsc在Hex-Rays插件大赛中获得第二名(1)](https://xz.aliyun.com/t/2841) 1187 | - 2018.10 [aliyun] [通过两个IDAPython插件支持A12 PAC指令和iOS12 kernelcache 重定位](https://xz.aliyun.com/t/2839) 1188 | - 2018.09 [ptsecurity] [How we developed the NIOS II processor module for IDA Pro](http://blog.ptsecurity.com/2018/09/how-we-developed-nios-ii-processor.html) 1189 | 1190 | 1191 | #### Loader&&Processor 1192 | 1193 | 1194 | - 2019.03 [360] [为CHIP-8编写IDA processor module](https://www.anquanke.com/post/id/172217/) 1195 | - 2018.10 [ptsecurity] [Modernizing IDA Pro: how to make processor module glitches go away](http://blog.ptsecurity.com/2018/10/modernizing-ida-pro-how-to-make.html) 1196 | - 2018.08 [360] [Lua程序逆向之为Luac编写IDA Pro处理器模块](https://www.anquanke.com/post/id/153699/) 1197 | 1198 | 1199 | #### 与其他工具交互 1200 | 1201 | 1202 | - 2018.09 [dustri] [IDAPython vs. r2pipe](https://dustri.org/b/idapython-vs-r2pipe.html) 1203 | 1204 | 1205 | 1206 | 1207 | ### 翻译-TheIDAProBook 1208 | 1209 | 1210 | - 2008.10 [pediy] [[翻译]The IDA Pro Book 第六章](https://bbs.pediy.com/thread-75632.htm) 1211 | - 2008.10 [pediy] [[翻译](20081030更新)The IDA Pro Book 第12章:使用FLIRT签名识别库](https://bbs.pediy.com/thread-75422.htm) 1212 | - 2008.10 [pediy] [[翻译]The IDA Pro Book(第二章)](https://bbs.pediy.com/thread-74943.htm) 1213 | - 2008.10 [pediy] [[翻译]The IDA Pro book 第5章---IDA DATA DISPLAY](https://bbs.pediy.com/thread-74838.htm) 1214 | - 2008.10 [pediy] [[翻译]The IDA Pro Book(第一章)](https://bbs.pediy.com/thread-74564.htm) 1215 | 1216 | 1217 | ### 翻译-ReverseEngineeringCodeWithIDAPro 1218 | 1219 | 1220 | - 2009.01 [pediy] [[原创]Reverse Engineering Code with IDA Pro第七章中文译稿](https://bbs.pediy.com/thread-80580.htm) 1221 | - 2008.06 [pediy] [[翻译]Reverse Engineering Code with IDA Pro(第一、二章)](https://bbs.pediy.com/thread-66010.htm) 1222 | 1223 | 1224 | ### IDA本身 1225 | 1226 | 1227 | - 2019.01 [pediy] [[原创]IDA7.2安装包分析](https://bbs.pediy.com/thread-248989.htm) 1228 | - 2019.01 [pediy] [[原创]IDA 在解析 IA64 中的 brl 指令时存在一个 Bug](https://bbs.pediy.com/thread-248983.htm) 1229 | - 2018.11 [hexblog] [IDA 7.2 – The Mac Rundown](http://www.hexblog.com/?p=1300) 1230 | - 2018.10 [pediy] [[原创] 修复 IDA Pro 7.0在macOS Mojave崩溃的问题](https://bbs.pediy.com/thread-247334.htm) 1231 | 1232 | 1233 | ### 逆向实战 1234 | 1235 | 1236 | #### 未分类 1237 | 1238 | 1239 | - 2019.11 [4hou] [反作弊游戏如何破解,看看《黑色沙漠》逆向分析过程:使用 IDAPython 和 FLIRT 签名恢复 IAT](https://www.4hou.com/web/21806.html) 1240 | - 2019.11 [aliyun] [使用IDA microcode去除ollvm混淆(下)](https://xz.aliyun.com/t/6795) 1241 | - 2019.06 [devco] [破密行動: 以不尋常的角度破解 IDA Pro 偽隨機數](https://devco.re/blog/2019/06/21/operation-crack-hacking-IDA-Pro-installer-PRNG-from-an-unusual-way/) 1242 | - 2019.05 [360] [IDAPython实战项目——DES算法识别](https://www.anquanke.com/post/id/177808/) 1243 | - 2019.04 [venus] [使用 IDA Pro 的 REobjc 模块逆向 Objective-C 二进制文件](https://paper.seebug.org/887/) 1244 | - 2019.01 [ly0n] [Cracking with IDA (redh@wk 2.5 crackme)](https://paumunoz.tech/2019/01/05/cracking-with-ida-redhwk-2-5-crackme/) 1245 | - 2018.11 [somersetrecon] [Introduction to IDAPython for Vulnerability Hunting - Part 2](http://www.somersetrecon.com/blog/2018/8/2/idapython-part-2) 1246 | - 2018.11 [pediy] [[原创]IDA动态调试ELF](https://bbs.pediy.com/thread-247830.htm) 1247 | - 2018.06 [pediy] [[翻译]在IDA中使用Python Z3库来简化函数中的算术运算](https://bbs.pediy.com/thread-228688.htm) 1248 | - 2018.03 [duo] [Reversing Objective-C Binaries With the REobjc Module for IDA Pro](https://duo.com/blog/reversing-objective-c-binaries-with-the-reobjc-module-for-ida-pro) 1249 | - 2006.05 [pediy] [Themida v1008 驱动程序分析,去除花指令的 IDA 文件](https://bbs.pediy.com/thread-25836.htm) 1250 | 1251 | 1252 | #### 恶意代码分析 1253 | 1254 | 1255 | - 2019.04 [360] [两种姿势批量解密恶意驱动中的上百条字串](https://www.anquanke.com/post/id/175964/) 1256 | - 2019.03 [cyber] [使用IDAPython分析Trickbot](https://cyber.wtf/2019/03/22/using-ida-python-to-analyze-trickbot/) 1257 | - 2019.01 [OALabs] [Lazy String Decryption Tips With IDA PRO and Shade Ransomware Unpacked!](https://www.youtube.com/watch?v=RfnuMhosxuQ) 1258 | - 2018.09 [4hou] [Hidden Bee恶意软件家族的定制IDA装载模块开发](http://www.4hou.com/technology/13438.html) 1259 | - 2018.09 [4hou] [用IDAPython解密Gootkit中的字符串](http://www.4hou.com/technology/13209.html) 1260 | - 2018.05 [OALabs] [Unpacking Gootkit Part 2 - Debugging Anti-Analysis Tricks With IDA Pro and x64dbg](https://www.youtube.com/watch?v=QgUlPvEE4aw) 1261 | - 2018.04 [OALabs] [Unpacking VB6 Packers With IDA Pro and API Hooks (Re-Upload)](https://www.youtube.com/watch?v=ylWInOcQy2s) 1262 | - 2018.03 [OALabs] [Unpacking Gootkit Malware With IDA Pro and X64dbg - Subscriber Request](https://www.youtube.com/watch?v=242Tn0IL2jE) 1263 | - 2018.01 [OALabs] [Unpacking Pykspa Malware With Python and IDA Pro - Subscriber Request Part 1](https://www.youtube.com/watch?v=HfSQlC76_s4) 1264 | - 2017.11 [OALabs] [Unpacking Process Injection Malware With IDA PRO (Part 2)](https://www.youtube.com/watch?v=kdNQhfgoQoU) 1265 | - 2017.11 [OALabs] [Unpacking Process Injection Malware With IDA PRO (Part 1)](https://www.youtube.com/watch?v=ScBB-Hi7NxQ) 1266 | - 2017.06 [hackers] [Reverse Engineering Malware, Part 3: IDA Pro Introduction](https://www.hackers-arise.com/single-post/2017/06/22/Reverse-Engineering-Malware-Part-3-IDA-Pro-Introduction) 1267 | - 2017.05 [4hou] [逆向分析——使用IDA动态调试WanaCrypt0r中的tasksche.exe](http://www.4hou.com/technology/4832.html) 1268 | - 2017.05 [3gstudent] [逆向分析——使用IDA动态调试WanaCrypt0r中的tasksche.exe](https://3gstudent.github.io/3gstudent.github.io/%E9%80%86%E5%90%91%E5%88%86%E6%9E%90-%E4%BD%BF%E7%94%A8IDA%E5%8A%A8%E6%80%81%E8%B0%83%E8%AF%95WanaCrypt0r%E4%B8%AD%E7%9A%84tasksche.exe/) 1269 | - 2012.06 [trustwave] [使用IDAPython对Flame的字符串进行反混淆](https://www.trustwave.com/Resources/SpiderLabs-Blog/Defeating-Flame-String-Obfuscation-with-IDAPython/) 1270 | 1271 | 1272 | #### 漏洞分析&&挖掘 1273 | 1274 | 1275 | - 2018.07 [360] [如何使用 IDAPython 寻找漏洞](https://www.anquanke.com/post/id/151898/) 1276 | - 2018.07 [somersetrecon] [如何使用IDAPython挖掘漏洞](http://www.somersetrecon.com/blog/2018/7/6/introduction-to-idapython-for-vulnerability-hunting) 1277 | 1278 | 1279 | 1280 | 1281 | ### Microcode 1282 | 1283 | 1284 | - 2019.10 [amossys] [探秘Hex-Rays microcode](https://blog.amossys.fr/stage-2019-hexraysmicrocode.html) 1285 | 1286 | 1287 | ### IDA对抗 1288 | 1289 | 1290 | - 2019.05 [aliyun] [混淆IDA F5的一个小技巧-x86](https://xz.aliyun.com/t/5062) 1291 | 1292 | 1293 | 1294 | 1295 | # Ghidra 1296 | 1297 | 1298 | *** 1299 | 1300 | 1301 | ## 插件&&脚本 1302 | 1303 | 1304 | ### Ghidra 1305 | 1306 | 1307 | - [**18649**星][2d] [Java] [nationalsecurityagency/ghidra](https://github.com/nationalsecurityagency/ghidra) 软件逆向框架 1308 | 1309 | 1310 | ### 新添加的 1311 | 1312 | 1313 | - [**455**星][8m] [YARA] [ghidraninja/ghidra_scripts](https://github.com/ghidraninja/ghidra_scripts) Ghidra脚本 1314 | - [binwalk](https://github.com/ghidraninja/ghidra_scripts/blob/master/binwalk.py) 对当前程序运行BinWalk, 标注找到的内容 1315 | - [yara](https://github.com/ghidraninja/ghidra_scripts/blob/master/yara.py) 使用Yara查找加密常量 1316 | - [swift_demangler](https://github.com/ghidraninja/ghidra_scripts/blob/master/swift_demangler.py) 自动demangle Swift函数名 1317 | - [golang_renamer](https://github.com/ghidraninja/ghidra_scripts/blob/master/golang_renamer.py) 恢复stripped Go二进制文件的函数名 1318 | - [**204**星][7m] [Java] [rolfrolles/ghidrapal](https://github.com/rolfrolles/ghidrapal) Ghidra 程序分析库(无文档) 1319 | 1320 | 1321 | ### 特定分析目标 1322 | 1323 | 1324 | #### 未分类 1325 | 1326 | 1327 | 1328 | 1329 | #### Loader&&Processor 1330 | 1331 | 1332 | 1333 | 1334 | #### Xbox 1335 | 1336 | 1337 | 1338 | 1339 | 1340 | 1341 | ### 与其他工具交互 1342 | 1343 | 1344 | #### 未分类 1345 | 1346 | 1347 | 1348 | 1349 | #### Radare2 1350 | 1351 | 1352 | 1353 | 1354 | #### IDA 1355 | 1356 | 1357 | - [**299**星][4m] [Py] [cisco-talos/ghida](https://github.com/cisco-talos/ghida) 在IDA中集成Ghidra反编译器 1358 | - 重复区段: [IDA->插件->导入导出->Ghidra](#c7066b0c388cd447e980bf0eb38f39ab) | 1359 | - [**238**星][9m] [Py] [daenerys-sre/source](https://github.com/daenerys-sre/source) 使IDA和Ghidra脚本通用, 无需修改 1360 | - 重复区段: [IDA->插件->导入导出->Ghidra](#c7066b0c388cd447e980bf0eb38f39ab) | 1361 | 1362 | 1363 | #### DBI 1364 | 1365 | 1366 | 1367 | 1368 | #### 调试器 1369 | 1370 | 1371 | 1372 | 1373 | 1374 | 1375 | ### 外观&&主题 1376 | 1377 | 1378 | 1379 | 1380 | ### 脚本编写 1381 | 1382 | 1383 | #### 其他 1384 | 1385 | 1386 | 1387 | 1388 | #### 编程语言 1389 | 1390 | 1391 | 1392 | 1393 | 1394 | 1395 | 1396 | 1397 | *** 1398 | 1399 | 1400 | ## 文章&&视频 1401 | 1402 | 1403 | ### 新添加的1 1404 | 1405 | 1406 | 1407 | 1408 | ### 新添加的 1409 | 1410 | 1411 | - 2019.09 [dustri] [Radare2, IDA Pro, and Binary ninja, a metaphoric comparison](https://dustri.org/b/radare2-ida-pro-and-binary-ninja-a-metaphoric-comparison.html) 1412 | - 2019.05 [vimeo] [Three Heads are Better Than One: Mastering Ghidra - Alexei Bulazel, Jeremy Blackthorne - INFILTRATE 2019](https://vimeo.com/335158460) 1413 | - 2019.04 [X0x6d696368] [Ghidra: Stack Depth (to detect stack manipulation)](https://www.youtube.com/watch?v=hP9FQrD61tk) 1414 | - 2019.04 [X0x6d696368] [Ghidra: Version Tracking](https://www.youtube.com/watch?v=K83T7iVla5s) 1415 | - 2019.04 [X0x6d696368] [Ghidra: Export Symbols and Load External Libraries (to resolve imported function names)](https://www.youtube.com/watch?v=Avn8s7iW3Rc) 1416 | - 2019.04 [X0x6d696368] [Ghidra: Data Type Manager / Archives and Parse C Source... (resolve function signatures)](https://www.youtube.com/watch?v=u15-r5Erfnw) 1417 | - 2019.04 [X0x6d696368] [Ghidra: Generate Checksum... (to extract hashes of embedded malware artifacts)](https://www.youtube.com/watch?v=vLG7c5Eae0s) 1418 | - 2019.04 [msreverseengineering] [An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra](https://www.msreverseengineering.com/blog/2019/4/17/an-abstract-interpretation-based-deobfuscation-plugin-for-ghidra) 1419 | - 2019.04 [X0x6d696368] [Ghidra: FunctionID (to identify libraries and code reuse)](https://www.youtube.com/watch?v=P8Ul2K7pEfU) 1420 | - 2019.04 [X0x6d696368] [Ghidra: Server / Shared Projects (using ghidra-server.org)](https://www.youtube.com/watch?v=ka4vGxLmr4w) 1421 | - 2019.04 [X0x6d696368] [Ghidra: Bytes View (to patch binary and export to a working PE file)](https://www.youtube.com/watch?v=utUqAbfURko) 1422 | - 2019.04 [X0x6d696368] [Ghidra: Fixing Bugs (Fixing PE section import size alignment)](https://www.youtube.com/watch?v=vpt7-Hn-Uhg) 1423 | - 2019.04 [X0x6d696368] [Ghidra: Clear Flow and Repair, and Patch Instruction (to defeat anti-disassembly)](https://www.youtube.com/watch?v=H9DyLQ2iuyE) 1424 | - 2019.04 [X0x6d696368] [Ghidra: Scripting (Python) (a quick introduction by implementing pipeDecoder.py)](https://www.youtube.com/watch?v=WLXlq3lvUGs) 1425 | - 2019.04 [X0x6d696368] [Ghidra: Decompile and compile (to quickly reimplement malware decoding functions)](https://www.youtube.com/watch?v=YuwOgBDt_b4) 1426 | - 2019.04 [X0x6d696368] [Ghidra: EditBytesScript (to fix/manipulate PE header to load ShadowHammer setup.exe sample)](https://www.youtube.com/watch?v=7__tiVMPIEE) 1427 | - 2019.04 [X0x6d696368] [Ghidra: Extract and Import ... (to extract resources from PE binaries)](https://www.youtube.com/watch?v=M19ZSTAgubI) 1428 | - 2019.04 [X0x6d696368] [Ghidra: YaraGhidraGUIScript (to generate a YARA signature for threat/retro hunting)](https://www.youtube.com/watch?v=tBvxVkJrkh0) 1429 | - 2019.04 [X0x6d696368] [Ghidra: XORMemoryScript (to XOR decode strings)](https://www.youtube.com/watch?v=vPqs7E_nhdQ) 1430 | - 2019.04 [yoroi] [Ghidra SRE: The AZORult Field Test](https://blog.yoroi.company/research/ghidra-sre-the-azorult-field-test/) 1431 | 1432 | 1433 | ### Ghidra漏洞 1434 | 1435 | 1436 | - 2019.10 [securityaffairs] [Ghidra 9.0.4及之前版本的代码执行漏洞](https://securityaffairs.co/wordpress/92280/hacking/ghidra-code-execution-flaw.html) 1437 | - 2019.10 [4hou] [CVE-2019-16941: NSA Ghidra工具RCE漏洞](https://www.4hou.com/info/news/20698.html) 1438 | - 2019.08 [hackertor] [Ghidra (Linux) 9.0.4 Arbitrary Code Execution](https://hackertor.com/2019/08/12/ghidra-linux-9-0-4-arbitrary-code-execution/) 1439 | - 2019.08 [kitploit] [Ghidra (Linux) 9.0.4 Arbitrary Code Execution](https://exploit.kitploit.com/2019/08/ghidra-linux-904-arbitrary-code.html) 1440 | - 2019.07 [hackertor] [NA – CVE-2019-13623 – In NSA Ghidra through 9.0.4, path traversal can…](https://hackertor.com/2019/07/17/na-cve-2019-13623-in-nsa-ghidra-through-9-0-4-path-traversal-can/) 1441 | - 2019.07 [hackertor] [NA – CVE-2019-13625 – NSA Ghidra before 9.0.1 allows XXE when a…](https://hackertor.com/2019/07/17/na-cve-2019-13625-nsa-ghidra-before-9-0-1-allows-xxe-when-a/) 1442 | - 2019.03 [venus] [Ghidra 从 XXE 到 RCE](https://paper.seebug.org/861/) 1443 | - 2019.03 [tencent] [Ghidra 从 XXE 到 RCE](https://xlab.tencent.com/cn/2019/03/18/ghidra-from-xxe-to-rce/) 1444 | 1445 | 1446 | ### 实战分析 1447 | 1448 | 1449 | #### 未分类 1450 | 1451 | 1452 | - 2019.09 [venus] [使用 Ghidra 对 iOS 应用进行 msgSend 分析](https://paper.seebug.org/1037/) 1453 | - 2019.09 [4hou] [使用Ghidra对iOS应用进行msgSend分析](https://www.4hou.com/system/20326.html) 1454 | - 2019.09 [WarrantyVoider] [X360 XEX Decompiling With Ghidra](https://www.youtube.com/watch?v=coGz0f7hHTM) 1455 | - 2019.08 [WarrantyVoider] [N64 ROM Decompiling With Ghidra - N64LoaderWV](https://www.youtube.com/watch?v=3d3a39LuCwc) 1456 | - 2019.08 [4hou] [基于Ghidra和Neo4j的RPC分析技术](https://www.4hou.com/technology/19730.html) 1457 | - 2019.04 [X0x6d696368] [Ghidra: Search Program Text... (to find XOR decoding functions in malware)](https://www.youtube.com/watch?v=MaxwIxrmrWY) 1458 | - 2019.04 [shogunlab] [Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe]](https://www.shogunlab.com/blog/2019/04/12/here-be-dragons-ghidra-0.html) 1459 | - 2019.03 [GhidraNinja] [Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme](https://www.youtube.com/watch?v=4urMITJKQQs) 1460 | - 2019.03 [GhidraNinja] [Ghidra quickstart & tutorial: Solving a simple crackme](https://www.youtube.com/watch?v=fTGTnrgjuGA) 1461 | 1462 | 1463 | #### 漏洞分析&&挖掘 1464 | 1465 | 1466 | - 2019.11 [4hou] [使用Ghidra对WhatsApp VOIP Stack 溢出漏洞的补丁对比分析](https://www.4hou.com/vulnerable/21141.html) 1467 | - 2019.09 [4hou] [利用Ghidra分析TP-link M7350 4G随身WiFi的RCE漏洞](https://www.4hou.com/vulnerable/20267.html) 1468 | - 2019.08 [aliyun] [CVE-2019-12103 使用Ghidra分析TP-Link M7350上的预认证RCE](https://xz.aliyun.com/t/6017) 1469 | 1470 | 1471 | #### 恶意代码 1472 | 1473 | 1474 | - 2019.06 [dawidgolak] [IcedID aka #Bokbot Analysis with Ghidra.](https://medium.com/p/560e3eccb766) 1475 | - 2019.04 [aliyun] [利用Ghidra分析恶意软件Emotet](https://xz.aliyun.com/t/4931) 1476 | - 2019.04 [X0x6d696368] [Ghidra: Shadow Hammer (Stage 1: Setup.exe) complete static Analysis](https://www.youtube.com/watch?v=gI0nZR4z7_M) 1477 | - 2019.04 [X0xd0cf11e] [Analyzing Emotet with Ghidra — Part 2](https://medium.com/p/9efbea374b14) 1478 | - 2019.04 [X0x6d696368] [Ghidra: Android APK (it's basically dex2jar with a .dex decompiler)](https://www.youtube.com/watch?v=At_T6riSb9A) 1479 | - 2019.04 [X0xd0cf11e] [Analyzing Emotet with Ghidra — Part 1](https://medium.com/p/4da71a5c8d69) 1480 | - 2019.03 [GhidraNinja] [Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra](https://www.youtube.com/watch?v=Sv8yu12y5zM) 1481 | - 2019.03 [HackerSploit] [Malware Analysis With Ghidra - Stuxnet Analysis](https://www.youtube.com/watch?v=TJhfnItRVOA) 1482 | - 2019.03 [sans] [Analysing meterpreter payload with Ghidra](https://isc.sans.edu/forums/diary/Analysing+meterpreter+payload+with+Ghidra/24722/) 1483 | 1484 | 1485 | 1486 | 1487 | ### 其他 1488 | 1489 | 1490 | 1491 | 1492 | ### Tips&&Tricks 1493 | 1494 | 1495 | 1496 | 1497 | ### 工具&&插件&&脚本 1498 | 1499 | 1500 | - 2019.11 [deadc0de] [使用Python编写Ghidra脚本示例](https://deadc0de.re/articles/ghidra-scripting-python.html) 1501 | - 2019.04 [X0x6d696368] [ghidra_scripts: RC4Decryptor.py](https://www.youtube.com/watch?v=kXaHrPyZtGs) 1502 | - 2019.04 [aliyun] [如何开发用于漏洞研究的Ghidra插件,Part 1](https://xz.aliyun.com/t/4723) 1503 | - 2019.04 [somersetrecon] [Ghidra Plugin Development for Vulnerability Research - Part-1](https://www.somersetrecon.com/blog/2019/ghidra-plugin-development-for-vulnerability-research-part-1) 1504 | - 2019.03 [wololo] [PS4 release: GhidraPS4Loader and Playstation 4 Flash tool](http://wololo.net/2019/03/18/ps4-release-ghidraps4loader-and-playstation-4-flash-tool/) 1505 | 1506 | 1507 | 1508 | 1509 | # x64dbg 1510 | 1511 | 1512 | *** 1513 | 1514 | 1515 | ## 插件&&脚本 1516 | 1517 | 1518 | ### x64dbg 1519 | 1520 | 1521 | - [**34576**星][26d] [C++] [x64dbg/x64dbg](https://github.com/x64dbg/x64dbg) Windows平台x32/x64调试器 1522 | 1523 | 1524 | ### 新添加的 1525 | 1526 | 1527 | - [**1672**星][7m] [C++] [yegord/snowman](https://github.com/yegord/snowman) Snowman反编译器,支持x86, AMD64, ARM。有独立的GUI工具、命令行工具、IDA/Radare2/x64dbg插件,也可以作为库使用 1528 | - 重复区段: [IDA->插件->反编译器](#d2166f4dac4eab7fadfe0fd06467fbc9) | 1529 | - [IDA插件](https://github.com/yegord/snowman/tree/master/src/ida-plugin) 1530 | - [snowman](https://github.com/yegord/snowman/tree/master/src/snowman) QT界面 1531 | - [nocode](https://github.com/yegord/snowman/tree/master/src/nocode) 命令行工具 1532 | - [nc](https://github.com/yegord/snowman/tree/master/src/nc) 核心代码,可作为库使用 1533 | - [**1341**星][1m] [C] [x64dbg/x64dbgpy](https://github.com/x64dbg/x64dbgpy) Automating x64dbg using Python, Snapshots: 1534 | - [**972**星][1m] [Py] [x64dbg/docs](https://github.com/x64dbg/docs) x64dbg文档 1535 | - [**471**星][5d] [C] [bootleg/ret-sync](https://github.com/bootleg/ret-sync) 在反汇编工具和调试器之间同步调试会话 1536 | - 重复区段: [IDA->插件->与调试器同步](#f7d311685152ac005cfce5753c006e4b) | 1537 | - [GDB插件](https://github.com/bootleg/ret-sync/tree/master/ext_gdb) 1538 | - [Ghidra插件](https://github.com/bootleg/ret-sync/tree/master/ext_ghidra) 1539 | - [IDA插件](https://github.com/bootleg/ret-sync/tree/master/ext_ida) 1540 | - [LLDB](https://github.com/bootleg/ret-sync/tree/master/ext_lldb) 1541 | - [OD](https://github.com/bootleg/ret-sync/tree/master/ext_olly1) 1542 | - [OD2](https://github.com/bootleg/ret-sync/tree/master/ext_olly2) 1543 | - [WinDgb](https://github.com/bootleg/ret-sync/tree/master/ext_windbg/sync) 1544 | - [x64dbg](https://github.com/bootleg/ret-sync/tree/master/ext_x64dbg) 1545 | - [**363**星][9m] [fr0gger/awesome-ida-x64-olly-plugin](https://github.com/fr0gger/awesome-ida-x64-olly-plugin) IDA x64DBG OllyDBG 插件收集 1546 | - 重复区段: [IDA->插件->收集](#a7dac37cd93b8bb42c7d6aedccb751b3) | 1547 | 1548 | 1549 | 1550 | 1551 | *** 1552 | 1553 | 1554 | ## 文章&&视频 1555 | 1556 | 1557 | 1558 | 1559 | # OllyDbg 1560 | 1561 | 1562 | *** 1563 | 1564 | 1565 | ## 插件&&脚本 1566 | 1567 | 1568 | ### 新添加的 1569 | 1570 | 1571 | 1572 | 1573 | 1574 | 1575 | *** 1576 | 1577 | 1578 | ## 文章&&视频 1579 | 1580 | 1581 | 1582 | 1583 | # WinDBG 1584 | 1585 | 1586 | *** 1587 | 1588 | 1589 | ## 插件&&脚本 1590 | 1591 | 1592 | ### 新添加的 1593 | 1594 | 1595 | - [**564**星][6m] [C#] [fremag/memoscope.net](https://github.com/fremag/memoscope.net) Dump and analyze .Net applications memory ( a gui for WinDbg and ClrMd ) 1596 | - [**279**星][26d] [Py] [hugsy/defcon_27_windbg_workshop](https://github.com/hugsy/defcon_27_windbg_workshop) DEFCON 27 workshop - Modern Debugging with WinDbg Preview 1597 | - [**230**星][9m] [C++] [microsoft/windbg-samples](https://github.com/microsoft/windbg-samples) Sample extensions, scripts, and API uses for WinDbg. 1598 | 1599 | 1600 | 1601 | 1602 | *** 1603 | 1604 | 1605 | ## 文章&&视频 1606 | 1607 | 1608 | - 2019.10 [freebuf] [Iris:一款可执行常见Windows漏洞利用检测的WinDbg扩展](https://www.freebuf.com/sectool/214276.html) 1609 | - 2019.08 [lowleveldesign] [Synthetic types and tracing syscalls in WinDbg](https://lowleveldesign.org/2019/08/27/synthetic-types-and-tracing-syscalls-in-windbg/) 1610 | - 2019.08 [hackertor] [Iris – WinDbg Extension To Perform Basic Detection Of Common Windows Exploit Mitigations](https://hackertor.com/2019/08/16/iris-windbg-extension-to-perform-basic-detection-of-common-windows-exploit-mitigations/) 1611 | - 2019.07 [osr] [How L1 Terminal Fault (L1TF) Mitigation and WinDbg Wasted My Morning (a.k.a. Yak Shaving: WinDbg Edition)](https://www.osr.com/blog/2019/07/02/how-l1-terminal-fault-l1tf-mitigation-and-windbg-wasted-my-morning-a-k-a-yak-shaving-windbg-edition/) 1612 | - 2019.06 [360] [《Dive into Windbg系列》Explorer无法启动排查](https://www.anquanke.com/post/id/179748/) 1613 | - 2019.04 [360] [《Dive into Windbg系列》AudioSrv音频服务故障](https://www.anquanke.com/post/id/176343/) 1614 | - 2019.03 [aliyun] [为WinDbg和LLDB编写ClrMD扩展](https://xz.aliyun.com/t/4459) 1615 | - 2019.03 [offensive] [Development of a new Windows 10 KASLR Bypass (in One WinDBG Command)](https://www.offensive-security.com/vulndev/development-of-a-new-windows-10-kaslr-bypass-in-one-windbg-command/) 1616 | - 2019.02 [OALabs] [WinDbg Basics for Malware Analysis](https://www.youtube.com/watch?v=QuFJpH3My7A) 1617 | 1618 | 1619 | # Android 1620 | 1621 | 1622 | *** 1623 | 1624 | 1625 | ## 工具 1626 | 1627 | 1628 | ### 新添加的1 1629 | 1630 | 1631 | - [**6101**星][2m] [Java] [google/android-classyshark](https://github.com/google/android-classyshark) 分析基于Android/Java的App或游戏 1632 | - [**6094**星][5m] [Java] [qihoo360/replugin](https://github.com/qihoo360/replugin) RePlugin - A flexible, stable, easy-to-use Android Plug-in Framework 1633 | - [**5195**星][11d] [Py] [mobsf/mobile-security-framework-mobsf](https://github.com/MobSF/Mobile-Security-Framework-MobSF) Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. 1634 | - 重复区段: [Malware->工具](#e781a59e4f4daab058732cf66f77bfb9) | 1635 | - [**5084**星][7d] [HTML] [owasp/owasp-mstg](https://github.com/owasp/owasp-mstg) 关于移动App安全开发、测试和逆向的相近手册 1636 | - [**4882**星][16d] [Java] [guardianproject/haven](https://github.com/guardianproject/haven) 通过Android应用和设备上的传感器保护自己的个人空间和财产而又不损害 1637 | - [**4776**星][4d] [C++] [facebook/redex](https://github.com/facebook/redex) Android App字节码优化器 1638 | - [**4306**星][7d] [Shell] [ashishb/android-security-awesome](https://github.com/ashishb/android-security-awesome) A collection of android security related resources 1639 | - [**3649**星][1m] [C++] [anbox/anbox](https://github.com/anbox/anbox) 在常规GNU / Linux系统上引导完整的Android系统,基于容器 1640 | - [**2314**星][1y] [Java] [csploit/android](https://github.com/csploit/android) cSploit - The most complete and advanced IT security professional toolkit on Android. 1641 | - [**2120**星][9m] [Py] [linkedin/qark](https://github.com/linkedin/qark) 查找Android App的漏洞, 支持源码或APK文件 1642 | - [**2095**星][10m] [jermic/android-crack-tool](https://github.com/jermic/android-crack-tool) 1643 | - [**2051**星][13d] [Py] [sensepost/objection](https://github.com/sensepost/objection) runtimemobile exploration 1644 | - [**2011**星][7m] [Py] [fsecurelabs/drozer](https://github.com/FSecureLABS/drozer) The Leading Security Assessment Framework for Android. 1645 | - [**1976**星][] [Java] [kyson/androidgodeye](https://github.com/kyson/androidgodeye) AndroidGodEye:A performance monitor tool , like "Android Studio profiler" for Android , you can easily monitor the performance of your app real time in pc browser 1646 | - [**1925**星][7m] [Java] [fuzion24/justtrustme](https://github.com/fuzion24/justtrustme) An xposed module that disables SSL certificate checking for the purposes of auditing an app with cert pinning 1647 | - [**1430**星][11m] [Java] [aslody/legend](https://github.com/aslody/legend) (Android)无需Root即可Hook Java方法的框架, 支持Dalvik和Art环境 1648 | - [**1417**星][1m] [Java] [chrisk44/hijacker](https://github.com/chrisk44/hijacker) Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android 1649 | - [**1241**星][3m] [Java] [whataa/pandora](https://github.com/whataa/pandora) an android library for debugging what we care about directly in app. 1650 | - [**1235**星][1m] [Java] [find-sec-bugs/find-sec-bugs](https://github.com/find-sec-bugs/find-sec-bugs) The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects) 1651 | - [**1213**星][1m] [JS] [megatronking/httpcanary](https://github.com/megatronking/httpcanary) A powerful capture and injection tool for the Android platform 1652 | - [**1208**星][3m] [Java] [javiersantos/piracychecker](https://github.com/javiersantos/piracychecker) An Android library that prevents your app from being pirated / cracked using Google Play Licensing (LVL), APK signature protection and more. API 14+ required. 1653 | - [**1134**星][24d] [Java] [huangyz0918/androidwm](https://github.com/huangyz0918/androidwm) 一个支持不可见数字水印(隐写术)的android图像水印库。 1654 | - [**885**星][2m] [C] [504ensicslabs/lime](https://github.com/504ensicslabs/lime) LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures f… 1655 | - [**820**星][3d] [proxymanapp/proxyman](https://github.com/proxymanapp/proxyman) Modern and Delightful HTTP Debugging Proxy for macOS, iOS and Android 1656 | - [**810**星][4m] [Scala] [antox/antox](https://github.com/antox/antox) Android client for Project Tox - Secure Peer to Peer Messaging 1657 | - [**800**星][3m] [sh4hin/androl4b](https://github.com/sh4hin/androl4b) 用于评估Android应用程序,逆向工程和恶意软件分析的虚拟机 1658 | - 重复区段: [Malware->工具](#e781a59e4f4daab058732cf66f77bfb9) | 1659 | - [**769**星][1y] [C] [ele7enxxh/android-inline-hook](https://github.com/ele7enxxh/android-inline-hook) thumb16 thumb32 arm32 inlineHook in Android 1660 | - [**668**星][1m] [doridori/android-security-reference](https://github.com/doridori/android-security-reference) A W.I.P Android Security Ref 1661 | - [**608**星][7m] [JS] [vincentcox/stacoan](https://github.com/vincentcox/stacoan) StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications. 1662 | - [**559**星][6d] [Shell] [owasp/owasp-masvs](https://github.com/owasp/owasp-masvs) OWASP 移动App安全标准 1663 | - [**546**星][1m] [nordicsemiconductor/android-nrf-connect](https://github.com/nordicsemiconductor/android-nrf-connect) Documentation and issue tracker for nRF Connect for Android. 1664 | - [**541**星][1y] [Java] [jaredrummler/apkparser](https://github.com/jaredrummler/apkparser) APK parser for Android 1665 | - [**527**星][4m] [JS] [wooyundota/droidsslunpinning](https://github.com/wooyundota/droidsslunpinning) Android certificate pinning disable tools 1666 | - [**518**星][3m] [Java] [megatronking/stringfog](https://github.com/megatronking/stringfog) 一款自动对字节码中的字符串进行加密Android插件工具 1667 | - [**511**星][] [Java] [happylishang/cacheemulatorchecker](https://github.com/happylishang/cacheemulatorchecker) Android模拟器检测,检测Android模拟器 ,获取相对真实的IMEI AndroidId 序列号 MAC地址等,作为DeviceID,应对防刷需求等 1668 | - [**482**星][1m] [JS] [lyxhh/lxhtoolhttpdecrypt](https://github.com/lyxhh/lxhtoolhttpdecrypt) Simple Android/iOS protocol analysis and utilization tool 1669 | - [**450**星][12m] [Kotlin] [shadowsocks/kcptun-android](https://github.com/shadowsocks/kcptun-android) kcptun for Android. 1670 | - [**443**星][23d] [TS] [shroudedcode/apk-mitm](https://github.com/shroudedcode/apk-mitm) 1671 | - [**431**星][5d] [C] [guardianproject/orbot](https://github.com/guardianproject/orbot) The Github home of Orbot: Tor on Android (Also available on gitlab!) 1672 | - [**426**星][11d] [Py] [thehackingsage/hacktronian](https://github.com/thehackingsage/hacktronian) All in One Hacking Tool for Linux & Android 1673 | - [**412**星][4m] [Java] [megatronking/netbare](https://github.com/megatronking/netbare) Net packets capture & injection library designed for Android 1674 | - [**409**星][3m] [CSS] [angea/pocorgtfo](https://github.com/angea/pocorgtfo) a "Proof of Concept or GTFO" mirror with extra article index, direct links and clean PDFs. 1675 | - [**408**星][1y] [Java] [testwhat/smaliex](https://github.com/testwhat/smaliex) A wrapper to get de-optimized dex from odex/oat/vdex. 1676 | - [**379**星][5m] [Makefile] [crifan/android_app_security_crack](https://github.com/crifan/android_app_security_crack) 安卓应用的安全和破解 1677 | - [**379**星][1y] [CSS] [nowsecure/secure-mobile-development](https://github.com/nowsecure/secure-mobile-development) A Collection of Secure Mobile Development Best Practices 1678 | - [**358**星][5m] [b3nac/android-reports-and-resources](https://github.com/b3nac/android-reports-and-resources) A big list of Android Hackerone disclosed reports and other resources. 1679 | - [**358**星][5m] [C] [the-cracker-technology/andrax-mobile-pentest](https://github.com/the-cracker-technology/andrax-mobile-pentest) ANDRAX The first and unique Penetration Testing platform for Android smartphones 1680 | - [**333**星][17d] [Java] [datatheorem/trustkit-android](https://github.com/datatheorem/trustkit-android) Easy SSL pinning validation and reporting for Android. 1681 | - [**284**星][9m] [Py] [micropyramid/forex-python](https://github.com/micropyramid/forex-python) Foreign exchange rates, Bitcoin price index and currency conversion using ratesapi.io 1682 | - [**267**星][4m] [Py] [amimo/dcc](https://github.com/amimo/dcc) DCC (Dex-to-C Compiler) is method-based aot compiler that can translate DEX code to C code. 1683 | - [**265**星][3d] [Py] [den4uk/andriller](https://github.com/den4uk/andriller) Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. 1684 | - [**251**星][10m] [C] [chef-koch/android-vulnerabilities-overview](https://github.com/chef-koch/android-vulnerabilities-overview) An small overview of known Android vulnerabilities 1685 | - [**234**星][2m] [C] [grant-h/qu1ckr00t](https://github.com/grant-h/qu1ckr00t) A PoC application demonstrating the power of an Android kernel arbitrary R/W. 1686 | - [**234**星][1y] [Ruby] [hahwul/droid-hunter](https://github.com/hahwul/droid-hunter) (deprecated) Android application vulnerability analysis and Android pentest tool 1687 | - [**229**星][8m] [Java] [jieyushi/luffy](https://github.com/jieyushi/luffy) Android字节码插件,编译期间动态修改代码,改造添加全埋点日志采集功能模块,对常见控件进行监听处理 1688 | - [**225**星][3m] [Java] [virb3/trustmealready](https://github.com/virb3/trustmealready) Disable SSL verification and pinning on Android, system-wide 1689 | - [**208**星][18d] [C] [derrekr/fastboot3ds](https://github.com/derrekr/fastboot3ds) A homebrew bootloader for the Nintendo 3DS that is similar to android's fastboot. 1690 | 1691 | 1692 | ### 新添加的 1693 | 1694 | 1695 | 1696 | 1697 | ### HotFix 1698 | 1699 | 1700 | - [**14557**星][5d] [Java] [tencent/tinker](https://github.com/tencent/tinker) Tinker is a hot-fix solution library for Android, it supports dex, library and resources update without reinstall apk. 1701 | - [**3462**星][19d] [Java] [meituan-dianping/robust](https://github.com/meituan-dianping/robust) Robust is an Android HotFix solution with high compatibility and high stability. Robust can fix bugs immediately without a reboot. 1702 | - [**1117**星][5m] [Java] [manbanggroup/phantom](https://github.com/manbanggroup/phantom) 唯一零 Hook 稳定占坑类 Android 热更新插件化方案 1703 | 1704 | 1705 | ### 打包 1706 | 1707 | 1708 | - [**5080**星][2m] [Java] [meituan-dianping/walle](https://github.com/meituan-dianping/walle) Android Signature V2 Scheme签名下的新一代渠道包打包神器 1709 | 1710 | 1711 | ### 收集 1712 | 1713 | 1714 | 1715 | 1716 | ### 各类App 1717 | 1718 | 1719 | - [**12285**星][3d] [Java] [signalapp/signal-android](https://github.com/signalapp/Signal-Android) A private messenger for Android. 1720 | 1721 | 1722 | ### Xposed 1723 | 1724 | 1725 | - [**8756**星][1m] [Java] [android-hacker/virtualxposed](https://github.com/android-hacker/virtualxposed) A simple app to use Xposed without root, unlock the bootloader or modify system image, etc. 1726 | - [**2559**星][7m] [taichi-framework/taichi](https://github.com/taichi-framework/taichi) A framework to use Xposed module with or without Root/Unlock bootloader, supportting Android 5.0 ~ 10.0 1727 | - [**2034**星][4d] [Java] [elderdrivers/edxposed](https://github.com/elderdrivers/edxposed) Elder driver Xposed Framework. 1728 | - [**1726**星][1y] [Java] [ac-pm/inspeckage](https://github.com/ac-pm/inspeckage) Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module) 1729 | - [**1655**星][1m] [Java] [tiann/epic](https://github.com/tiann/epic) Dynamic java method AOP hook for Android(continution of Dexposed on ART), Supporting 4.0~10.0 1730 | - [**1296**星][1m] [Java] [android-hacker/exposed](https://github.com/android-hacker/exposed) A library to use Xposed without root or recovery(or modify system image etc..). 1731 | - [**790**星][8m] [Java] [blankeer/mdwechat](https://github.com/blankeer/mdwechat) 一个能让微信 Material Design 化的 Xposed 模块 1732 | - [**669**星][4d] [Java] [ganyao114/sandhook](https://github.com/ganyao114/sandhook) Android ART Hook/Native Inline Hook/Single Instruction Hook - support 4.4 - 10.0 32/64 bit - Xposed API Compat 1733 | - [**478**星][2m] [Java] [tornaco/x-apm](https://github.com/tornaco/x-apm) 应用管理 Xposed 1734 | - [**322**星][1y] [C] [smartdone/dexdump](https://github.com/smartdone/dexdump) 一个用来快速脱一代壳的工具(稍微改下就可以脱类抽取那种壳)(Android) 1735 | - [**309**星][25d] [bigsinger/androididchanger](https://github.com/bigsinger/androididchanger) Xposed Module for Changing Android Device Info 1736 | - [**309**星][5d] [Java] [ganyao114/sandvxposed](https://github.com/ganyao114/sandvxposed) Xposed environment without root (OS 5.0 - 10.0) 1737 | - [**204**星][1y] [C] [gtoad/android_inline_hook](https://github.com/gtoad/android_inline_hook) Build an so file to automatically do the android_native_hook work. Supports thumb-2/arm32 and ARM64 ! With this, tools like Xposed can do android native hook. 1738 | 1739 | 1740 | ### 加壳&&脱壳 1741 | 1742 | 1743 | - [**1793**星][8m] [C++] [wrbug/dumpdex](https://github.com/wrbug/dumpdex) Android脱壳 1744 | - [**1465**星][3m] [C++] [vaibhavpandeyvpz/apkstudio](https://github.com/vaibhavpandeyvpz/apkstudio) Open-source, cross platform Qt based IDE for reverse-engineering Android application packages. 1745 | - [**811**星][4m] [C] [strazzere/android-unpacker](https://github.com/strazzere/android-unpacker) Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0 1746 | - [**712**星][2m] [YARA] [rednaga/apkid](https://github.com/rednaga/apkid) Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android 1747 | - [**366**星][3m] [Java] [patrickfav/uber-apk-signer](https://github.com/patrickfav/uber-apk-signer) A cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided release certificates. It supports v1, v2 and v3 Android signing scheme has an embedded debug keystore and auto verifies after signing. 1748 | - [**322**星][6m] [Shell] [1n3/reverseapk](https://github.com/1n3/reverseapk) Quickly analyze and reverse engineer Android packages 1749 | 1750 | 1751 | ### HOOK 1752 | 1753 | 1754 | - [**1500**星][19d] [C] [iqiyi/xhook](https://github.com/iqiyi/xhook) a PLT (Procedure Linkage Table) hook library for Android native ELF 1755 | - [**1494**星][t] [C++] [jmpews/dobby](https://github.com/jmpews/Dobby) a lightweight, multi-platform, multi-architecture hook framework. 1756 | - [**804**星][17d] [C++] [aslody/whale](https://github.com/aslody/whale) Hook Framework for Android/IOS/Linux/MacOS 1757 | - [**530**星][7m] [Java] [aslody/andhook](https://github.com/asLody/AndHook) Android dynamic instrumentation framework 1758 | - [**361**星][8m] [C] [turing-technician/fasthook](https://github.com/turing-technician/fasthook) Android ART Hook 1759 | 1760 | 1761 | ### Emulator&&模拟器 1762 | 1763 | 1764 | - [**1492**星][1y] [C++] [f1xpl/openauto](https://github.com/f1xpl/openauto) AndroidAuto headunit emulator 1765 | - [**532**星][7m] [Java] [limboemu/limbo](https://github.com/limboemu/limbo) Limbo is a QEMU-based emulator for Android. It currently supports PC & ARM emulation for Intel x86 and ARM architecture. See our wiki 1766 | - 重复区段: [模拟器->QEMU->工具->新添加的](#82072558d99a6cf23d4014c0ae5b420a) | 1767 | - [**471**星][3m] [Java] [strazzere/anti-emulator](https://github.com/strazzere/anti-emulator) Android Anti-Emulator 1768 | 1769 | 1770 | ### IDA 1771 | 1772 | 1773 | 1774 | 1775 | ### Debug&&调试 1776 | 1777 | 1778 | - [**10794**星][30d] [Java] [konloch/bytecode-viewer](https://github.com/konloch/bytecode-viewer) A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More) 1779 | - [**6762**星][10m] [Java] [amitshekhariitbhu/android-debug-database](https://github.com/amitshekhariitbhu/android-debug-database) A library for debugging android databases and shared preferences - Make Debugging Great Again 1780 | 1781 | 1782 | ### Malware&&恶意代码 1783 | 1784 | 1785 | - [**429**星][4m] [Shell] [ashishb/android-malware](https://github.com/ashishb/android-malware) Collection of android malware samples 1786 | - [**347**星][3m] [Java] [droidefense/engine](https://github.com/droidefense/engine) Droidefense: Advance Android Malware Analysis Framework 1787 | 1788 | 1789 | ### Obfuscate&&混淆 1790 | 1791 | 1792 | - [**3078**星][2m] [Java] [calebfenton/simplify](https://github.com/calebfenton/simplify) Generic Android Deobfuscator 1793 | - [**294**星][4m] [C] [shadowsocks/simple-obfs-android](https://github.com/shadowsocks/simple-obfs-android) A simple obfuscating tool for Android 1794 | 1795 | 1796 | ### ReverseEngineering 1797 | 1798 | 1799 | - [**9285**星][23d] [Java] [ibotpeaches/apktool](https://github.com/ibotpeaches/apktool) A tool for reverse engineering Android apk files 1800 | - [**2053**星][1m] [Java] [genymobile/gnirehtet](https://github.com/genymobile/gnirehtet) Gnirehtet provides reverse tethering for Android 1801 | - [**585**星][2m] [C++] [secrary/andromeda](https://github.com/secrary/andromeda) Andromeda - Interactive Reverse Engineering Tool for Android Applications [This project is not maintained anymore] 1802 | - [**545**星][12d] [maddiestone/androidappre](https://github.com/maddiestone/androidappre) Android App Reverse Engineering Workshop 1803 | - [**267**星][10m] [Dockerfile] [cryptax/androidre](https://github.com/cryptax/androidre) 用于Android 逆向的 Docker 容器 1804 | - [**246**星][20d] [C++] [strazzere/android-scripts](https://github.com/strazzere/android-scripts) Android逆向脚本收集 1805 | - 重复区段: [IDA->插件->Android](#66052f824f5054aa0f70785a2389a478) | 1806 | 1807 | 1808 | 1809 | 1810 | *** 1811 | 1812 | 1813 | ## 文章&&视频 1814 | 1815 | 1816 | - 2019.12 [aliyun] [Android智能终端系统的安全加固(上)](https://xz.aliyun.com/t/6852) 1817 | - 2019.11 [venus] [Android勒索病毒分析(上)](https://paper.seebug.org/1085/) 1818 | 1819 | 1820 | # Apple&&iOS&&iXxx 1821 | 1822 | 1823 | *** 1824 | 1825 | 1826 | ## 工具 1827 | 1828 | 1829 | ### 新添加的 1830 | 1831 | 1832 | - [**10966**星][2d] [ObjC] [flipboard/flex](https://github.com/flipboard/flex) An in-app debugging and exploration tool for iOS 1833 | - [**8031**星][2m] [Py] [facebook/chisel](https://github.com/facebook/chisel) Chisel is a collection of LLDB commands to assist debugging iOS apps. 1834 | - [**5775**星][3m] [ObjC] [square/ponydebugger](https://github.com/square/ponydebugger) Remote network and data debugging for your native iOS app using Chrome Developer Tools 1835 | - [**5451**星][3m] [Py] [axi0mx/ipwndfu](https://github.com/axi0mx/ipwndfu) open-source jailbreaking tool for many iOS devices 1836 | - 重复区段: [Apple->工具->越狱](#ff19d5d94315d035bbcb3ef0c348c75b) | 1837 | - [**5390**星][5m] [C] [pwn20wndstuff/undecimus](https://github.com/pwn20wndstuff/undecimus) unc0ver jailbreak for iOS 11.0 - 12.4 1838 | - 重复区段: [Apple->工具->越狱](#ff19d5d94315d035bbcb3ef0c348c75b) | 1839 | - [**4663**星][29d] [C] [google/ios-webkit-debug-proxy](https://github.com/google/ios-webkit-debug-proxy) A DevTools proxy (Chrome Remote Debugging Protocol) for iOS devices (Safari Remote Web Inspector). 1840 | - [**4397**星][4d] [Swift] [signalapp/signal-ios](https://github.com/signalapp/Signal-iOS) A private messenger for iOS. 1841 | - [**4248**星][8m] [ObjC] [alonemonkey/monkeydev](https://github.com/alonemonkey/monkeydev) CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak. 1842 | - 重复区段: [Apple->工具->越狱](#ff19d5d94315d035bbcb3ef0c348c75b) | 1843 | - [**3686**星][4m] [C] [facebook/fishhook](https://github.com/facebook/fishhook) A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS. 1844 | - [**3414**星][1m] [icodesign/potatso](https://github.com/icodesign/Potatso) Potatso is an iOS client that implements different proxies with the leverage of NetworkExtension framework in iOS 10+. 1845 | - [**3327**星][3m] [Swift] [yagiz/bagel](https://github.com/yagiz/bagel) a little native network debugging tool for iOS 1846 | - [**3071**星][10m] [JS] [jipegit/osxauditor](https://github.com/jipegit/osxauditor) OS X Auditor is a free Mac OS X computer forensics tool 1847 | - [**2867**星][4d] [ObjC] [facebook/idb](https://github.com/facebook/idb) idb is a flexible command line interface for automating iOS simulators and devices 1848 | - [**2795**星][16d] [Swift] [kasketis/netfox](https://github.com/kasketis/netfox) A lightweight, one line setup, iOS / OSX network debugging library! 1849 | - [**2753**星][1m] [Makefile] [theos/theos](https://github.com/theos/theos) A cross-platform suite of tools for building and deploying software for iOS and other platforms. 1850 | - [**2733**星][18d] [ObjC] [dantheman827/ios-app-signer](https://github.com/dantheman827/ios-app-signer) This is an app for OS X that can (re)sign apps and bundle them into ipa files that are ready to be installed on an iOS device. 1851 | - [**2708**星][2m] [ObjC] [kjcracks/clutch](https://github.com/kjcracks/clutch) Fast iOS executable dumper 1852 | - [**2057**星][11d] [ObjC] [ios-control/ios-deploy](https://github.com/ios-control/ios-deploy) Install and debug iPhone apps from the command line, without using Xcode 1853 | - [**1801**星][1y] [aozhimin/ios-monitor-platform](https://github.com/aozhimin/ios-monitor-platform) 1854 | - [**1695**星][6m] [Py] [yelp/osxcollector](https://github.com/yelp/osxcollector) A forensic evidence collection & analysis toolkit for OS X 1855 | - [**1683**星][1m] [Swift] [pmusolino/wormholy](https://github.com/pmusolino/wormholy) iOS network debugging, like a wizard 🧙‍♂️ 1856 | - [**1642**星][6m] [Objective-C++] [tencent/oomdetector](https://github.com/tencent/oomdetector) OOMDetector is a memory monitoring component for iOS which provides you with OOM monitoring, memory allocation monitoring, memory leak detection and other functions. 1857 | - [**1630**星][1m] [ivrodriguezca/re-ios-apps](https://github.com/ivrodriguezca/re-ios-apps) A completely free, open source and online course about Reverse Engineering iOS Applications. 1858 | - [**1442**星][20d] [ObjC] [nabla-c0d3/ssl-kill-switch2](https://github.com/nabla-c0d3/ssl-kill-switch2) Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps 1859 | - [**1299**星][5m] [JS] [feross/spoof](https://github.com/feross/spoof) Easily spoof your MAC address in macOS, Windows, & Linux! 1860 | - [**1291**星][1m] [JS] [icymind/vrouter](https://github.com/icymind/vrouter) 一个基于 VirtualBox 和 openwrt 构建的项目, 旨在实现 macOS / Windows 平台的透明代理. 1861 | - [**1253**星][2m] [Vue] [chaitin/passionfruit](https://github.com/chaitin/passionfruit) iOSapp 黑盒评估工具。功能丰富,自带基于web的 GUI 1862 | - [**1252**星][9d] [michalmalik/osx-re-101](https://github.com/michalmalik/osx-re-101) OSX/iOS逆向资源收集 1863 | - [**1239**星][t] [C] [datatheorem/trustkit](https://github.com/datatheorem/trustkit) Easy SSL pinning validation and reporting for iOS, macOS, tvOS and watchOS. 1864 | - [**1215**星][8d] [YARA] [horsicq/detect-it-easy](https://github.com/horsicq/detect-it-easy) Program for determining types of files for Windows, Linux and MacOS. 1865 | - [**1193**星][7d] [JS] [alonemonkey/frida-ios-dump](https://github.com/alonemonkey/frida-ios-dump) pull decrypted ipa from jailbreak device 1866 | - 重复区段: [DBI->Frida->工具->新添加的](#54836a155de0c15b56f43634cd9cfecf) | 1867 | - [**1113**星][1y] [ObjC] [neoneggplant/eggshell](https://github.com/neoneggplant/eggshell) iOS/macOS/Linux Remote Administration Tool 1868 | - [**1001**星][2m] [ObjC] [lmirosevic/gbdeviceinfo](https://github.com/lmirosevic/gbdeviceinfo) Detects the hardware, software and display of the current iOS or Mac OS X device at runtime. 1869 | - [**907**星][3m] [ObjC] [ptoomey3/keychain-dumper](https://github.com/ptoomey3/keychain-dumper) A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken 1870 | - [**866**星][8d] [ObjC] [meitu/mthawkeye](https://github.com/meitu/mthawkeye) Profiling / Debugging assist tools for iOS. (Memory Leak, OOM, ANR, Hard Stalling, Network, OpenGL, Time Profile ...) 1871 | - [**840**星][] [JS] [cypress-io/cypress-example-recipes](https://github.com/cypress-io/cypress-example-recipes) Various recipes for testing common scenarios with Cypress 1872 | - [**796**星][5d] [Shell] [aqzt/kjyw](https://github.com/aqzt/kjyw) 快捷运维,代号kjyw,项目基于shell、python,运维脚本工具库,收集各类运维常用工具脚本,实现快速安装nginx、mysql、php、redis、nagios、运维经常使用的脚本等等... 1873 | - [**662**星][1y] [Py] [deepzec/bad-pdf](https://github.com/deepzec/bad-pdf) create malicious PDF file to steal NTLM(NTLMv1/NTLMv2) Hashes from windows machines 1874 | - [**651**星][9m] [ObjC] [chenxiancai/stcobfuscator](https://github.com/chenxiancai/stcobfuscator) iOS全局自动化 代码混淆 工具!支持cocoapod组件代码一并 混淆,完美避开hardcode方法、静态库方法和系统库方法! 1875 | - [**636**星][1y] [Swift] [phynet/ios-url-schemes](https://github.com/phynet/ios-url-schemes) a github solution from my gist of iOS list for urls schemes 1876 | - [**604**星][2m] [siguza/ios-resources](https://github.com/siguza/ios-resources) Useful resources for iOS hacking 1877 | - [**500**星][19d] [Swift] [google/science-journal-ios](https://github.com/google/science-journal-ios) Use the sensors in your mobile devices to perform science experiments. Science doesn’t just happen in the classroom or lab—tools like Science Journal let you see how the world works with just your phone. 1878 | - [**482**星][1y] [Swift] [icepa/icepa](https://github.com/icepa/icepa) iOS system-wide VPN based Tor client 1879 | - [**478**星][7d] [pixelcyber/thor](https://github.com/pixelcyber/thor) HTTP Sniffer/Capture on iOS for Network Debug & Inspect. 1880 | - [**471**星][8m] [C++] [everettjf/machoexplorer](https://github.com/everettjf/machoexplorer) MachO文件查看器,支持Windows和macOS 1881 | - [**462**星][7d] [Java] [dsheirer/sdrtrunk](https://github.com/dsheirer/sdrtrunk) A cross-platform java application for decoding, monitoring, recording and streaming trunked mobile and related radio protocols using Software Defined Radios (SDR). Website: 1882 | - [**430**星][11m] [captainarash/the_holy_book_of_x86](https://github.com/captainarash/the_holy_book_of_x86) A simple guide to x86 architecture, assembly, memory management, paging, segmentation, SMM, BIOS.... 1883 | - [**404**星][1y] [C] [coalfire-research/ios-11.1.2-15b202-jailbreak](https://github.com/coalfire-research/ios-11.1.2-15b202-jailbreak) iOS 11.1.2 (15B202) Jailbreak 1884 | - 重复区段: [Apple->工具->越狱](#ff19d5d94315d035bbcb3ef0c348c75b) | 1885 | - [**396**星][4m] [ansjdnakjdnajkd/ios](https://github.com/ansjdnakjdnajkd/ios) iOS渗透测试最有用的工具 1886 | - [**382**星][11m] [C] [coolstar/electra1131](https://github.com/coolstar/electra1131) electra1131: Electra for iOS 11.0 - 11.3.1 1887 | - [**375**星][20d] [Swift] [justeat/justlog](https://github.com/justeat/justlog) JustLog brings logging on iOS to the next level. It supports console, file and remote Logstash logging via TCP socket with no effort. Support for logz.io available. 1888 | - [**371**星][10d] [Shell] [matthewpierson/1033-ota-downgrader](https://github.com/matthewpierson/1033-ota-downgrader) First ever tool to downgrade ANY iPhone 5s, ANY iPad Air and (almost any) iPad Mini 2 to 10.3.3 with OTA blobs + checkm8! 1889 | - [**349**星][11d] [C] [jedisct1/swift-sodium](https://github.com/jedisct1/swift-sodium) Safe and easy to use crypto for iOS and macOS 1890 | - [**346**星][4m] [TS] [bacher09/pwgen-for-bios](https://github.com/bacher09/pwgen-for-bios) Password generator for BIOS 1891 | - [**340**星][2m] [C] [trailofbits/cb-multios](https://github.com/trailofbits/cb-multios) DARPA Challenges Sets for Linux, Windows, and macOS 1892 | - [**322**星][2m] [ObjC] [auth0/simplekeychain](https://github.com/auth0/simplekeychain) A Keychain helper for iOS to make it very simple to store/obtain values from iOS Keychain 1893 | - [**310**星][20d] [Swift] [securing/iossecuritysuite](https://github.com/securing/iossecuritysuite) iOS platform security & anti-tampering Swift library 1894 | - [**287**星][6m] [Shell] [0ki/mikrotik-tools](https://github.com/0ki/mikrotik-tools) Tools for Mikrotik devices - universal jailbreak tool 1895 | - 重复区段: [Apple->工具->越狱](#ff19d5d94315d035bbcb3ef0c348c75b) | 1896 | - [**263**星][6d] [ObjC] [strongbox-password-safe/strongbox](https://github.com/strongbox-password-safe/strongbox) A KeePass/Password Safe Client for iOS and OS X 1897 | - [**247**星][1m] [C++] [s0uthwest/futurerestore](https://github.com/s0uthwest/futurerestore) iOS upgrade and downgrade tool utilizing SHSH blobs 1898 | - [**244**星][6m] [JS] [we11cheng/wcshadowrocket](https://github.com/we11cheng/wcshadowrocket) iOS Shadowrocket(砸壳重签,仅供参考,添加节点存在问题)。另一个fq项目potatso源码参见: 1899 | - [**239**星][1y] [ObjC] [lmirosevic/gbping](https://github.com/lmirosevic/gbping) Highly accurate ICMP Ping controller for iOS 1900 | - [**238**星][4m] [Swift] [shadowsocksr-live/ishadowsocksr](https://github.com/shadowsocksr-live/ishadowsocksr) ShadowsocksR for iOS, come from 1901 | - [**223**星][11m] [AppleScript] [lifepillar/csvkeychain](https://github.com/lifepillar/csvkeychain) Import/export between Apple Keychain.app and plain CSV file. 1902 | - [**219**星][6m] [ObjC] [rickyzhang82/tethering](https://github.com/rickyzhang82/tethering) Proxy and DNS Server on iOS 1903 | - [**213**星][8m] [C] [owasp/igoat](https://github.com/owasp/igoat) OWASP iGoat - A Learning Tool for iOS App Pentesting and Security by Swaroop Yermalkar 1904 | - [**211**星][5d] [TS] [bevry/getmac](https://github.com/bevry/getmac) Get the mac address of the current machine you are on via Node.js 1905 | - [**203**星][5m] [Py] [googleprojectzero/ios-messaging-tools](https://github.com/googleprojectzero/ios-messaging-tools) several tools Project Zero uses to test iPhone messaging 1906 | - [**200**星][5m] [PS] [mkellerman/invoke-commandas](https://github.com/mkellerman/invoke-commandas) Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects. 1907 | 1908 | 1909 | ### XCode 1910 | 1911 | 1912 | - [**6203**星][3m] [ObjC] [johnno1962/injectionforxcode](https://github.com/johnno1962/injectionforxcode) Runtime Code Injection for Objective-C & Swift 1913 | - [**1606**星][2m] [Swift] [indragiek/inappviewdebugger](https://github.com/indragiek/inappviewdebugger) A UIView debugger (like Reveal or Xcode) that can be embedded in an app for on-device view debugging 1914 | - [**1409**星][27d] [Swift] [johnno1962/injectioniii](https://github.com/johnno1962/injectioniii) Re-write of Injection for Xcode in (mostly) Swift4 1915 | - [**572**星][1m] [ObjC] [hdb-li/lldebugtool](https://github.com/hdb-li/lldebugtool) LLDebugTool is a debugging tool for developers and testers that can help you analyze and manipulate data in non-xcode situations. 1916 | - [**384**星][2m] [JS] [johnno1962/xprobeplugin](https://github.com/johnno1962/xprobeplugin) Live Memory Browser for Apps & Xcode 1917 | 1918 | 1919 | ### 越狱 1920 | 1921 | 1922 | - [**5451**星][3m] [Py] [axi0mx/ipwndfu](https://github.com/axi0mx/ipwndfu) open-source jailbreaking tool for many iOS devices 1923 | - 重复区段: [Apple->工具->新添加的](#d0108e91e6863289f89084ff09df39d0) | 1924 | - [**5390**星][5m] [C] [pwn20wndstuff/undecimus](https://github.com/pwn20wndstuff/undecimus) unc0ver jailbreak for iOS 11.0 - 12.4 1925 | - 重复区段: [Apple->工具->新添加的](#d0108e91e6863289f89084ff09df39d0) | 1926 | - [**4248**星][8m] [ObjC] [alonemonkey/monkeydev](https://github.com/alonemonkey/monkeydev) CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak. 1927 | - 重复区段: [Apple->工具->新添加的](#d0108e91e6863289f89084ff09df39d0) | 1928 | - [**3221**星][5m] [ObjC] [naituw/ipapatch](https://github.com/naituw/ipapatch) Patch iOS Apps, The Easy Way, Without Jailbreak. 1929 | - [**404**星][1y] [C] [coalfire-research/ios-11.1.2-15b202-jailbreak](https://github.com/coalfire-research/ios-11.1.2-15b202-jailbreak) iOS 11.1.2 (15B202) Jailbreak 1930 | - 重复区段: [Apple->工具->新添加的](#d0108e91e6863289f89084ff09df39d0) | 1931 | - [**287**星][6m] [Shell] [0ki/mikrotik-tools](https://github.com/0ki/mikrotik-tools) Tools for Mikrotik devices - universal jailbreak tool 1932 | - 重复区段: [Apple->工具->新添加的](#d0108e91e6863289f89084ff09df39d0) | 1933 | - [**237**星][11m] [C] [geosn0w/osirisjailbreak12](https://github.com/geosn0w/osirisjailbreak12) iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365) 1934 | - [**200**星][1y] [ObjC] [sunweiliang/neteasemusiccrack](https://github.com/sunweiliang/neteasemusiccrack) iOS网易云音乐 免VIP下载、去广告、去更新 无需越狱... 1935 | 1936 | 1937 | ### LLDB 1938 | 1939 | 1940 | - [**784**星][3m] [C++] [nodejs/llnode](https://github.com/nodejs/llnode) An lldb plugin for Node.js and V8, which enables inspection of JavaScript states for insights into Node.js processes and their core dumps. 1941 | - [**636**星][2m] [C++] [apple/swift-lldb](https://github.com/apple/swift-lldb) This is the version of LLDB that supports the Swift programming language & REPL. 1942 | - [**492**星][20d] [Rust] [vadimcn/vscode-lldb](https://github.com/vadimcn/vscode-lldb) A native debugger extension for VSCode based on LLDB 1943 | - [**388**星][2m] [C++] [llvm-mirror/lldb](https://github.com/llvm-mirror/lldb) Mirror of official lldb git repository located at 1944 | 1945 | 1946 | 1947 | 1948 | *** 1949 | 1950 | 1951 | ## 文章&&视频 1952 | 1953 | 1954 | 1955 | 1956 | # Cuckoo 1957 | 1958 | 1959 | *** 1960 | 1961 | 1962 | ## 工具 1963 | 1964 | 1965 | ### 新添加的 1966 | 1967 | 1968 | - [**4042**星][3m] [JS] [cuckoosandbox/cuckoo](https://github.com/cuckoosandbox/cuckoo) Cuckoo Sandbox is an automated dynamic malware analysis system 1969 | - [**308**星][2m] [Py] [hatching/vmcloak](https://github.com/hatching/vmcloak) Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox. 1970 | - [**238**星][6m] [Py] [cuckoosandbox/community](https://github.com/cuckoosandbox/community) Repository of modules and signatures contributed by the community 1971 | - [**236**星][3m] [Py] [brad-sp/cuckoo-modified](https://github.com/brad-sp/cuckoo-modified) Modified edition of cuckoo 1972 | - [**225**星][1y] [PHP] [cuckoosandbox/monitor](https://github.com/cuckoosandbox/monitor) The new Cuckoo Monitor. 1973 | - [**220**星][3m] [Shell] [blacktop/docker-cuckoo](https://github.com/blacktop/docker-cuckoo) Cuckoo Sandbox Dockerfile 1974 | 1975 | 1976 | 1977 | 1978 | *** 1979 | 1980 | 1981 | ## 文章&&视频 1982 | 1983 | 1984 | - 2019.10 [sectechno] [Cuckoo Sandbox – Automated Malware Analysis Framework](https://sectechno.com/cuckoo-sandbox-automated-malware-analysis-framework-2/) 1985 | - 2019.04 [eforensicsmag] [How to Integrate RSA Malware Analysis with Cuckoo Sandbox | By Luiz Henrique Borges](https://eforensicsmag.com/how-to-integrate-rsa-malware-analysis-with-cuckoo-sandbox-by-luiz-henrique-borges/) 1986 | - 2019.02 [thehive] [Cortex-Analyzers 1.15.3 get ready for URLhaus and Cuckoo](https://blog.thehive-project.org/2019/02/26/cortex-analyzers-1-15-3-get-ready-for-urlhaus-and-cuckoo/) 1987 | - 2018.07 [360] [一例IRC Bot针对Cuckoo沙箱的猥琐对抗分析](https://www.anquanke.com/post/id/152631/) 1988 | - 2018.05 [trustedsec] [Malware Analysis is for the (Cuckoo) Birds – Working with Proxmox](https://www.trustedsec.com/2018/05/working-with-proxmox/) 1989 | - 2018.05 [trustedsec] [Protected: Malware Analysis is for the (Cuckoo) Birds](https://www.trustedsec.com/2018/05/malware-cuckoo-1/) 1990 | - 2018.05 [trustedsec] [Protected: Malware Analysis is for the (Cuckoo) Birds – Cuckoo Installation Notes for Debian](https://www.trustedsec.com/2018/05/malware-cuckoo-2/) 1991 | - 2018.04 [ly0n] [Automating malware analysis, cuckoo api + postfix](https://paumunoz.tech/2018/04/25/automating-malware-analysis-cuckoo-api-postfix/) 1992 | - 2018.04 [ly0n] [Automating malware analysis, cuckoo api + postfix](http://ly0n.me/2018/04/25/automating-malware-analysis-cuckoo-api-postfix/) 1993 | - 2018.04 [rapid7] [Threat Intel Book Club: The Cuckoo's Egg wrap-up](https://blog.rapid7.com/2018/04/12/threat-intel-book-club-the-cuckoos-egg-wrap-up/) 1994 | - 2018.04 [nviso] [Painless Cuckoo Sandbox Installation](https://blog.nviso.be/2018/04/12/painless-cuckoo-sandbox-installation/) 1995 | - 2018.03 [rapid7] [Next Threat Intel Book Club 4/5: Recapping The Cuckoo’s Egg](https://blog.rapid7.com/2018/03/18/next-threat-intel-book-club-4-5-recapping-the-cuckoos-egg/) 1996 | - 2018.03 [ensurtec] [Cuckoo Sandbox Setup Tutorial](https://ensurtec.com/cuckoo-sandbox-setup-tutorial/) 1997 | - 2018.01 [fortinet] [Prevalent Threats Targeting Cuckoo Sandbox Detection and Our Mitigation](https://blog.fortinet.com/2018/01/03/prevalent-threats-targeting-cuckoo-sandbox-detection-and-our-mitigation) 1998 | - 2018.01 [fortinet] [Prevalent Threats Targeting Cuckoo Sandbox Detection and Our Mitigation](https://www.fortinet.com/blog/threat-research/prevalent-threats-targeting-cuckoo-sandbox-detection-and-our-mitigation.html) 1999 | 2000 | 2001 | # DBI 2002 | 2003 | 2004 | *** 2005 | 2006 | 2007 | ## DynamoRIO 2008 | 2009 | 2010 | ### 工具 2011 | 2012 | 2013 | #### DynamoRIO 2014 | 2015 | 2016 | - [**1388**星][4d] [C] [dynamorio/drmemory](https://github.com/dynamorio/drmemory) Memory Debugger for Windows, Linux, Mac, and Android 2017 | - [**1228**星][4d] [C] [dynamorio/dynamorio](https://github.com/dynamorio/dynamorio) Dynamic Instrumentation Tool Platform 2018 | 2019 | 2020 | #### 新添加的 2021 | 2022 | 2023 | - [**249**星][4m] [C] [ampotos/dynstruct](https://github.com/ampotos/dynstruct) Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone 2024 | 2025 | 2026 | #### 与其他工具交互 2027 | 2028 | 2029 | 2030 | 2031 | 2032 | 2033 | ### 文章&&视频 2034 | 2035 | 2036 | - 2019.10 [freebuf] [DrSemu:基于动态行为的恶意软件检测与分类工具](https://www.freebuf.com/sectool/214277.html) 2037 | - 2019.06 [freebuf] [Functrace:使用DynamoRIO追踪函数调用](https://www.freebuf.com/sectool/205989.html) 2038 | - 2019.01 [360] [深入浅出——基于DynamoRIO的strace和ltrace](https://www.anquanke.com/post/id/169257/) 2039 | - 2018.08 [n0where] [Dynamic API Call Tracer for Windows and Linux Applications: Drltrace](https://n0where.net/dynamic-api-call-tracer-for-windows-and-linux-applications-drltrace) 2040 | - 2018.07 [topsec] [动态二进制修改(Dynamic Binary Instrumentation)入门:Pin、DynamoRIO、Frida](http://blog.topsec.com.cn/%e5%8a%a8%e6%80%81%e4%ba%8c%e8%bf%9b%e5%88%b6%e4%bf%ae%e6%94%b9dynamic-binary-instrumentation%e5%85%a5%e9%97%a8%ef%bc%9apin%e3%80%81dynamorio%e3%80%81frida/) 2041 | - 2018.07 [topsec] [动态二进制修改(Dynamic Binary Instrumentation)入门:Pin、DynamoRIO、Frida](http://blog.topsec.com.cn/ad_lab/%e5%8a%a8%e6%80%81%e4%ba%8c%e8%bf%9b%e5%88%b6%e4%bf%ae%e6%94%b9dynamic-binary-instrumentation%e5%85%a5%e9%97%a8%ef%bc%9apin%e3%80%81dynamorio%e3%80%81frida/) 2042 | - 2018.07 [topsec] [动态二进制修改(Dynamic Binary Instrumentation)入门:Pin、DynamoRIO、Frida](http://blog.topsec.com.cn/%e5%8a%a8%e6%80%81%e4%ba%8c%e8%bf%9b%e5%88%b6%e4%bf%ae%e6%94%b9dynamic-binary-instrumentation%e5%85%a5%e9%97%a8%ef%bc%9apin%e3%80%81dynamorio%e3%80%81frida/) 2043 | - 2018.07 [topsec] [动态二进制修改(Dynamic Binary Instrumentation)入门:Pin、DynamoRIO、Frida](http://blog.topsec.com.cn/2018/07/%e5%8a%a8%e6%80%81%e4%ba%8c%e8%bf%9b%e5%88%b6%e4%bf%ae%e6%94%b9dynamic-binary-instrumentation%e5%85%a5%e9%97%a8%ef%bc%9apin%e3%80%81dynamorio%e3%80%81frida/) 2044 | - 2017.11 [SECConsult] [The Art of Fuzzing - Demo 10: In-memory Fuzzing HashCalc using DynamoRio](https://www.youtube.com/watch?v=FEJGlgBeUJ8) 2045 | - 2017.11 [SECConsult] [The Art of Fuzzing - Demo 6: Extract Coverage Information using DynamoRio](https://www.youtube.com/watch?v=Ur_E9c2vX1A) 2046 | - 2016.11 [360] [“Selfie”:利用DynamoRIO实现自修改代码自动脱壳的神器](https://www.anquanke.com/post/id/84999/) 2047 | - 2016.09 [securitygossip] [Practical Memory Checking With Dr. Memory](http://securitygossip.com/blog/2016/09/12/2016-09-12/) 2048 | - 2016.09 [sjtu] [Practical Memory Checking With Dr. Memory](https://loccs.sjtu.edu.cn/gossip/blog/2016/09/12/2016-09-12/) 2049 | - 2016.08 [n0where] [Dynamic Instrumentation Tool Platform: DynamoRIO](https://n0where.net/dynamic-instrumentation-tool-platform-dynamorio) 2050 | - 2012.10 [redplait] [building dynamorio](http://redplait.blogspot.com/2012/10/building-dynamorio.html) 2051 | - 2011.06 [redplait] [dynamorio](http://redplait.blogspot.com/2011/06/dynamorio.html) 2052 | 2053 | 2054 | 2055 | 2056 | *** 2057 | 2058 | 2059 | ## IntelPin 2060 | 2061 | 2062 | ### 工具 2063 | 2064 | 2065 | #### 新添加的 2066 | 2067 | 2068 | - [**299**星][2m] [C] [vusec/vuzzer](https://github.com/vusec/vuzzer) depends heavily on a modeified version of DataTracker, which in turn depends on LibDFT pintool. 2069 | 2070 | 2071 | #### 与其他工具交互 2072 | 2073 | 2074 | ##### 未分类 2075 | 2076 | 2077 | - [**943**星][1y] [Py] [gaasedelen/lighthouse](https://github.com/gaasedelen/lighthouse) 从DBI中收集代码覆盖情况,在IDA/Binja中映射、浏览、查看 2078 | - 重复区段: [IDA->插件->调试->DBI数据](#0fbd352f703b507853c610a664f024d1) |[DBI->Frida->工具->与其他工具交互->IDA](#d628ec92c9eea0c4b016831e1f6852b3) |[DBI->Frida->工具->与其他工具交互->BinaryNinja](#f9008a00e2bbc7535c88602aa79c8fd8) | 2079 | - [coverage-frida](https://github.com/gaasedelen/lighthouse/blob/master/coverage/frida/README.md) 使用Frida收集信息 2080 | - [coverage-pin](https://github.com/gaasedelen/lighthouse/blob/master/coverage/pin/README.md) 使用Pin收集覆盖信息 2081 | - [插件](https://github.com/gaasedelen/lighthouse/blob/master/plugin/lighthouse_plugin.py) 支持IDA和BinNinja 2082 | 2083 | 2084 | 2085 | 2086 | 2087 | 2088 | ### 文章&&视频 2089 | 2090 | 2091 | 2092 | 2093 | 2094 | 2095 | *** 2096 | 2097 | 2098 | ## Frida 2099 | 2100 | 2101 | ### 工具 2102 | 2103 | 2104 | #### Frida 2105 | 2106 | 2107 | - [**4516**星][5d] [Makefile] [frida/frida](https://github.com/frida/frida) Clone this repo to build Frida 2108 | 2109 | 2110 | #### 新添加的 2111 | 2112 | 2113 | - [**1193**星][7d] [JS] [alonemonkey/frida-ios-dump](https://github.com/alonemonkey/frida-ios-dump) pull decrypted ipa from jailbreak device 2114 | - 重复区段: [Apple->工具->新添加的](#d0108e91e6863289f89084ff09df39d0) | 2115 | - [**895**星][5m] [JS] [dpnishant/appmon](https://github.com/dpnishant/appmon) 用于监视和篡改本地macOS,iOS和android应用程序的系统API调用的自动化框架。基于Frida。 2116 | - [**645**星][8d] [Py] [igio90/dwarf](https://github.com/igio90/dwarf) Full featured multi arch/os debugger built on top of PyQt5 and frida 2117 | - [**559**星][1m] [JS] [nccgroup/house](https://github.com/nccgroup/house) 运行时手机 App 分析工具包, 带Web GUI 2118 | - [**513**星][24d] [JS] [iddoeldor/frida-snippets](https://github.com/iddoeldor/frida-snippets) Hand-crafted Frida examples 2119 | - [**422**星][12m] [Py] [dstmath/frida-unpack](https://github.com/dstmath/frida-unpack) 基于Frida的脱壳工具 2120 | - [**420**星][5d] [C] [frida/frida-python](https://github.com/frida/frida-python) Frida Python bindings 2121 | - [**332**星][7d] [JS] [chichou/bagbak](https://github.com/ChiChou/bagbak) Yet another frida based iOS dumpdecrypted, works on iOS 13 with checkra1n and supports decrypting app extensions 2122 | - [**321**星][29d] [C] [frida/frida-core](https://github.com/frida/frida-core) Frida core library intended for static linking into bindings 2123 | - [**308**星][4m] [JS] [smartdone/frida-scripts](https://github.com/smartdone/frida-scripts) 一些frida脚本 2124 | - [**283**星][8m] [Py] [nightbringer21/fridump](https://github.com/nightbringer21/fridump) A universal memory dumper using Frida 2125 | - [**250**星][1y] [Py] [igio90/frick](https://github.com/igio90/frick) aka the first debugger built on top of frida 2126 | - [**243**星][11d] [JS] [frenchyeti/dexcalibur](https://github.com/frenchyeti/dexcalibur) Dynamic binary instrumentation tool designed for Android application and powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform. 2127 | - [**228**星][5d] [C] [frida/frida-gum](https://github.com/frida/frida-gum) Low-level code instrumentation library used by frida-core 2128 | 2129 | 2130 | #### 与其他工具交互 2131 | 2132 | 2133 | ##### 未分类 2134 | 2135 | 2136 | - [**584**星][1y] [Java] [federicodotta/brida](https://github.com/federicodotta/brida) The new bridge between Burp Suite and Frida! 2137 | 2138 | 2139 | ##### IDA 2140 | 2141 | 2142 | - [**943**星][1y] [Py] [gaasedelen/lighthouse](https://github.com/gaasedelen/lighthouse) 从DBI中收集代码覆盖情况,在IDA/Binja中映射、浏览、查看 2143 | - 重复区段: [IDA->插件->调试->DBI数据](#0fbd352f703b507853c610a664f024d1) |[DBI->IntelPin->工具->与其他工具交互->未分类](#e129288dfadc2ab0890667109f93a76d) |[DBI->Frida->工具->与其他工具交互->BinaryNinja](#f9008a00e2bbc7535c88602aa79c8fd8) | 2144 | - [coverage-frida](https://github.com/gaasedelen/lighthouse/blob/master/coverage/frida/README.md) 使用Frida收集信息 2145 | - [coverage-pin](https://github.com/gaasedelen/lighthouse/blob/master/coverage/pin/README.md) 使用Pin收集覆盖信息 2146 | - [插件](https://github.com/gaasedelen/lighthouse/blob/master/plugin/lighthouse_plugin.py) 支持IDA和BinNinja 2147 | 2148 | 2149 | ##### BinaryNinja 2150 | 2151 | 2152 | - [**943**星][1y] [Py] [gaasedelen/lighthouse](https://github.com/gaasedelen/lighthouse) 从DBI中收集代码覆盖情况,在IDA/Binja中映射、浏览、查看 2153 | - 重复区段: [IDA->插件->调试->DBI数据](#0fbd352f703b507853c610a664f024d1) |[DBI->IntelPin->工具->与其他工具交互->未分类](#e129288dfadc2ab0890667109f93a76d) |[DBI->Frida->工具->与其他工具交互->IDA](#d628ec92c9eea0c4b016831e1f6852b3) | 2154 | - [coverage-frida](https://github.com/gaasedelen/lighthouse/blob/master/coverage/frida/README.md) 使用Frida收集信息 2155 | - [coverage-pin](https://github.com/gaasedelen/lighthouse/blob/master/coverage/pin/README.md) 使用Pin收集覆盖信息 2156 | - [插件](https://github.com/gaasedelen/lighthouse/blob/master/plugin/lighthouse_plugin.py) 支持IDA和BinNinja 2157 | 2158 | 2159 | ##### Radare2 2160 | 2161 | 2162 | - [**378**星][19d] [JS] [nowsecure/r2frida](https://github.com/nowsecure/r2frida) Radare2 and Frida better together. 2163 | - 重复区段: [Radare2->插件->与其他工具交互->未分类](#dfe53924d678f9225fc5ece9413b890f) | 2164 | 2165 | 2166 | 2167 | 2168 | 2169 | 2170 | ### 文章&&视频 2171 | 2172 | 2173 | - 2019.07 [hackertor] [Dwarf – Full Featured Multi Arch/Os Debugger Built On Top Of PyQt5 And Frida](https://hackertor.com/2019/07/13/dwarf-full-featured-multi-arch-os-debugger-built-on-top-of-pyqt5-and-frida/) 2174 | - 2019.05 [nsfocus] [Frida应用基础及 APP https证书验证破解](http://blog.nsfocus.net/frida%e5%ba%94%e7%94%a8%e5%9f%ba%e7%a1%80%e5%8f%8a-app-https%e8%af%81%e4%b9%a6%e9%aa%8c%e8%af%81%e7%a0%b4%e8%a7%a3/) 2175 | - 2019.05 [nsfocus] [Frida应用基础及 APP https证书验证破解](http://blog.nsfocus.net/frida-application-foundation-app-https-certificate-verification-cracking-2/) 2176 | - 2019.05 [nsfocus] [Frida应用基础及APP https证书验证破解](http://blog.nsfocus.net/frida-application-foundation-app-https-certificate-verification-cracking/) 2177 | - 2019.05 [CodeColorist] [Trace child process with frida on macOS](https://medium.com/p/3b8f0f953f3d) 2178 | - 2019.05 [360] [FRIDA脚本系列(四)更新篇:几个主要机制的大更新](https://www.anquanke.com/post/id/177597/) 2179 | - 2019.03 [360] [FRIDA脚本系列(三)超神篇:百度AI“调教”抖音AI](https://www.anquanke.com/post/id/175621/) 2180 | - 2019.03 [securityinnovation] [Setting up Frida Without Jailbreak on the Latest iOS 12.1.4 Device](https://blog.securityinnovation.com/frida) 2181 | - 2019.02 [nowsecure] [Frida 12.3 Debuts New Crash Reporting Feature](https://www.nowsecure.com/blog/2019/02/07/frida-12-3-debuts-new-crash-reporting-feature/) 2182 | - 2019.01 [fuzzysecurity] [Windows Hacking 之:ApplicationIntrospection & Hooking With Frida](http://fuzzysecurity.com/tutorials/29.html) 2183 | - 2019.01 [fuping] [安卓APP测试之HOOK大法-Frida篇](https://fuping.site/2019/01/25/Frida-Hook-SoulAPP/) 2184 | - 2019.01 [360] [FRIDA脚本系列(二)成长篇:动静态结合逆向WhatsApp](https://www.anquanke.com/post/id/169315/) 2185 | - 2019.01 [pediy] [[原创]介召几个frida在安卓逆向中使用的脚本以及延时Hook手法](https://bbs.pediy.com/thread-248848.htm) 2186 | - 2018.12 [360] [FRIDA脚本系列(一)入门篇:在安卓8.1上dump蓝牙接口和实例](https://www.anquanke.com/post/id/168152/) 2187 | - 2018.12 [pediy] [[原创]CVE-2017-4901 VMware虚拟机逃逸漏洞分析【Frida Windows实例】](https://bbs.pediy.com/thread-248384.htm) 2188 | - 2018.12 [freebuf] [一篇文章带你领悟Frida的精髓(基于安卓8.1)](https://www.freebuf.com/articles/system/190565.html) 2189 | - 2018.12 [pediy] [[原创] Frida操作手册-Android环境准备](https://bbs.pediy.com/thread-248293.htm) 2190 | - 2018.11 [4hou] [使用FRIDA为Android应用进行脱壳的操作指南](http://www.4hou.com/technology/14404.html) 2191 | - 2018.11 [pediy] [[原创]Frida Bypass Android SSL pinning example 1](https://bbs.pediy.com/thread-247967.htm) 2192 | - 2018.11 [freebuf] [Frida-Wshook:一款基于Frida.re的脚本分析工具](https://www.freebuf.com/sectool/188726.html) 2193 | 2194 | 2195 | 2196 | 2197 | *** 2198 | 2199 | 2200 | ## 其他 2201 | 2202 | 2203 | 2204 | 2205 | # 其他 2206 | 2207 | 2208 | *** 2209 | 2210 | 2211 | ## 文章-新添加的 2212 | 2213 | 2214 | 2215 | 2216 | *** 2217 | 2218 | 2219 | ## 工具-新添加的 2220 | 2221 | 2222 | - [**19766**星][3m] [Jupyter Notebook] [camdavidsonpilon/probabilistic-programming-and-bayesian-methods-for-hackers](https://github.com/camdavidsonpilon/probabilistic-programming-and-bayesian-methods-for-hackers) aka "Bayesian Methods for Hackers": An introduction to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view. All in pure Python ;) 2223 | - [**14349**星][1m] [Py] [corentinj/real-time-voice-cloning](https://github.com/corentinj/real-time-voice-cloning) Clone a voice in 5 seconds to generate arbitrary speech in real-time 2224 | - [**11402**星][2d] [Java] [oracle/graal](https://github.com/oracle/graal) Run Programs Faster Anywhere 2225 | - [**11213**星][2m] [Jupyter Notebook] [selfteaching/the-craft-of-selfteaching](https://github.com/selfteaching/the-craft-of-selfteaching) One has no future if one couldn't teach themself. 2226 | - [**10378**星][3d] [Go] [goharbor/harbor](https://github.com/goharbor/harbor) An open source trusted cloud native registry project that stores, signs, and scans content. 2227 | - [**7748**星][2d] [Go] [git-lfs/git-lfs](https://github.com/git-lfs/git-lfs) Git extension for versioning large files 2228 | - [**7020**星][6d] [Go] [nats-io/nats-server](https://github.com/nats-io/nats-server) High-Performance server for NATS, the cloud native messaging system. 2229 | - [**6894**星][2m] [Go] [sqshq/sampler](https://github.com/sqshq/sampler) A tool for shell commands execution, visualization and alerting. Configured with a simple YAML file. 2230 | - [**6454**星][9m] [HTML] [open-power-workgroup/hospital](https://github.com/open-power-workgroup/hospital) OpenPower工作组收集汇总的医院开放数据 2231 | - [**6353**星][1m] [Py] [seatgeek/fuzzywuzzy](https://github.com/seatgeek/fuzzywuzzy) Fuzzy String Matching in Python 2232 | - [**6055**星][7m] [JS] [haotian-wang/google-access-helper](https://github.com/haotian-wang/google-access-helper) 谷歌访问助手破解版 2233 | - [**5876**星][3m] [Gnuplot] [nasa-jpl/open-source-rover](https://github.com/nasa-jpl/open-source-rover) A build-it-yourself, 6-wheel rover based on the rovers on Mars! 2234 | - [**5829**星][7m] [JS] [sindresorhus/fkill-cli](https://github.com/sindresorhus/fkill-cli) Fabulously kill processes. Cross-platform. 2235 | - [**5753**星][10d] [Go] [casbin/casbin](https://github.com/casbin/casbin) An authorization library that supports access control models like ACL, RBAC, ABAC in Golang 2236 | - [**5751**星][8m] [C] [xoreaxeaxeax/movfuscator](https://github.com/xoreaxeaxeax/movfuscator) C编译器,编译的二进制文件只有1个代码块。 2237 | - [**5717**星][20d] [JS] [swagger-api/swagger-editor](https://github.com/swagger-api/swagger-editor) Swagger Editor 2238 | - [**5420**星][4d] [Py] [mlflow/mlflow](https://github.com/mlflow/mlflow) Open source platform for the machine learning lifecycle 2239 | - [**5229**星][4m] [Py] [ytisf/thezoo](https://github.com/ytisf/thezoo) A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public. 2240 | - [**5226**星][5d] [Shell] [denisidoro/navi](https://github.com/denisidoro/navi) An interactive cheatsheet tool for the command-line 2241 | - [**5116**星][3d] [ASP] [hq450/fancyss](https://github.com/hq450/fancyss) fancyss is a project providing tools to across the GFW on asuswrt/merlin based router. 2242 | - [**5007**星][1m] [Py] [snare/voltron](https://github.com/snare/voltron) A hacky debugger UI for hackers 2243 | - [**4857**星][5d] [Go] [gcla/termshark](https://github.com/gcla/termshark) A terminal UI for tshark, inspired by Wireshark 2244 | - [**4810**星][8m] [Py] [10se1ucgo/disablewintracking](https://github.com/10se1ucgo/disablewintracking) Uses some known methods that attempt to minimize tracking in Windows 10 2245 | - [**4747**星][t] [C++] [paddlepaddle/paddle-lite](https://github.com/PaddlePaddle/Paddle-Lite) Multi-platform high performance deep learning inference engine (『飞桨』多平台高性能深度学习预测引擎) 2246 | - [**4651**星][5d] [powershell/win32-openssh](https://github.com/powershell/win32-openssh) Win32 port of OpenSSH 2247 | - [**4610**星][1y] [C] [upx/upx](https://github.com/upx/upx) UPX - the Ultimate Packer for eXecutables 2248 | - [**4600**星][11m] [Py] [ecthros/uncaptcha2](https://github.com/ecthros/uncaptcha2) defeating the latest version of ReCaptcha with 91% accuracy 2249 | - [**4597**星][4d] [C++] [mozilla/rr](https://github.com/mozilla/rr) 记录与重放App的调试执行过程 2250 | - [**4541**星][4m] [TS] [apis-guru/graphql-voyager](https://github.com/apis-guru/graphql-voyager) 2251 | - [**4352**星][12m] [Py] [lennylxx/ipv6-hosts](https://github.com/lennylxx/ipv6-hosts) Fork of 2252 | - [**4314**星][7d] [Rust] [timvisee/ffsend](https://github.com/timvisee/ffsend) Easily and securely share files from the command line 2253 | - [**4258**星][12m] [JS] [butterproject/butter-desktop](https://github.com/butterproject/butter-desktop) All the free parts of Popcorn Time 2254 | - [**4062**星][3m] [Java] [jesusfreke/smali](https://github.com/jesusfreke/smali) smali/baksmali 2255 | - [**4060**星][2m] [JS] [sigalor/whatsapp-web-reveng](https://github.com/sigalor/whatsapp-web-reveng) WhatsApp Web API逆向与重新实现 2256 | - [**4003**星][3d] [Go] [dexidp/dex](https://github.com/dexidp/dex) OpenID Connect Identity (OIDC) and OAuth 2.0 Provider with Pluggable Connectors 2257 | - [**3980**星][27d] [Rust] [svenstaro/genact](https://github.com/svenstaro/genact) a nonsense activity generator 2258 | - [**3960**星][3d] [Py] [angr/angr](https://github.com/angr/angr) A powerful and user-friendly binary analysis platform! 2259 | - [**3954**星][8d] [Go] [eranyanay/1m-go-websockets](https://github.com/eranyanay/1m-go-websockets) handling 1M websockets connections in Go 2260 | - [**3939**星][7d] [C] [aquynh/capstone](https://github.com/aquynh/capstone) Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings. 2261 | - [**3908**星][4d] [C++] [baldurk/renderdoc](https://github.com/baldurk/renderdoc) RenderDoc is a stand-alone graphics debugging tool. 2262 | - [**3844**星][2m] [ObjC] [sveinbjornt/sloth](https://github.com/sveinbjornt/sloth) Mac app that shows all open files, directories and sockets in use by all running processes. Nice GUI for lsof. 2263 | - [**3773**星][17d] [jjqqkk/chromium](https://github.com/jjqqkk/chromium) Chromium browser with SSL VPN. Use this browser to unblock websites. 2264 | - [**3768**星][2m] [Go] [microsoft/ethr](https://github.com/microsoft/ethr) Ethr is a Network Performance Measurement Tool for TCP, UDP & HTTP. 2265 | - [**3749**星][4d] [Go] [hashicorp/consul-template](https://github.com/hashicorp/consul-template) Template rendering, notifier, and supervisor for 2266 | - [**3690**星][13d] [JS] [lesspass/lesspass](https://github.com/lesspass/lesspass) 2267 | - [**3688**星][21d] [HTML] [hamukazu/lets-get-arrested](https://github.com/hamukazu/lets-get-arrested) This project is intended to protest against the police in Japan 2268 | - [**3627**星][18d] [HTML] [consensys/smart-contract-best-practices](https://github.com/consensys/smart-contract-best-practices) A guide to smart contract security best practices 2269 | - [**3608**星][] [Pascal] [cheat-engine/cheat-engine](https://github.com/cheat-engine/cheat-engine) Cheat Engine. A development environment focused on modding 2270 | - [**3538**星][5m] [Shell] [chengr28/revokechinacerts](https://github.com/chengr28/revokechinacerts) Revoke Chinese certificates. 2271 | - [**3505**星][8d] [C] [cyan4973/xxhash](https://github.com/cyan4973/xxhash) Extremely fast non-cryptographic hash algorithm 2272 | - [**3451**星][10d] [C] [mikebrady/shairport-sync](https://github.com/mikebrady/shairport-sync) AirPlay audio player. Shairport Sync adds multi-room capability with Audio Synchronisation 2273 | - [**3306**星][11d] [C] [microsoft/windows-driver-samples](https://github.com/microsoft/windows-driver-samples) This repo contains driver samples prepared for use with Microsoft Visual Studio and the Windows Driver Kit (WDK). It contains both Universal Windows Driver and desktop-only driver samples. 2274 | - [**3295**星][7d] [JS] [koenkk/zigbee2mqtt](https://github.com/koenkk/zigbee2mqtt) Zigbee 2275 | - [**3289**星][7d] [C] [virustotal/yara](https://github.com/virustotal/yara) The pattern matching swiss knife 2276 | - [**3280**星][21d] [Java] [oldmanpushcart/greys-anatomy](https://github.com/oldmanpushcart/greys-anatomy) Java诊断工具 2277 | - [**3243**星][6d] [Shell] [gfw-breaker/ssr-accounts](https://github.com/gfw-breaker/ssr-accounts) 一键部署Shadowsocks服务;免费Shadowsocks账号分享;免费SS账号分享; 翻墙;无界,自由门,SquirrelVPN 2278 | - [**3233**星][17d] [C] [tmate-io/tmate](https://github.com/tmate-io/tmate) Instant Terminal Sharing 2279 | - [**3219**星][2m] [TS] [google/incremental-dom](https://github.com/google/incremental-dom) An in-place DOM diffing library 2280 | - [**3202**星][1y] [Shell] [toyodadoubi/doubi](https://github.com/toyodadoubi/doubi) 一个逗比写的各种逗比脚本~ 2281 | - [**3188**星][3d] [C] [meetecho/janus-gateway](https://github.com/meetecho/janus-gateway) Janus WebRTC Server 2282 | - [**3131**星][1m] [CSS] [readthedocs/sphinx_rtd_theme](https://github.com/readthedocs/sphinx_rtd_theme) Sphinx theme for readthedocs.org 2283 | - [**3129**星][5d] [C] [qemu/qemu](https://github.com/qemu/qemu) Official QEMU mirror. Please see 2284 | - [**3120**星][2d] [Go] [tencent/bk-cmdb](https://github.com/tencent/bk-cmdb) 蓝鲸智云配置平台(BlueKing CMDB) 2285 | - [**3108**星][1m] [C] [unicorn-engine/unicorn](https://github.com/unicorn-engine/unicorn) Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) 2286 | - [**3052**星][4m] [C++] [google/robotstxt](https://github.com/google/robotstxt) The repository contains Google's robots.txt parser and matcher as a C++ library (compliant to C++11). 2287 | - [**3010**星][1y] [PHP] [owner888/phpspider](https://github.com/owner888/phpspider) 《我用爬虫一天时间“偷了”知乎一百万用户,只为证明PHP是世界上最好的语言 》所使用的程序 2288 | - [**2993**星][10d] [Py] [quantaxis/quantaxis](https://github.com/quantaxis/quantaxis) 支持任务调度 分布式部署的 股票/期货/自定义市场 数据/回测/模拟/交易/可视化 纯本地PAAS量化解决方案 2289 | - [**2980**星][6d] [ObjC] [google/santa](https://github.com/google/santa) 用于Mac系统的二进制文件白名单/黑名单系统 2290 | - [**2948**星][23d] [C] [libfuse/sshfs](https://github.com/libfuse/sshfs) A network filesystem client to connect to SSH servers 2291 | - [**2898**星][7m] [C] [p-h-c/phc-winner-argon2](https://github.com/p-h-c/phc-winner-argon2) The password hash Argon2, winner of PHC 2292 | - [**2872**星][6d] [C] [lxc/lxc](https://github.com/lxc/lxc) LXC - Linux Containers 2293 | - [**2854**星][28d] [Py] [espressif/esptool](https://github.com/espressif/esptool) ESP8266 and ESP32 serial bootloader utility 2294 | - [**2848**星][6m] [Py] [instantbox/instantbox](https://github.com/instantbox/instantbox) Get a clean, ready-to-go Linux box in seconds. 2295 | - [**2833**星][2m] [Assembly] [cirosantilli/x86-bare-metal-examples](https://github.com/cirosantilli/x86-bare-metal-examples) 几十个用于学习 x86 系统编程的小型操作系统 2296 | - [**2815**星][12d] [C] [processhacker/processhacker](https://github.com/processhacker/processhacker) A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. 2297 | - [**2808**星][10m] [Py] [plasma-disassembler/plasma](https://github.com/plasma-disassembler/plasma) Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax. 2298 | - [**2789**星][5d] [C++] [qtox/qtox](https://github.com/qtox/qtox) qTox is a chat, voice, video, and file transfer IM client using the encrypted peer-to-peer Tox protocol. 2299 | - [**2772**星][2m] [JS] [trufflesuite/ganache-cli](https://github.com/trufflesuite/ganache-cli) Fast Ethereum RPC client for testing and development 2300 | - [**2760**星][] [TS] [webhintio/hint](https://github.com/webhintio/hint) 2301 | - [**2718**星][3m] [Py] [drivendata/cookiecutter-data-science](https://github.com/drivendata/cookiecutter-data-science) A logical, reasonably standardized, but flexible project structure for doing and sharing data science work. 2302 | - [**2687**星][2d] [Go] [adguardteam/adguardhome](https://github.com/adguardteam/adguardhome) Network-wide ads & trackers blocking DNS server 2303 | - [**2631**星][8m] [leandromoreira/linux-network-performance-parameters](https://github.com/leandromoreira/linux-network-performance-parameters) Learn where some of the network sysctl variables fit into the Linux/Kernel network flow 2304 | - [**2627**星][15d] [JS] [popcorn-official/popcorn-desktop](https://github.com/popcorn-official/popcorn-desktop) Popcorn Time is a multi-platform, free software BitTorrent client that includes an integrated media player. Desktop ( Windows / Mac / Linux ) a Butter-Project Fork 2305 | - [**2621**星][2m] [pditommaso/awesome-pipeline](https://github.com/pditommaso/awesome-pipeline) A curated list of awesome pipeline toolkits inspired by Awesome Sysadmin 2306 | - [**2619**星][2m] [Swift] [zhuhaow/nekit](https://github.com/zhuhaow/nekit) A toolkit for Network Extension Framework 2307 | - [**2615**星][1m] [JS] [knownsec/kcon](https://github.com/knownsec/kcon) KCon is a famous Hacker Con powered by Knownsec Team. 2308 | - [**2587**星][2d] [C] [esnet/iperf](https://github.com/esnet/iperf) A TCP, UDP, and SCTP network bandwidth measurement tool 2309 | - [**2535**星][2m] [Java] [jboss-javassist/javassist](https://github.com/jboss-javassist/javassist) Java bytecode engineering toolkit 2310 | - [**2478**星][11m] [JS] [weixin/miaow](https://github.com/weixin/Miaow) A set of plugins for Sketch include drawing links & marks, UI Kit & Color sync, font & text replacing. 2311 | - [**2474**星][17d] [JS] [vitaly-t/pg-promise](https://github.com/vitaly-t/pg-promise) PostgreSQL interface for Node.js 2312 | - [**2391**星][12d] [Java] [mock-server/mockserver](https://github.com/mock-server/mockserver) MockServer enables easy mocking of any system you integrate with via HTTP or HTTPS with clients written in Java, JavaScript and Ruby. MockServer also includes a proxy that introspects all proxied traffic including encrypted SSL traffic and supports Port Forwarding, Web Proxying (i.e. HTTP proxy), HTTPS Tunneling Proxying (using HTTP CONNECT) and… 2313 | - [**2364**星][2d] [C] [domoticz/domoticz](https://github.com/domoticz/domoticz) monitor and configure various devices like: Lights, Switches, various sensors/meters like Temperature, Rain, Wind, UV, Electra, Gas, Water and much more 2314 | - [**2345**星][3m] [Go] [vuvuzela/vuvuzela](https://github.com/vuvuzela/vuvuzela) Private messaging system that hides metadata 2315 | - [**2344**星][8d] [C] [tsl0922/ttyd](https://github.com/tsl0922/ttyd) Share your terminal over the web 2316 | - [**2340**星][2m] [JS] [pa11y/pa11y](https://github.com/pa11y/pa11y) Pa11y is your automated accessibility testing pal 2317 | - [**2305**星][2m] [C] [moby/hyperkit](https://github.com/moby/hyperkit) A toolkit for embedding hypervisor capabilities in your application 2318 | - [**2286**星][1m] [JS] [talkingdata/inmap](https://github.com/talkingdata/inmap) 大数据地理可视化 2319 | - [**2260**星][5d] [dumb-password-rules/dumb-password-rules](https://github.com/dumb-password-rules/dumb-password-rules) Shaming sites with dumb password rules. 2320 | - [**2217**星][6d] [Go] [google/mtail](https://github.com/google/mtail) extract whitebox monitoring data from application logs for collection in a timeseries database 2321 | - [**2214**星][10d] [getlantern/lantern-binaries](https://github.com/getlantern/lantern-binaries) Lantern installers binary downloads. 2322 | - [**2211**星][1m] [C++] [google/bloaty](https://github.com/google/bloaty) Bloaty McBloatface: a size profiler for binaries 2323 | - [**2194**星][4d] [C] [armmbed/mbedtls](https://github.com/armmbed/mbedtls) An open source, portable, easy to use, readable and flexible SSL library 2324 | - [**2137**星][11d] [Assembly] [pret/pokered](https://github.com/pret/pokered) disassembly of Pokémon Red/Blue 2325 | - [**2132**星][12d] [goq/telegram-list](https://github.com/goq/telegram-list) List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов 2326 | - [**2093**星][] [C] [flatpak/flatpak](https://github.com/flatpak/flatpak) Linux application sandboxing and distribution framework 2327 | - [**2092**星][18d] [swiftonsecurity/sysmon-config](https://github.com/swiftonsecurity/sysmon-config) Sysmon configuration file template with default high-quality event tracing 2328 | - [**2080**星][1m] [Go] [theupdateframework/notary](https://github.com/theupdateframework/notary) Notary is a project that allows anyone to have trust over arbitrary collections of data 2329 | - [**2053**星][4m] [Go] [maxmcd/webtty](https://github.com/maxmcd/webtty) Share a terminal session over WebRTC 2330 | - [**2053**星][16d] [C#] [mathewsachin/captura](https://github.com/mathewsachin/captura) Capture Screen, Audio, Cursor, Mouse Clicks and Keystrokes 2331 | - [**2052**星][5d] [C++] [openthread/openthread](https://github.com/openthread/openthread) OpenThread released by Google is an open-source implementation of the Thread networking protocol 2332 | - [**2031**星][10m] [C] [dekunukem/nintendo_switch_reverse_engineering](https://github.com/dekunukem/nintendo_switch_reverse_engineering) A look at inner workings of Joycon and Nintendo Switch 2333 | - [**2003**星][2m] [C++] [asmjit/asmjit](https://github.com/asmjit/asmjit) Complete x86/x64 JIT and AOT Assembler for C++ 2334 | - [**1998**星][1m] [Swift] [github/softu2f](https://github.com/github/softu2f) Software U2F authenticator for macOS 2335 | - [**1955**星][3d] [Go] [solo-io/gloo](https://github.com/solo-io/gloo) An Envoy-Powered API Gateway 2336 | - [**1949**星][9d] [C] [microsoft/procdump-for-linux](https://github.com/microsoft/procdump-for-linux) Linux 版本的 ProcDump 2337 | - [**1930**星][14d] [C++] [mhammond/pywin32](https://github.com/mhammond/pywin32) Python for Windows (pywin32) Extensions 2338 | - [**1907**星][10d] [Go] [minishift/minishift](https://github.com/minishift/minishift) Run OpenShift 3.x locally 2339 | - [**1899**星][17d] [C++] [acidanthera/lilu](https://github.com/acidanthera/Lilu) Arbitrary kext and process patching on macOS 2340 | - [**1877**星][17d] [Java] [adoptopenjdk/jitwatch](https://github.com/adoptopenjdk/jitwatch) Log analyser / visualiser for Java HotSpot JIT compiler. Inspect inlining decisions, hot methods, bytecode, and assembly. View results in the JavaFX user interface. 2341 | - [**1863**星][2d] [C++] [pytorch/glow](https://github.com/pytorch/glow) Compiler for Neural Network hardware accelerators 2342 | - [**1859**星][12m] [C++] [googlecreativelab/open-nsynth-super](https://github.com/googlecreativelab/open-nsynth-super) Open NSynth Super is an experimental physical interface for the NSynth algorithm 2343 | - [**1854**星][11d] [C] [github/glb-director](https://github.com/github/glb-director) GitHub Load Balancer Director and supporting tooling. 2344 | - [**1852**星][1y] [Py] [jinnlynn/genpac](https://github.com/jinnlynn/genpac) PAC/Dnsmasq/Wingy file Generator, working with gfwlist, support custom rules. 2345 | - [**1851**星][1y] [Java] [yeriomin/yalpstore](https://github.com/yeriomin/yalpstore) Download apks from Google Play Store 2346 | - [**1848**星][9m] [Py] [netflix-skunkworks/stethoscope](https://github.com/Netflix-Skunkworks/stethoscope) Personalized, user-focused recommendations for employee information security. 2347 | - [**1846**星][2m] [C] [retroplasma/earth-reverse-engineering](https://github.com/retroplasma/earth-reverse-engineering) Reversing Google's 3D satellite mode 2348 | - [**1837**星][3m] [Go] [influxdata/kapacitor](https://github.com/influxdata/kapacitor) Open source framework for processing, monitoring, and alerting on time series data 2349 | - [**1827**星][5d] [Py] [trailofbits/manticore](https://github.com/trailofbits/manticore) 动态二进制分析工具,支持符号执行(symbolic execution)、污点分析(taint analysis)、运行时修改。 2350 | - [**1816**星][21d] [Go] [gdamore/tcell](https://github.com/gdamore/tcell) Tcell is an alternate terminal package, similar in some ways to termbox, but better in others. 2351 | - [**1786**星][26d] [C++] [apitrace/apitrace](https://github.com/apitrace/apitrace) Tools for tracing OpenGL, Direct3D, and other graphics APIs 2352 | - [**1781**星][18d] [PHP] [ezyang/htmlpurifier](https://github.com/ezyang/htmlpurifier) Standards compliant HTML filter written in PHP 2353 | - [**1779**星][21d] [17mon/china_ip_list](https://github.com/17mon/china_ip_list) 2354 | - [**1761**星][1y] [JS] [puppeteer/examples](https://github.com/puppeteer/examples) Use case-driven examples for using Puppeteer and headless chrome 2355 | - [**1761**星][4d] [C] [google/wuffs](https://github.com/google/wuffs) Wrangling Untrusted File Formats Safely 2356 | - [**1756**星][8d] [PHP] [wordpress/wordpress-coding-standards](https://github.com/wordpress/wordpress-coding-standards) PHP_CodeSniffer rules (sniffs) to enforce WordPress coding conventions 2357 | - [**1727**星][t] [TSQL] [brentozarultd/sql-server-first-responder-kit](https://github.com/brentozarultd/sql-server-first-responder-kit) sp_Blitz, sp_BlitzCache, sp_BlitzFirst, sp_BlitzIndex, and other SQL Server scripts for health checks and performance tuning. 2358 | - [**1722**星][4m] [Py] [anorov/cloudflare-scrape](https://github.com/anorov/cloudflare-scrape) A Python module to bypass Cloudflare's anti-bot page. 2359 | - [**1714**星][27d] [Go] [hashicorp/memberlist](https://github.com/hashicorp/memberlist) Golang package for gossip based membership and failure detection 2360 | - [**1698**星][13d] [C++] [microsoft/detours](https://github.com/microsoft/detours) Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form. 2361 | - [**1676**星][2d] [Java] [apache/geode](https://github.com/apache/geode) Apache Geode 2362 | - [**1672**星][7m] [C] [easyhook/easyhook](https://github.com/easyhook/easyhook) The reinvention of Windows API Hooking 2363 | - [**1668**星][3m] [Py] [boppreh/keyboard](https://github.com/boppreh/keyboard) Hook and simulate global keyboard events on Windows and Linux. 2364 | - [**1659**星][16d] [JS] [tylerbrock/mongo-hacker](https://github.com/tylerbrock/mongo-hacker) MongoDB Shell Enhancements for Hackers 2365 | - [**1650**星][5d] [sarojaba/awesome-devblog](https://github.com/sarojaba/awesome-devblog) 어썸데브블로그. 국내 개발 블로그 모음(only 실명으로). 2366 | - [**1637**星][4d] [JS] [efforg/privacybadger](https://github.com/efforg/privacybadger) Privacy Badger is a browser extension that automatically learns to block invisible trackers. 2367 | - [**1624**星][9m] [JS] [localtunnel/server](https://github.com/localtunnel/server) server for localtunnel.me 2368 | - [**1620**星][8d] [C++] [lief-project/lief](https://github.com/lief-project/lief) Library to Instrument Executable Formats 2369 | - [**1592**星][2m] [ObjC] [ealeksandrov/provisionql](https://github.com/ealeksandrov/provisionql) Quick Look plugin for apps and provisioning profile files 2370 | - [**1584**星][1y] [C] [qihoo360/phptrace](https://github.com/qihoo360/phptrace) A tracing and troubleshooting tool for PHP scripts. 2371 | - [**1572**星][25d] [C] [codahale/bcrypt-ruby](https://github.com/codahale/bcrypt-ruby) Ruby binding for the OpenBSD bcrypt() password hashing algorithm, allowing you to easily store a secure hash of your users' passwords. 2372 | - [**1562**星][29d] [C] [p-gen/smenu](https://github.com/p-gen/smenu) Terminal utility that reads words from standard input or from a file and creates an interactive selection window just below the cursor. The selected word(s) are sent to standard output for further processing. 2373 | - [**1562**星][11d] [Java] [gchq/gaffer](https://github.com/gchq/Gaffer) A large-scale entity and relation database supporting aggregation of properties 2374 | - [**966**星][7m] [PHP] [jenssegers/optimus](https://github.com/jenssegers/optimus) id transformation With this library, you can transform your internal id's to obfuscated integers based on Knuth's integer has和 2375 | - [**906**星][7m] [C++] [dfhack/dfhack](https://github.com/DFHack/dfhack) Memory hacking library for Dwarf Fortress and a set of tools that use it 2376 | - [**895**星][11m] [JS] [levskaya/jslinux-deobfuscated](https://github.com/levskaya/jslinux-deobfuscated) An old version of Mr. Bellard's JSLinux rewritten to be human readable, hand deobfuscated and annotated. 2377 | - [**706**星][1y] [Jupyter Notebook] [anishathalye/obfuscated-gradients](https://github.com/anishathalye/obfuscated-gradients) Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples 2378 | - [**658**星][10m] [Jupyter Notebook] [supercowpowers/data_hacking](https://github.com/SuperCowPowers/data_hacking) Data Hacking Project 2379 | - [**657**星][1y] [Rust] [endgameinc/xori](https://github.com/endgameinc/xori) Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode 2380 | - [**637**星][13d] [PS] [olafhartong/sysmon-modular](https://github.com/olafhartong/sysmon-modular) sysmon配置模块收集 2381 | - [**587**星][6m] [nshalabi/sysmontools](https://github.com/nshalabi/sysmontools) Utilities for Sysmon 2382 | - [**568**星][11m] [JS] [raineorshine/solgraph](https://github.com/raineorshine/solgraph) Visualize Solidity control flow for smart contract security analysis. 2383 | - [**523**星][1m] [mhaggis/sysmon-dfir](https://github.com/mhaggis/sysmon-dfir) Sources, configuration and how to detect evil things utilizing Microsoft Sysmon. 2384 | - [**522**星][4m] [Java] [java-deobfuscator/deobfuscator](https://github.com/java-deobfuscator/deobfuscator) Java 代码反混淆工具 2385 | - [**507**星][8m] [JS] [mindedsecurity/jstillery](https://github.com/mindedsecurity/jstillery) Advanced JavaScript Deobfuscation via Partial Evaluation 2386 | - [**480**星][1y] [ksluckow/awesome-symbolic-execution](https://github.com/ksluckow/awesome-symbolic-execution) A curated list of awesome symbolic execution resources including essential research papers, lectures, videos, and tools. 2387 | - [**449**星][12m] [C++] [ntquery/scylla](https://github.com/ntquery/scylla) Imports Reconstructor 2388 | - [**447**星][3m] [Go] [retroplasma/flyover-reverse-engineering](https://github.com/retroplasma/flyover-reverse-engineering) Reversing Apple's 3D satellite mode 2389 | - [**446**星][11m] [Batchfile] [ion-storm/sysmon-config](https://github.com/ion-storm/sysmon-config) Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing 2390 | - [**408**星][11d] [Py] [crytic/slither](https://github.com/crytic/slither) Static Analyzer for Solidity 2391 | - [**383**星][1y] [HTML] [maestron/reverse-engineering-tutorials](https://github.com/maestron/reverse-engineering-tutorials) Reverse Engineering Tutorials 2392 | - [**344**星][1y] [Ruby] [calebfenton/dex-oracle](https://github.com/calebfenton/dex-oracle) A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis 2393 | - [**308**星][16d] [Py] [baderj/domain_generation_algorithms](https://github.com/baderj/domain_generation_algorithms) 域名生成算法 2394 | - [**306**星][1m] [C] [nagyd/sdlpop](https://github.com/nagyd/sdlpop) An open-source port of Prince of Persia, based on the disassembly of the DOS version. 2395 | - [**291**星][20d] [C] [tomb5/tomb5](https://github.com/tomb5/tomb5) Chronicles Disassembly translated to C source code. 2396 | - [**265**星][2m] [Assembly] [pret/pokeyellow](https://github.com/pret/pokeyellow) Disassembly of Pokemon Yellow 2397 | - [**240**星][4m] [JS] [consensys/surya](https://github.com/consensys/surya) A set of utilities for exploring Solidity contracts 2398 | - [**214**星][2m] [Py] [rpisec/llvm-deobfuscator](https://github.com/rpisec/llvm-deobfuscator) 2399 | - [**211**星][12m] [Java] [neo23x0/fnord](https://github.com/neo23x0/fnord) Pattern Extractor for Obfuscated Code 2400 | 2401 | 2402 | *** 2403 | 2404 | 2405 | ## 工具-其他 2406 | 2407 | 2408 | 2409 | 2410 | *** 2411 | 2412 | 2413 | ## angr 2414 | 2415 | 2416 | ### 工具 2417 | 2418 | 2419 | - [**534**星][4d] [Py] [angr/angr-doc](https://github.com/angr/angr-doc) Documentation for the angr suite 2420 | - [**305**星][2m] [Py] [salls/angrop](https://github.com/salls/angrop) a rop gadget finder and chain builder 2421 | 2422 | 2423 | ### 文章 2424 | 2425 | 2426 | 2427 | 2428 | 2429 | 2430 | *** 2431 | 2432 | 2433 | ## Debug&&调试 2434 | 2435 | 2436 | ### 工具 2437 | 2438 | 2439 | - [**1450**星][2d] [Go] [google/gapid](https://github.com/google/gapid) Graphics API Debugger 2440 | - [**1422**星][9d] [C++] [eteran/edb-debugger](https://github.com/eteran/edb-debugger) edb is a cross platform AArch32/x86/x86-64 debugger. 2441 | - [**1413**星][11d] [Go] [cosmos72/gomacro](https://github.com/cosmos72/gomacro) Interactive Go interpreter and debugger with REPL, Eval, generics and Lisp-like macros 2442 | - [**1275**星][3m] [Go] [solo-io/squash](https://github.com/solo-io/squash) The debugger for microservices 2443 | - [**1147**星][5m] [C++] [cgdb/cgdb](https://github.com/cgdb/cgdb) Console front-end to the GNU debugger 2444 | - [**1128**星][12d] [C] [blacksphere/blackmagic](https://github.com/blacksphere/blackmagic) In application debugger for ARM Cortex microcontrollers. 2445 | - [**899**星][2d] [Py] [derekselander/lldb](https://github.com/derekselander/lldb) A collection of LLDB aliases/regexes and Python scripts to aid in your debugging sessions 2446 | - [**836**星][t] [C++] [tasvideos/bizhawk](https://github.com/tasvideos/bizhawk) BizHawk is a multi-system emulator written in C#. BizHawk provides nice features for casual gamers such as full screen, and joypad support in addition to full rerecording and debugging tools for all system cores. 2447 | - [**560**星][13d] [C#] [microsoft/miengine](https://github.com/microsoft/miengine) The Visual Studio MI Debug Engine ("MIEngine") provides an open-source Visual Studio Debugger extension that works with MI-enabled debuggers such as gdb, lldb, and clrdbg. 2448 | - [**521**星][1y] [C] [wubingzheng/memleax](https://github.com/wubingzheng/memleax) debugs memory leak of running process. Not maintained anymore, try `libleak` please. 2449 | - [**462**星][4m] [C++] [emoon/prodbg](https://github.com/emoon/prodbg) Debugging the way it's meant to be done 2450 | - [**423**星][3m] [C++] [cobaltfusion/debugviewpp](https://github.com/cobaltfusion/debugviewpp) DebugView++, collects, views, filters your application logs, and highlights information that is important to you! 2451 | - [**418**星][18d] [C++] [simonkagstrom/kcov](https://github.com/simonkagstrom/kcov) Code coverage tool for compiled programs, Python and Bash which uses debugging information to collect and report data without special compilation options 2452 | - [**377**星][1m] [Py] [pdbpp/pdbpp](https://github.com/pdbpp/pdbpp) pdb++, a drop-in replacement for pdb (the Python debugger) 2453 | - [**332**星][8m] [Py] [romanvm/python-web-pdb](https://github.com/romanvm/python-web-pdb) Web-based remote UI for Python's PDB debugger 2454 | - [**306**星][13d] [Java] [widdix/aws-s3-virusscan](https://github.com/widdix/aws-s3-virusscan) Free Antivirus for S3 Buckets 2455 | - [**291**星][4d] [Py] [sosreport/sos](https://github.com/sosreport/sos) A unified tool for collecting system logs and other debug information 2456 | - [**285**星][2m] [C++] [changeofpace/viviennevmm](https://github.com/changeofpace/viviennevmm) VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor. 2457 | - [**272**星][4m] [Py] [mariovilas/winappdbg](https://github.com/mariovilas/winappdbg) WinAppDbg Debugger 2458 | - [**270**星][13d] [Py] [ionelmc/python-manhole](https://github.com/ionelmc/python-manhole) Debugging manhole for python applications. 2459 | - [**250**星][1m] [Py] [quantopian/qdb](https://github.com/quantopian/qdb) Quantopian Remote Debugger for Python 2460 | - [**240**星][5m] [C++] [facebook/ds2](https://github.com/facebook/ds2) Debug server for lldb. 2461 | - [**239**星][8m] [C++] [strivexjun/xantidebug](https://github.com/strivexjun/xantidebug) VMProtect 3.x Anti-debug Method Improved 2462 | - [**239**星][8m] [Py] [beeware/bugjar](https://github.com/beeware/bugjar) A interactive graphical debugger for Python code. 2463 | - [**233**星][2m] [Py] [gilligan/vim-lldb](https://github.com/gilligan/vim-lldb) lldb debugger integration plugin for vim 2464 | - [**220**星][8m] [letoram/senseye](https://github.com/letoram/senseye) Dynamic Visual Debugging / Reverse Engineering Toolsuite 2465 | - [**218**星][1m] [Py] [nteseyes/pylane](https://github.com/nteseyes/pylane) An python vm injector with debug tools, based on gdb. 2466 | - [**213**星][3d] [C++] [thalium/icebox](https://github.com/thalium/icebox) Virtual Machine Introspection, Tracing & Debugging 2467 | - [**209**星][2m] [C] [joyent/mdb_v8](https://github.com/joyent/mdb_v8) postmortem debugging for Node.js and other V8-based programs 2468 | - [**200**星][5m] [C++] [rainers/cv2pdb](https://github.com/rainers/cv2pdb) converter of DMD CodeView/DWARF debug information to PDB files 2469 | 2470 | 2471 | ### 文章 2472 | 2473 | 2474 | 2475 | 2476 | 2477 | 2478 | *** 2479 | 2480 | 2481 | ## BAP 2482 | 2483 | 2484 | ### 工具 2485 | 2486 | 2487 | - [**1106**星][6d] [OCaml] [binaryanalysisplatform/bap](https://github.com/binaryanalysisplatform/bap) Binary Analysis Platform 2488 | - [**411**星][5d] [HTML] [w3c/webappsec](https://github.com/w3c/webappsec) Web App安全工作组 2489 | - [**299**星][9d] [JS] [w3c/webappsec-trusted-types](https://github.com/w3c/webappsec-trusted-types) A browser API to prevent DOM-Based Cross Site Scripting in modern web applications. 2490 | 2491 | 2492 | ### 文章 2493 | 2494 | 2495 | 2496 | 2497 | 2498 | 2499 | *** 2500 | 2501 | 2502 | ## BinNavi 2503 | 2504 | 2505 | ### 工具 2506 | 2507 | 2508 | - [**382**星][18d] [C++] [google/binexport](https://github.com/google/binexport) 将反汇编以Protocol Buffer的形式导出为PostgreSQL数据库, 导入到BinNavi中使用 2509 | - 重复区段: [IDA->插件->导入导出->BinNavi](#11139e7d6db4c1cef22718868f29fe12) | 2510 | 2511 | 2512 | ### 文章 2513 | 2514 | 2515 | 2516 | 2517 | 2518 | 2519 | *** 2520 | 2521 | 2522 | ## Decompiler&&反编译器 2523 | 2524 | 2525 | ### 工具 2526 | 2527 | 2528 | - [**20779**星][t] [Java] [skylot/jadx](https://github.com/skylot/jadx) dex 转 java 的反编译器 2529 | - [**7733**星][1m] [Java] [java-decompiler/jd-gui](https://github.com/java-decompiler/jd-gui) A standalone Java Decompiler GUI 2530 | - [**3135**星][18d] [Java] [deathmarine/luyten](https://github.com/deathmarine/luyten) An Open Source Java Decompiler Gui for Procyon 2531 | - [**1867**星][1y] [Java] [jindrapetrik/jpexs-decompiler](https://github.com/jindrapetrik/jpexs-decompiler) JPEXS Free Flash Decompiler 2532 | - [**1652**星][12m] [Java] [fesh0r/fernflower](https://github.com/fesh0r/fernflower) Unofficial mirror of FernFlower Java decompiler (All pulls should be submitted upstream) 2533 | - [**1466**星][4d] [Py] [rocky/python-uncompyle6](https://github.com/rocky/python-uncompyle6) Python反编译器,跨平台 2534 | - [**1084**星][3m] [Py] [storyyeller/krakatau](https://github.com/storyyeller/krakatau) Java decompiler, assembler, and disassembler 2535 | - [**764**星][12m] [C++] [comaeio/porosity](https://github.com/comaeio/porosity) *UNMAINTAINED* Decompiler and Security Analysis tool for Blockchain-based Ethereum Smart-Contracts 2536 | - [**673**星][10d] [C#] [uxmal/reko](https://github.com/uxmal/reko) Reko is a binary decompiler. 2537 | - [**671**星][11m] [C++] [zrax/pycdc](https://github.com/zrax/pycdc) C++ python bytecode disassembler and decompiler 2538 | - [**538**星][5m] [Java] [java-decompiler/jd-eclipse](https://github.com/java-decompiler/jd-eclipse) A Java Decompiler Eclipse plugin 2539 | - [**347**星][8d] [C#] [steamdatabase/valveresourceformat](https://github.com/steamdatabase/valveresourceformat) Valve's Source 2 resource file format (also known as Stupid Valve Format) parser and decompiler. 2540 | - [**331**星][3d] [Java] [leibnitz27/cfr](https://github.com/leibnitz27/cfr) This is the public repository for the CFR Java decompiler 2541 | - [**327**星][1m] [C++] [silverf0x/rpcview](https://github.com/silverf0x/rpcview) RpcView is a free tool to explore and decompile Microsoft RPC interfaces 2542 | - [**283**星][8m] [Shell] [venshine/decompile-apk](https://github.com/venshine/decompile-apk) APK 反编译 2543 | - [**243**星][3m] [Java] [kwart/jd-cmd](https://github.com/kwart/jd-cmd) Command line Java Decompiler 2544 | - [**242**星][3d] [C#] [icsharpcode/avaloniailspy](https://github.com/icsharpcode/avaloniailspy) Avalonia-based .NET Decompiler (port of ILSpy) 2545 | - [**240**星][2m] [Java] [ata4/bspsrc](https://github.com/ata4/bspsrc) A Source engine map decompiler 2546 | - [**232**星][1y] [C++] [wwwg/wasmdec](https://github.com/wwwg/wasmdec) WebAssembly to C decompiler 2547 | - [**226**星][3d] [C++] [boomerangdecompiler/boomerang](https://github.com/BoomerangDecompiler/boomerang) Boomerang Decompiler - Fighting the code-rot :) 2548 | 2549 | 2550 | ### 文章 2551 | 2552 | 2553 | 2554 | 2555 | 2556 | 2557 | *** 2558 | 2559 | 2560 | ## Disassemble&&反汇编 2561 | 2562 | 2563 | ### 工具 2564 | 2565 | 2566 | - [**1374**星][12d] [C] [zyantific/zydis](https://github.com/zyantific/zydis) 快速的轻量级x86/x86-64 反汇编库 2567 | - [**1346**星][12m] [Rust] [das-labor/panopticon](https://github.com/das-labor/panopticon) A libre cross-platform disassembler. 2568 | - [**877**星][11m] [C++] [wisk/medusa](https://github.com/wisk/medusa) An open source interactive disassembler 2569 | - [**835**星][t] [GLSL] [khronosgroup/spirv-cross](https://github.com/khronosgroup/spirv-cross) a practical tool and library for performing reflection on SPIR-V and disassembling SPIR-V back to high level languages. 2570 | - [**828**星][2m] [C++] [redasmorg/redasm](https://github.com/redasmorg/redasm) The OpenSource Disassembler 2571 | - [**627**星][3m] [C] [gdabah/distorm](https://github.com/gdabah/distorm) Powerful Disassembler Library For x86/AMD64 2572 | - [**430**星][1m] [C#] [0xd4d/iced](https://github.com/0xd4d/iced) x86/x64 disassembler, instruction decoder & encoder 2573 | - [**351**星][13d] [Ruby] [jjyg/metasm](https://github.com/jjyg/metasm) This is the main repository for metasm, a free assembler / disassembler / compiler written in ruby 2574 | - [**246**星][5m] [Py] [bontchev/pcodedmp](https://github.com/bontchev/pcodedmp) A VBA p-code disassembler 2575 | 2576 | 2577 | ### 文章 2578 | 2579 | 2580 | 2581 | 2582 | 2583 | 2584 | *** 2585 | 2586 | 2587 | ## GDB 2588 | 2589 | 2590 | ### 工具 2591 | 2592 | 2593 | - [**7019**星][2d] [JS] [cs01/gdbgui](https://github.com/cs01/gdbgui) Browser-based frontend to gdb (gnu debugger). Add breakpoints, view the stack, visualize data structures, and more in C, C++, Go, Rust, and Fortran. Run gdbgui from the terminal and a new tab will open in your browser. 2594 | - [**6052**星][5d] [Py] [cyrus-and/gdb-dashboard](https://github.com/cyrus-and/gdb-dashboard) Modular visual interface for GDB in Python 2595 | - [**3784**星][11m] [Py] [longld/peda](https://github.com/longld/peda) Python Exploit Development Assistance for GDB 2596 | - [**2568**星][30d] [Py] [hugsy/gef](https://github.com/hugsy/gef) gdb增强工具,使用Python API,用于漏洞开发和逆向分析。 2597 | - [**2439**星][8d] [Py] [pwndbg/pwndbg](https://github.com/pwndbg/pwndbg) GDB插件,辅助漏洞开发和逆向 2598 | - [**1417**星][3m] [Go] [hellogcc/100-gdb-tips](https://github.com/hellogcc/100-gdb-tips) A collection of gdb tips. 100 maybe just mean many here. 2599 | - [**452**星][2m] [Py] [scwuaptx/pwngdb](https://github.com/scwuaptx/pwngdb) gdb for pwn 2600 | - [**446**星][1y] [Py] [jfoote/exploitable](https://github.com/jfoote/exploitable) The 'exploitable' GDB plugin. I don't work at CERT anymore, but here is the original homepage: 2601 | - [**244**星][1m] [JS] [bet4it/hyperpwn](https://github.com/bet4it/hyperpwn) A hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda 2602 | - [**208**星][2m] [Py] [sakhnik/nvim-gdb](https://github.com/sakhnik/nvim-gdb) Neovim thin wrapper for GDB, LLDB and PDB 2603 | 2604 | 2605 | ### 文章 2606 | 2607 | 2608 | 2609 | 2610 | 2611 | 2612 | *** 2613 | 2614 | 2615 | ## Captcha&&验证码 2616 | 2617 | 2618 | ### 工具 2619 | 2620 | 2621 | - [**1620**星][2m] [Ruby] [ambethia/recaptcha](https://github.com/ambethia/recaptcha) ReCaptcha helpers for ruby apps 2622 | - [**1561**星][18d] [PHP] [mewebstudio/captcha](https://github.com/mewebstudio/captcha) Captcha for Laravel 5 & 6 2623 | - [**1184**星][4m] [PHP] [gregwar/captcha](https://github.com/gregwar/captcha) PHP Captcha library 2624 | - [**1015**星][1m] [Py] [mbi/django-simple-captcha](https://github.com/mbi/django-simple-captcha) Django Simple Captcha is an extremely simple, yet highly customizable Django application to add captcha images to any Django form. 2625 | - [**897**星][t] [Py] [kerlomz/captcha_trainer](https://github.com/kerlomz/captcha_trainer) 基于深度学习的图片验证码的解决方案 2626 | - [**642**星][10d] [Ruby] [markets/invisible_captcha](https://github.com/markets/invisible_captcha) Simple and flexible spam protection solution for Rails applications. 2627 | 2628 | - [**598**星][1y] [C++] [nladuo/captcha-break](https://github.com/nladuo/captcha-break) captcha break based on opencv2, tesseract-ocr and some machine learning algorithm. 2629 | - [**423**星][5m] [Java] [bit4woo/recaptcha](https://github.com/bit4woo/recaptcha) reCAPTCHA = REcognize CAPTCHA: A Burp Suite Extender that recognize CAPTCHA and use for intruder payload 自动识别图形验证码并用于burp intruder爆破模块的插件 2630 | - [**324**星][9m] [JS] [zyszys/awesome-captcha](https://github.com/zyszys/awesome-captcha) 2631 | - [**260**星][t] [Py] [kerlomz/captcha_platform](https://github.com/kerlomz/captcha_platform) [验证码识别-部署] This project is based on CNN+BLSTM+CTC to realize verificationtion. This projeccode identificat is only for deployment models. 2632 | 2633 | 2634 | ### 文章 2635 | 2636 | 2637 | 2638 | 2639 | 2640 | 2641 | # Radare2 2642 | 2643 | 2644 | *** 2645 | 2646 | 2647 | ## 插件&&脚本 2648 | 2649 | 2650 | ### Radare2 2651 | 2652 | 2653 | - [**11588**星][4d] [C] [radareorg/radare2](https://github.com/radareorg/radare2) unix-like reverse engineering framework and commandline tools 2654 | 2655 | 2656 | ### 新添加的 2657 | 2658 | 2659 | - [**410**星][5m] [Py] [itayc0hen/a-journey-into-radare2](https://github.com/itayc0hen/a-journey-into-radare2) A series of tutorials about radare2 framework from 2660 | - [**339**星][20d] [TeX] [radareorg/radare2book](https://github.com/radareorg/radare2book) Radare2 official book 2661 | - [**259**星][1m] [C] [radareorg/r2dec-js](https://github.com/radareorg/r2dec-js) radare2插件,将汇编代码反编译为C伪代码 2662 | - [**258**星][3m] [Rust] [radareorg/radeco](https://github.com/radareorg/radeco) radare2-based decompiler and symbol executor 2663 | - [**202**星][2m] [PS] [wiredpulse/posh-r2](https://github.com/wiredpulse/posh-r2) PowerShell - Rapid Response... For the incident responder in you! 2664 | 2665 | 2666 | ### 与其他工具交互 2667 | 2668 | 2669 | #### 未分类 2670 | 2671 | 2672 | - [**378**星][19d] [JS] [nowsecure/r2frida](https://github.com/nowsecure/r2frida) Radare2 and Frida better together. 2673 | - 重复区段: [DBI->Frida->工具->与其他工具交互->Radare2](#ac053c4da818ca587d57711d2ff66278) | 2674 | 2675 | 2676 | #### IDA 2677 | 2678 | 2679 | 2680 | 2681 | 2682 | 2683 | ### GUI 2684 | 2685 | 2686 | - [**6176**星][t] [C++] [radareorg/cutter](https://github.com/radareorg/cutter) 逆向框架 radare2的Qt界面,iaito的升级版 2687 | 2688 | 2689 | 2690 | 2691 | *** 2692 | 2693 | 2694 | ## 文章&&视频 2695 | 2696 | 2697 | - 2019.10 [prsecurity] [Radare2 for RE CTF](https://medium.com/p/e0163cb0466e) 2698 | - 2019.09 [securityartwork] [YaraRET (I): Carving with Radare2 & Yara](https://www.securityartwork.es/2019/09/02/yararet-i-carving-with-radare2-yara/) 2699 | - 2019.07 [freebuf] [教你使用Cutter和Radare2对APT32恶意程序流程图进行反混淆处理](https://www.freebuf.com/articles/network/208019.html) 2700 | - 2019.07 [THER] [0x0D - FLARE-On #3 Challenge Part 2 [Reversing with Radare2]](https://www.youtube.com/watch?v=QP9Cepdqf-o) 2701 | - 2019.07 [THER] [0x0C - Cutter: FLARE-On #3 Challenge Part 1 [Reversing with Radare2]](https://www.youtube.com/watch?v=hbEpVwD5rJI) 2702 | - 2019.07 [THER] [0x09 Cross References [Reversing with Radare2]](https://www.youtube.com/watch?v=yOtx6LL_R08) 2703 | - 2019.07 [THER] [0x08 Navigation [Reversing with Radare2]](https://www.youtube.com/watch?v=rkygJSjJbso) 2704 | - 2019.07 [THER] [0x04 Target Application [Reversing with Radare2]](https://www.youtube.com/watch?v=jlr3FablVIc) 2705 | - 2019.06 [THER] [0x03 Environment Setup [Reversing with Radare2]](https://www.youtube.com/watch?v=qGSFk_CkIaw) 2706 | - 2019.06 [THER] [0x02 What is Radare2 [Reversing with Radare2]](https://www.youtube.com/watch?v=9fLfD2fZWiA) 2707 | - 2019.06 [THER] [0x00 Intro [Reversing with Radare2]](https://www.youtube.com/watch?v=Lva32dXS0mU) 2708 | - 2019.06 [hitbsecconf] [#HITB2019AMS D1T3 - Overcoming Fear: Reversing With Radare2 - Arnau Gamez Montolio](https://www.youtube.com/watch?v=317dNavABKo) 2709 | - 2019.05 [X0x0FFB347] [Solving MalwareTech Shellcode challenges with some radare2 magic!](https://medium.com/p/b91c85babe4b) 2710 | - 2019.05 [360] [使用Cutter和Radare2对APT32恶意程序流程图进行反混淆处理](https://www.anquanke.com/post/id/178047/) 2711 | - 2019.04 [X0x0FFB347] [Solving MalwareTech String Challenges With Some Radare2 Magic!](https://medium.com/p/98ebd8ff0b88) 2712 | - 2019.04 [radare] [Radare2 Summer of Code 2019 Selection Results](https://radareorg.github.io/blog/posts/rsoc-2019-selection/) 2713 | - 2019.04 [radare] [Radare2 Summer of Code 2019 Selection Results](http://radare.today/posts/rsoc-2019-selection/) 2714 | - 2019.03 [sans] [Binary Analysis with Jupyter and Radare2](https://isc.sans.edu/forums/diary/Binary+Analysis+with+Jupyter+and+Radare2/24748/) 2715 | - 2019.02 [freebuf] [Radare2:一款类Unix命令行逆向安全框架](https://www.freebuf.com/sectool/195703.html) 2716 | - 2019.02 [radare] [Radare2 Community Survey Results](http://radare.today/posts/radare2-survey/) 2717 | 2718 | 2719 | # BinaryNinja 2720 | 2721 | 2722 | *** 2723 | 2724 | 2725 | ## 插件&&脚本 2726 | 2727 | 2728 | ### 新添加的 2729 | 2730 | 2731 | - [**2820**星][30d] [Py] [androguard/androguard](https://github.com/androguard/androguard) Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !) 2732 | - [**328**星][5m] [Py] [vector35/binaryninja-api](https://github.com/vector35/binaryninja-api) Public API, examples, documentation and issues for Binary Ninja 2733 | - [**280**星][3m] [Py] [pbiernat/ripr](https://github.com/pbiernat/ripr) Package Binary Code as a Python class using Binary Ninja and Unicorn Engine 2734 | - [**201**星][6d] [JS] [ret2got/disasm.pro](https://github.com/ret2got/disasm.pro) A realtime assembler/disassembler (formerly known as disasm.ninja) 2735 | 2736 | 2737 | ### 与其他工具交互 2738 | 2739 | 2740 | #### 未分类 2741 | 2742 | 2743 | 2744 | 2745 | #### IDA 2746 | 2747 | 2748 | 2749 | 2750 | 2751 | 2752 | 2753 | 2754 | *** 2755 | 2756 | 2757 | ## 文章&&视频 2758 | 2759 | 2760 | - 2018.09 [aliyun] [使用Binary Ninja调试共享库](https://xz.aliyun.com/t/2826) 2761 | - 2018.09 [kudelskisecurity] [Analyzing ARM Cortex-based MCU firmwares using Binary Ninja](https://research.kudelskisecurity.com/2018/09/25/analyzing-arm-cortex-based-mcu-firmwares-using-binary-ninja/) 2762 | - 2018.04 [trailofbits] [使用Binary Ninja的MLIL和SSA, 挖掘二进制文件的漏洞. (MLIL: Medium Level IL, 中间层IL)(SSA: Single Static Assignment)](https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/) 2763 | - 2018.01 [pediy] [[翻译]逆向平台Binary Ninja介绍](https://bbs.pediy.com/thread-224141.htm) 2764 | - 2017.11 [] [bnpy - A python architecture plugin for Binary Ninja](https://0xec.blogspot.com/2017/11/bnpy-python-architecture-plugin-for.html) 2765 | - 2017.10 [ret2] [Untangling Exotic Architectures with Binary Ninja](http://blog.ret2.io/2017/10/17/untangling-exotic-architectures-with-binary-ninja/) 2766 | - 2017.10 [chokepoint] [Pin Visual Coverage Tool for Binary Ninja](http://www.chokepoint.net/2017/10/pin-visual-coverage-tool-for-binary.html) 2767 | 2768 | 2769 | # 模拟器&&虚拟机 2770 | 2771 | 2772 | *** 2773 | 2774 | 2775 | ## QEMU 2776 | 2777 | 2778 | ### 工具 2779 | 2780 | 2781 | #### 新添加的 2782 | 2783 | 2784 | - [**7037**星][2m] [Shell] [kholia/osx-kvm](https://github.com/kholia/osx-kvm) Run macOS on QEMU/KVM. No support is provided at the moment. 2785 | - [**1308**星][18d] [C] [cisco-talos/pyrebox](https://github.com/cisco-talos/pyrebox) 逆向沙箱,基于QEMU,Python Scriptable 2786 | - [**1070**星][18d] [Shell] [dhruvvyas90/qemu-rpi-kernel](https://github.com/dhruvvyas90/qemu-rpi-kernel) Qemu kernel for emulating Rpi on QEMU 2787 | - [**601**星][29d] [Py] [nongiach/arm_now](https://github.com/nongiach/arm_now) 快速创建并运行不同CPU架构的虚拟机, 用于逆向分析或执行二进制文件. 基于QEMU 2788 | - [**532**星][7m] [Java] [limboemu/limbo](https://github.com/limboemu/limbo) Limbo is a QEMU-based emulator for Android. It currently supports PC & ARM emulation for Intel x86 and ARM architecture. See our wiki 2789 | - 重复区段: [Android->工具->Emulator](#5afa336e229e4c38ad378644c484734a) | 2790 | - [**512**星][5m] [C] [decaf-project/decaf](https://github.com/decaf-project/DECAF) DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF. 2791 | - [**375**星][] [C] [vanhauser-thc/aflplusplus](https://github.com/vanhauser-thc/aflplusplus) 带社区补丁的afl 2.56b 2792 | - [**278**星][13d] [Shell] [drtyhlpr/rpi23-gen-image](https://github.com/drtyhlpr/rpi23-gen-image) Advanced Debian "stretch" and "buster" bootstrap script for RPi 0/1/2/3 and QEMU 2793 | - [**277**星][1m] [C] [beckus/qemu_stm32](https://github.com/beckus/qemu_stm32) QEMU with an STM32 microcontroller implementation 2794 | - [**242**星][10m] [C++] [revng/revng](https://github.com/revng/revng) 二进制分析工具,基于QEMU 和LLVM 2795 | 2796 | 2797 | 2798 | 2799 | ### 文章&&视频 2800 | 2801 | 2802 | 2803 | 2804 | 2805 | 2806 | *** 2807 | 2808 | 2809 | ## 其他 2810 | 2811 | 2812 | 2813 | 2814 | # Windows 2815 | 2816 | 2817 | *** 2818 | 2819 | 2820 | ## 工具 2821 | 2822 | 2823 | ### 新添加的 2824 | 2825 | 2826 | 2827 | 2828 | ### 其他 2829 | 2830 | 2831 | - [**949**星][3m] [C] [basil00/divert](https://github.com/basil00/divert) 用户模式数据包拦截库,适用于Win 7/8/10 2832 | - [**863**星][5d] [C++] [henrypp/simplewall](https://github.com/henrypp/simplewall) 为Windows 过滤平台提供的配置界面 2833 | - [**726**星][2m] [Py] [diyan/pywinrm](https://github.com/diyan/pywinrm) Python实现的WinRM客户端 2834 | - [**570**星][24d] [C] [hfiref0x/winobjex64](https://github.com/hfiref0x/winobjex64) Windows对象浏览器. x64 2835 | - [**463**星][8m] [C#] [microsoft/dbgshell](https://github.com/microsoft/dbgshell) PowerShell编写的Windows调试器引擎前端 2836 | - [**418**星][7d] [C] [samba-team/samba](https://github.com/samba-team/samba) 适用于Linux和Unix的标准Windows interoperability程序套件 2837 | - [**389**星][2m] [C#] [microsoft/binskim](https://github.com/microsoft/binskim) 二进制静态分析工具,可为PE和ELF二进制格式提供安全性和正确性分析 2838 | - [**387**星][11d] [Jupyter Notebook] [microsoft/windowsdefenderatp-hunting-queries](https://github.com/microsoft/windowsdefenderatp-hunting-queries) 在MS Defender ATP中进行高级查询的示例 2839 | - [**370**星][19d] [Ruby] [winrb/winrm](https://github.com/winrb/winrm) 在Windows中使用WinRM的功能调用原生对象的SOAP库。Ruby编写 2840 | - [**360**星][4d] [C#] [digitalruby/ipban](https://github.com/digitalruby/ipban) 监视Windows/Linux系统的登录失败和不良行为,并封禁对应的IP地址。高度可配置,精简且功能强大。 2841 | - [**269**星][12m] [Py] [hakril/pythonforwindows](https://github.com/hakril/pythonforwindows) 简化Python与Windows操作系统交互的库 2842 | - [**238**星][5m] [PS] [microsoft/aaronlocker](https://github.com/microsoft/aaronlocker) Windows应用程序白名单 2843 | - [**233**星][10m] [Go] [masterzen/winrm](https://github.com/masterzen/winrm) Windows远程命令执行,命令行工具+库,Go编写 2844 | - [**232**星][1y] [C++] [ionescu007/simpleator](https://github.com/ionescu007/simpleator) Windows x64用户模式应用程序模拟器 2845 | - [**229**星][4m] [C] [tishion/mmloader](https://github.com/tishion/mmloader) 绕过Windows PE Loader,直接从内存中加载DLL模块(x86/x64) 2846 | - [**228**星][3m] [C] [leecher1337/ntvdmx64](https://github.com/leecher1337/ntvdmx64) 在64位版本上执行Windows DOS版的 NTVDM 2847 | - [**226**星][12m] [C++] [rexdf/commandtrayhost](https://github.com/rexdf/commandtrayhost) 监控Windows systray的命令行工具 2848 | - [**210**星][3m] [adguardteam/adguardforwindows](https://github.com/adguardteam/adguardforwindows) Windows系统范围的AdBlocker 2849 | - [**208**星][10m] [C] [hzqst/unicorn_pe](https://github.com/hzqst/unicorn_pe) 模拟Windows PE文件的代码执行,基于Unicorn 2850 | - [**205**星][3m] [C] [jasonwhite/ducible](https://github.com/jasonwhite/ducible) 使PE和PDB的构建具有可复制性 2851 | 2852 | 2853 | ### 事件日志&&事件追踪&&ETW 2854 | 2855 | 2856 | - [**1228**星][] [JS] [jpcertcc/logontracer](https://github.com/jpcertcc/logontracer) 通过可视化和分析Windows事件日志来调查恶意的Windows登录 2857 | - [**609**星][11d] [PS] [sbousseaden/evtx-attack-samples](https://github.com/sbousseaden/evtx-attack-samples) 与特定攻击和利用后渗透技术相关的Windows事件样例 2858 | - [**504**星][9m] [C#] [lowleveldesign/wtrace](https://github.com/lowleveldesign/wtrace) Command line tracing tool for Windows, based on ETW. 2859 | - [**446**星][8m] [PS] [nsacyber/event-forwarding-guidance](https://github.com/nsacyber/Event-Forwarding-Guidance) 帮助管理员使用Windows事件转发(WEF)收集与安全相关的Windows事件日志 2860 | - [**393**星][10m] [Py] [williballenthin/python-evtx](https://github.com/williballenthin/python-evtx) 纯Python编写的Windows事件日志解析器 2861 | - [**306**星][24d] [C#] [zodiacon/procmonx](https://github.com/zodiacon/procmonx) 通过Windows事件日志获取与Process Monitor显示的相同的信息,无需内核驱动 2862 | - [**282**星][10m] [C#] [nsacyber/windows-event-log-messages](https://github.com/nsacyber/Windows-Event-Log-Messages) 检索Windows二进制文件中嵌入的Windows事件日志消息的定义,并以discoverable的格式提供它们 2863 | 2864 | 2865 | ### Sysmon 2866 | 2867 | 2868 | - [**206**星][1y] [JS] [jpcertcc/sysmonsearch](https://github.com/jpcertcc/sysmonsearch) Investigate suspicious activity by visualizing Sysmon's event log 2869 | 2870 | 2871 | ### WSL 2872 | 2873 | 2874 | - [**8566**星][2m] [microsoft/wsl](https://github.com/microsoft/WSL) Issues found on WSL 2875 | - [**2845**星][8m] [Shell] [goreliu/wsl-terminal](https://github.com/goreliu/wsl-terminal) Terminal emulator for Windows Subsystem for Linux (WSL) 2876 | - [**681**星][22d] [Shell] [wslutilities/wslu](https://github.com/wslutilities/wslu) A collection of utilities for Windows 10 Linux Subsystems 2877 | - [**469**星][6m] [Go] [dan-v/awslambdaproxy](https://github.com/dan-v/awslambdaproxy) An AWS Lambda powered HTTP/SOCKS web proxy 2878 | - [**402**星][5m] [PS] [stefanscherer/docker-windows-box](https://github.com/stefanscherer/docker-windows-box) Various Vagrant envs with Windows 2019/10 and Docker, Swarm mode, LCOW, WSL2, ... 2879 | 2880 | 2881 | ### .NET 2882 | 2883 | 2884 | - [**12676**星][6d] [C#] [0xd4d/dnspy](https://github.com/0xd4d/dnspy) .NET debugger and assembly editor 2885 | - [**9261**星][3d] [C#] [icsharpcode/ilspy](https://github.com/icsharpcode/ilspy) .NET Decompiler 2886 | - [**3694**星][19d] [C#] [0xd4d/de4dot](https://github.com/0xd4d/de4dot) .NET deobfuscator and unpacker. 2887 | - [**3263**星][7m] [JS] [sindresorhus/speed-test](https://github.com/sindresorhus/speed-test) Test your internet connection speed and ping using speedtest.net from the CLI 2888 | - [**1657**星][6d] [C#] [jbevain/cecil](https://github.com/jbevain/cecil) C#库, 探查/修改/生成 .NET App/库 2889 | - [**217**星][11m] [C#] [rainwayapp/warden](https://github.com/rainwayapp/warden) Warden.NET is an easy to use process management library for keeping track of processes on Windows. 2890 | 2891 | 2892 | ### Environment&&环境&&配置 2893 | 2894 | 2895 | - [**1521**星][10m] [PS] [joefitzgerald/packer-windows](https://github.com/joefitzgerald/packer-windows) 使用Packer创建Vagrant boxes的模板 2896 | - [**1347**星][23d] [Go] [securitywithoutborders/hardentools](https://github.com/securitywithoutborders/hardentools) 禁用许多有危险的Windows功能 2897 | - [**1156**星][1y] [HTML] [nsacyber/windows-secure-host-baseline](https://github.com/nsacyber/Windows-Secure-Host-Baseline) Windows 10和Windows Server 2016 DoD 安全主机基准设置的配置指南 2898 | - [**1008**星][6m] [adolfintel/windows10-privacy](https://github.com/adolfintel/windows10-privacy) Win10隐私指南 2899 | - [**508**星][8d] [PS] [stefanscherer/packer-windows](https://github.com/stefanscherer/packer-windows) Windows Packer 模板:Win10, Server 2016, 1709, 1803, 1809, 2019, 1903, Insider with Docker 2900 | 2901 | 2902 | ### 进程注入 2903 | 2904 | 2905 | 2906 | 2907 | ### DLL注入 2908 | 2909 | 2910 | - [**713**星][5m] [C++] [darthton/xenos](https://github.com/darthton/xenos) Windows DLL 注入器 2911 | 2912 | 2913 | ### 代码注入 2914 | 2915 | 2916 | 2917 | 2918 | ### 内存模块 2919 | 2920 | 2921 | 2922 | 2923 | ### Shellcode 2924 | 2925 | 2926 | - [**686**星][10m] [Py] [merrychap/shellen](https://github.com/merrychap/shellen) 交互式Shellcode开发环境 2927 | - [**588**星][2m] [PS] [monoxgas/srdi](https://github.com/monoxgas/srdi) Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode 2928 | - [**536**星][5m] [C++] [nytrorst/shellcodecompiler](https://github.com/nytrorst/shellcodecompiler) 将C/C ++样式代码编译成一个小的、与位置无关且无NULL的Shellcode,用于Windows(x86和x64)和Linux(x86和x64) 2929 | - 重复区段: [Linux->工具](#89e277bca2740d737c1aeac3192f374c) | 2930 | - [**388**星][1y] [Assembly] [hasherezade/pe_to_shellcode](https://github.com/hasherezade/pe_to_shellcode) Converts PE into a shellcode 2931 | 2932 | 2933 | ### VT&&虚拟化&&Hypbervisor 2934 | 2935 | 2936 | - [**1348**星][14d] [C] [intel/haxm](https://github.com/intel/haxm) Intel 开源的英特尔硬件加速执行管理器,通过硬件辅助的虚拟化引擎,加速 Windows/macOS 主机上的 IA emulation((x86/ x86_64) ) 2937 | - [**1011**星][1y] [C] [ionescu007/simplevisor](https://github.com/ionescu007/simplevisor) 英特尔VT-x虚拟机管理程序,简单、可移植。支持Windows和UEFI 2938 | - [**717**星][15d] [C++] [tandasat/hyperplatform](https://github.com/tandasat/hyperplatform) 基于Intel VT-x的虚拟机管理程序,旨在在Windows上提供精简的VM-exit过滤平台 2939 | - [**570**星][11m] [C] [asamy/ksm](https://github.com/asamy/ksm) 快速、hackable且简单的x64 VT-x虚拟机管理程序,支持Windows和Linux 2940 | - 重复区段: [Linux->工具](#89e277bca2740d737c1aeac3192f374c) | 2941 | 2942 | 2943 | ### 内核&&驱动 2944 | 2945 | 2946 | - [**933**星][9m] [C] [microsoft/windows-driver-frameworks](https://github.com/microsoft/windows-driver-frameworks) Windows驱动框架(WDF) 2947 | - [**781**星][11d] [axtmueller/windows-kernel-explorer](https://github.com/axtmueller/windows-kernel-explorer) Windows内核研究工具 2948 | - [**510**星][5m] [Py] [rabbitstack/fibratus](https://github.com/rabbitstack/fibratus) Windows内核探索和跟踪工具 2949 | - [**479**星][1m] [C] [jkornev/hidden](https://github.com/jkornev/hidden) Windows驱动,带用户模式接口:隐藏文件系统和注册表对象、保护进程等 2950 | - [**278**星][4d] [PS] [microsoftdocs/windows-driver-docs](https://github.com/MicrosoftDocs/windows-driver-docs) 官方Windows驱动程序工具包文档 2951 | 2952 | 2953 | ### 注册表 2954 | 2955 | 2956 | - [**490**星][6d] [Batchfile] [chef-koch/regtweaks](https://github.com/chef-koch/regtweaks) Windows注册表调整(Win 7-Win 10) 2957 | - [**288**星][8m] [Py] [williballenthin/python-registry](https://github.com/williballenthin/python-registry) 用于对Windows NT注册表文件进行纯读取访问的Python库 2958 | 2959 | 2960 | ### 系统调用 2961 | 2962 | 2963 | - [**725**星][2m] [HTML] [j00ru/windows-syscalls](https://github.com/j00ru/windows-syscalls) Windows 系统调用表(NT/2000/XP/2003/Vista/2008/7/2012/8/10) 2964 | - [**328**星][1m] [C] [hfiref0x/syscalltables](https://github.com/hfiref0x/syscalltables) Windows NT x64系统调用表 2965 | 2966 | 2967 | ### 加壳&&脱壳 2968 | 2969 | 2970 | #### 新添加的 2971 | 2972 | 2973 | - [**212**星][26d] [Shell] [ryran/xsos](https://github.com/ryran/xsos) instantaneously gather information about a system together in an easy-to-read-summary, whether that system is the localhost on which xsos is being run or a system for which you have an unpacked sosreport 2974 | 2975 | 2976 | #### Themida 2977 | 2978 | 2979 | 2980 | 2981 | #### VMProtect 2982 | 2983 | 2984 | 2985 | 2986 | 2987 | 2988 | 2989 | 2990 | *** 2991 | 2992 | 2993 | ## 文章 2994 | 2995 | 2996 | ### Themida 2997 | 2998 | 2999 | - 2018.08 [pediy] [[原创]浅谈VMP、safengine和Themida的反虚拟机](https://bbs.pediy.com/thread-246358.htm) 3000 | - 2016.03 [pediy] [[原创]Themida 2260 虚拟机 FISH 初探 (二)](https://bbs.pediy.com/thread-208217.htm) 3001 | - 2016.03 [pediy] [[原创]Themida 2260 虚拟机 FISH 初探(一)](https://bbs.pediy.com/thread-208207.htm) 3002 | - 2014.09 [pediy] [[原创]菜鸟脱壳---Themida](https://bbs.pediy.com/thread-192834.htm) 3003 | - 2013.06 [pediy] [[原创]脱壳手记---Themida(2.1.2.0)](https://bbs.pediy.com/thread-173013.htm) 3004 | - 2013.06 [pediy] [脱壳手记---themida(1.8.5.5)](https://bbs.pediy.com/thread-172921.htm) 3005 | - 2011.09 [pediy] [[原创]如何中断Themida的MessageBox对话框](https://bbs.pediy.com/thread-140298.htm) 3006 | - 2009.09 [pediy] [[原创]说说THEMIDA新版的DIY](https://bbs.pediy.com/thread-98381.htm) 3007 | - 2009.08 [pediy] [[分享]Themida + WinLicense 2.0.6.5 (Inline Patching)视频教程和工具](https://bbs.pediy.com/thread-96053.htm) 3008 | - 2009.08 [pediy] [[原创] 简单修复Themida加壳的VC7+去除软件自校验](https://bbs.pediy.com/thread-95400.htm) 3009 | - 2009.08 [pediy] [[转帖]TheMida - WinLicense Info Script by LCF-AT](https://bbs.pediy.com/thread-94993.htm) 3010 | - 2009.07 [pediy] [[求助]请问怎么才能让自己的虚拟机避开Themida的检测](https://bbs.pediy.com/thread-93164.htm) 3011 | - 2008.12 [pediy] [[原创]Detect all versions of Themida/WinLicense(更新……)](https://bbs.pediy.com/thread-79412.htm) 3012 | - 2008.12 [pediy] [[分享]Themida2.0.4.0 DLL脱壳(无SDK)附个查版本号的脚本,可查DLL](https://bbs.pediy.com/thread-79391.htm) 3013 | - 2008.12 [pediy] [[原创]inline hook SSDT 躲避 Themida 的ThreadHideFromDebugger (学习笔记2)](https://bbs.pediy.com/thread-78423.htm) 3014 | - 2008.11 [pediy] [[分享]themida跟踪手记第一部分](https://bbs.pediy.com/thread-76107.htm) 3015 | - 2008.09 [pediy] [[原创]对Themida1.9.1.0的通法破解一文的补充(再修正)](https://bbs.pediy.com/thread-73425.htm) 3016 | - 2008.09 [pediy] [[原创]Themida1.9.1.0版的通法破解](https://bbs.pediy.com/thread-73257.htm) 3017 | - 2008.09 [pediy] [[原创]Themida IAT处理部分的简单分析](https://bbs.pediy.com/thread-73227.htm) 3018 | - 2008.09 [pediy] [[原创]Themida的另类破解](https://bbs.pediy.com/thread-72152.htm) 3019 | 3020 | 3021 | 3022 | 3023 | # Linux 3024 | 3025 | 3026 | *** 3027 | 3028 | 3029 | ## 工具 3030 | 3031 | 3032 | - [**1450**星][2m] [C] [feralinteractive/gamemode](https://github.com/feralinteractive/gamemode) Optimise Linux system performance on demand 3033 | - [**1413**星][13d] [C++] [google/nsjail](https://github.com/google/nsjail) A light-weight process isolation tool, making use of Linux namespaces and seccomp-bpf syscall filters (with help of the kafel bpf language) 3034 | - [**895**星][21d] [C] [buserror/simavr](https://github.com/buserror/simavr) simavr is a lean, mean and hackable AVR simulator for linux & OSX 3035 | - [**759**星][30d] [Py] [korcankaraokcu/pince](https://github.com/korcankaraokcu/pince) A reverse engineering tool that'll supply the place of Cheat Engine for linux 3036 | - [**741**星][2m] [C] [yrp604/rappel](https://github.com/yrp604/rappel) A linux-based assembly REPL for x86, amd64, armv7, and armv8 3037 | - [**731**星][9d] [C] [strace/strace](https://github.com/strace/strace) strace is a diagnostic, debugging and instructional userspace utility for Linux 3038 | - [**570**星][11m] [C] [asamy/ksm](https://github.com/asamy/ksm) 快速、hackable且简单的x64 VT-x虚拟机管理程序,支持Windows和Linux 3039 | - 重复区段: [Windows->工具->VT](#19cfd3ea4bd01d440efb9d4dd97a64d0) | 3040 | - [**565**星][4d] [C++] [intel/linux-sgx](https://github.com/intel/linux-sgx) Intel SGX for Linux* 3041 | - [**560**星][2m] [Py] [autotest/autotest](https://github.com/autotest/autotest) Fully automated tests on Linux 3042 | - [**536**星][5m] [C++] [nytrorst/shellcodecompiler](https://github.com/nytrorst/shellcodecompiler) 将C/C ++样式代码编译成一个小的、与位置无关且无NULL的Shellcode,用于Windows(x86和x64)和Linux(x86和x64) 3043 | - 重复区段: [Windows->工具->Shellcode](#16001cb2fae35b722deaa3b9a8e5f4d5) | 3044 | - [**509**星][7m] [C] [iovisor/ply](https://github.com/iovisor/ply) Dynamic Tracing in Linux 3045 | - [**468**星][] [C] [libreswan/libreswan](https://github.com/libreswan/libreswan) an Internet Key Exchange (IKE) implementation for Linux. 3046 | - [**441**星][4d] [C] [facebook/openbmc](https://github.com/facebook/openbmc) OpenBMC is an open software framework to build a complete Linux image for a Board Management Controller (BMC). 3047 | - [**405**星][10m] [Shell] [microsoft/linux-vm-tools](https://github.com/microsoft/linux-vm-tools) Hyper-V Linux Guest VM Enhancements 3048 | - [**393**星][1m] [Shell] [yadominjinta/atilo](https://github.com/yadominjinta/atilo) Linux installer for termux 3049 | - [**354**星][2m] [C] [seccomp/libseccomp](https://github.com/seccomp/libseccomp) an easy to use, platform independent, interface to the Linux Kernel's syscall filtering mechanism 3050 | - [**331**星][4m] [Go] [capsule8/capsule8](https://github.com/capsule8/capsule8) 对云本地,容器和传统的基于 Linux 的服务器执行高级的行为监控 3051 | - [**282**星][1m] [Py] [facebook/fbkutils](https://github.com/facebook/fbkutils) A variety of utilities built and maintained by Facebook's Linux Kernel Team that we wish to share with the community. 3052 | - [**228**星][7m] [C] [wkz/ply](https://github.com/wkz/ply) Light-weight Dynamic Tracer for Linux 3053 | 3054 | 3055 | *** 3056 | 3057 | 3058 | ## 文章 3059 | 3060 | 3061 | 3062 | 3063 | # Hook 3064 | 3065 | 3066 | *** 3067 | 3068 | 3069 | ## 工具 3070 | 3071 | 3072 | - [**1246**星][1y] [Kotlin] [gh0u1l5/wechatspellbook](https://github.com/gh0u1l5/wechatspellbook) 一个使用Kotlin编写的开源微信插件框架,底层需要 Xposed 或 VirtualXposed 等Hooking框架的支持,而顶层可以轻松对接Java、Kotlin、Scala等JVM系语言。让程序员能够在几分钟内编写出简单的微信插件,随意揉捏微信的内部逻辑。 3073 | - [**1117**星][1y] [ObjC] [yulingtianxia/fishchat](https://github.com/yulingtianxia/fishchat) Hook WeChat.app on non-jailbroken devices. 3074 | - [**1033**星][5m] [C++] [everdox/infinityhook](https://github.com/everdox/infinityhook) Hook system calls, context switches, page faults and more. 3075 | - [**770**星][11d] [Go] [thoughtworks/talisman](https://github.com/thoughtworks/talisman) By hooking into the pre-push hook provided by Git, Talisman validates the outgoing changeset for things that look suspicious - such as authorization tokens and private keys. 3076 | - [**680**星][8m] [Java] [pagalaxylab/yahfa](https://github.com/PAGalaxyLab/YAHFA) Yet Another Hook Framework for ART 3077 | - [**660**星][9m] [C++] [ysc3839/fontmod](https://github.com/ysc3839/fontmod) Simple hook tool to change Win32 program font. 3078 | - [**643**星][3m] [C++] [stevemk14ebr/polyhook](https://github.com/stevemk14ebr/polyhook) x86/x64 C++ Hooking Library 3079 | - [**600**星][24d] [C] [mohuihui/antispy](https://github.com/mohuihui/antispy) AntiSpy is a free but powerful anti virus and rootkits toolkit.It offers you the ability with the highest privileges that can detect,analyze and restore various kernel modifications and hooks.With its assistance,you can easily spot and neutralize malwares hidden from normal detectors. 3080 | - [**575**星][6d] [C] [yulingtianxia/blockhook](https://github.com/yulingtianxia/blockhook) Hook Objective-C blocks. A powerful AOP tool. 3081 | - [**572**星][8m] [ObjC] [rpetrich/captainhook](https://github.com/rpetrich/captainhook) Common hooking/monkey patching headers for Objective-C on Mac OS X and iPhone OS. MIT licensed 3082 | - [**533**星][1y] [Objective-C++] [davidgoldman/inspectivec](https://github.com/davidgoldman/inspectivec) objc_msgSend hook for debugging/inspection purposes. 3083 | - [**526**星][2m] [C#] [crosire/scripthookvdotnet](https://github.com/crosire/scripthookvdotnet) An ASI plugin for Grand Theft Auto V, which allows running scripts written in any .NET language in-game. 3084 | - [**483**星][1y] [C++] [tandasat/ddimon](https://github.com/tandasat/ddimon) Monitoring and controlling kernel API calls with stealth hook using EPT 3085 | - [**483**星][3m] [Java] [windysha/xpatch](https://github.com/windysha/xpatch) 免Root实现app加载Xposed插件工具。This is a tool to repackage apk file, then the apk can load any xposed modules installed in the device. It is another way to hook an app without root device. 3086 | - [**468**星][27d] [C] [wilix-team/iohook](https://github.com/wilix-team/iohook) Node.js global keyboard and mouse listener. 3087 | - [**443**星][13d] [C++] [stevemk14ebr/polyhook_2_0](https://github.com/stevemk14ebr/polyhook_2_0) C++17, x86/x64 Hooking Libary v2.0 3088 | - [**410**星][9m] [C] [darthton/hyperbone](https://github.com/darthton/hyperbone) Minimalistic VT-x hypervisor with hooks 3089 | - [**393**星][1m] [C++] [0x09al/rdpthief](https://github.com/0x09al/rdpthief) Extracting Clear Text Passwords from mstsc.exe using API Hooking. 3090 | - [**363**星][2m] [C++] [steven-michaud/hookcase](https://github.com/steven-michaud/hookcase) Tool for reverse engineering macOS/OS X 3091 | - [**342**星][6m] [C] [zeex/subhook](https://github.com/zeex/subhook) Simple hooking library for C/C++ (x86 only, 32/64-bit, no dependencies) 3092 | - [**289**星][6m] [C] [outflanknl/dumpert](https://github.com/outflanknl/dumpert) LSASS memory dumper using direct system calls and API unhooking. 3093 | - [**262**星][11m] [C] [nbulischeck/tyton](https://github.com/nbulischeck/tyton) Linux内核模式Rootkit Hunter. 可检测隐藏系统模块、系统调用表Hooking、网络协议Hooking等 3094 | - [**250**星][4m] [C] [gbps/gbhv](https://github.com/gbps/gbhv) Simple x86-64 VT-x Hypervisor with EPT Hooking 3095 | - [**249**星][1y] [Py] [boppreh/mouse](https://github.com/boppreh/mouse) Hook and simulate global mouse events in pure Python 3096 | - [**236**星][4d] [C] [kubo/plthook](https://github.com/kubo/plthook) Hook function calls by replacing PLT(Procedure Linkage Table) entries. 3097 | - [**230**星][1y] [C#] [misaka-mikoto-tech/monohooker](https://github.com/Misaka-Mikoto-Tech/MonoHooker) hook C# method at runtime without modify dll file (such as UnityEditor.dll) 3098 | - [**219**星][7m] [Java] [shuihuadx/xposedhook](https://github.com/shuihuadx/xposedhook) 免重启Xposed模块改进 3099 | - [**213**星][1y] [C] [suvllian/process-inject](https://github.com/suvllian/process-inject) 在Windows环境下的进程注入方法:远程线程注入、创建进程挂起注入、反射注入、APCInject、SetWindowHookEX注入 3100 | 3101 | 3102 | # Monitor&&监控&&Trace&&追踪 3103 | 3104 | 3105 | *** 3106 | 3107 | 3108 | ## 工具 3109 | 3110 | 3111 | - [**1419**星][9m] [C] [namhyung/uftrace](https://github.com/namhyung/uftrace) Function (graph) tracer for user-space 3112 | 3113 | 3114 | # Game&&游戏 3115 | 3116 | 3117 | *** 3118 | 3119 | 3120 | ## 工具 3121 | 3122 | 3123 | - [**2457**星][2d] [C#] [netchx/netch](https://github.com/netchx/netch) 游戏加速器。支持:Socks5, Shadowsocks, ShadowsocksR, V2Ray 协议 3124 | - [**1148**星][4d] [C++] [crosire/reshade](https://github.com/crosire/reshade) A generic post-processing injector for games and video software. 3125 | - [**1127**星][3m] [Py] [openai/neural-mmo](https://github.com/openai/neural-mmo) Code for the paper "Neural MMO: A Massively Multiagent Game Environment for Training and Evaluating Intelligent Agents" 3126 | - [**1020**星][1m] [C] [bt3gl/pentesting-toolkit](https://github.com/bt3gl/Pentesting-Toolkit) 渗透测试,CTF和战争游戏的工具收集 3127 | - [**727**星][6m] [Assembly] [cirosantilli/x86-assembly-cheat](https://github.com/cirosantilli/x86-assembly-cheat) the bulk of the x86 instruction examples with assertions. 3128 | - [**545**星][t] [C++] [danielkrupinski/osiris](https://github.com/danielkrupinski/osiris) 开源培训软件/“反恐精英:全球攻势”游戏作弊工具。设计为内部作弊-可将动态链接库(DLL)加载到游戏过程中 3129 | - [**522**星][3m] [Kotlin] [jire/charlatano](https://github.com/jire/charlatano) Proves JVM cheats are viable on native games, and demonstrates the longevity against anti-cheat signature detection systems 3130 | - [**399**星][14d] [Py] [moloch--/rootthebox](https://github.com/moloch--/rootthebox) A Game of Hackers (CTF Scoreboard & Game Manager) 3131 | - [**352**星][] [C#] [leaguesandbox/gameserver](https://github.com/leaguesandbox/gameserver) League Sandbox's Game Server 3132 | - [**352**星][1m] [C] [liji32/sameboy](https://github.com/liji32/sameboy) Game Boy and Game Boy Color emulator written in C 3133 | - [**300**星][] [C++] [squalr/squally](https://github.com/squalr/squally) 2D Platformer Game for Teaching Game Hacking - C++/cocos2d-x 3134 | - [**265**星][18d] [C++] [niemand-sec/anticheat-testing-framework](https://github.com/niemand-sec/anticheat-testing-framework) Framework to test any Anti-Cheat 3135 | - [**264**星][t] [C++] [fransbouma/injectablegenericcamerasystem](https://github.com/fransbouma/injectablegenericcamerasystem) This is a generic camera system to be used as the base for cameras for taking screenshots within games. The main purpose of the system is to hijack the in-game 3D camera by overwriting values in its camera structure with our own values so we can control where the camera is located, it's pitch/yaw/roll values, its FoV and the camera's look vector. 3136 | - [**247**星][2d] [CSS] [steamdatabase/gametracking-dota2](https://github.com/steamdatabase/gametracking-dota2) 3137 | - [**246**星][1y] [xcsh/unity-game-hacking](https://github.com/xcsh/unity-game-hacking) A guide for hacking unity games 3138 | - [**224**星][6m] [JS] [pavanw3b/sh00t](https://github.com/pavanw3b/sh00t) Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and had to regret later? Sh00t is a highly customizable, intelligent platform that understands the life of bug hunters and emphasizes on manual security testing. 3139 | - [**215**星][6m] [C#] [erfg12/memory.dll](https://github.com/erfg12/memory.dll) C# Hacking library for making PC game trainers. 3140 | - [**215**星][3m] [C] [xyzz/gamecard-microsd](https://github.com/xyzz/gamecard-microsd) microSD adapter for PlayStation Vita 3141 | - [**214**星][4m] [C++] [eternityx/deadcell-csgo](https://github.com/eternityx/deadcell-csgo) Full source to the CS:GO cheat 3142 | 3143 | 3144 | # Malware&&恶意代码 3145 | 3146 | 3147 | *** 3148 | 3149 | 3150 | ## 工具 3151 | 3152 | 3153 | - [**5195**星][11d] [Py] [mobsf/mobile-security-framework-mobsf](https://github.com/MobSF/Mobile-Security-Framework-MobSF) Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. 3154 | - 重复区段: [Android->工具->新添加的1](#63fd2c592145914e99f837cecdc5a67c) | 3155 | - [**3369**星][8d] [C] [screetsec/thefatrat](https://github.com/screetsec/thefatrat) Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw… 3156 | - [**2459**星][3d] [PHP] [misp/misp](https://github.com/misp/misp) MISP (core software) - Open Source Threat Intelligence and Sharing Platform (formely known as Malware Information Sharing Platform) 3157 | - [**1433**星][1y] [TS] [pedronauck/reworm](https://github.com/pedronauck/reworm) 3158 | - [**1268**星][4d] [Shell] [mitchellkrogza/nginx-ultimate-bad-bot-blocker](https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker) Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders 3159 | - [**1243**星][10m] [C] [a0rtega/pafish](https://github.com/a0rtega/pafish) Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do. 3160 | - [**1090**星][1m] [Go] [looterz/grimd](https://github.com/looterz/grimd) Fast dns proxy that can run anywhere, built to black-hole internet advertisements and malware servers. 3161 | - [**1084**星][2m] [PHP] [nbs-system/php-malware-finder](https://github.com/nbs-system/php-malware-finder) Detect potentially malicious PHP files 3162 | - [**1017**星][5d] [Rich Text Format] [decalage2/oletools](https://github.com/decalage2/oletools) oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging. 3163 | - [**930**星][4m] [Py] [airbnb/binaryalert](https://github.com/airbnb/binaryalert) 实时恶意代码检测,无需服务器 3164 | - [**800**星][3m] [sh4hin/androl4b](https://github.com/sh4hin/androl4b) 用于评估Android应用程序,逆向工程和恶意软件分析的虚拟机 3165 | - 重复区段: [Android->工具->新添加的1](#63fd2c592145914e99f837cecdc5a67c) | 3166 | - [**779**星][2m] [Py] [gosecure/malboxes](https://github.com/gosecure/malboxes) Builds malware analysis Windows VMs so that you don't have to. 3167 | - [**713**星][6d] [Py] [sevagas/macro_pack](https://github.com/sevagas/macro_pack) 自动生成并混淆MS 文档, 用于渗透测试、演示、社会工程评估等 3168 | - [**682**星][30d] [Py] [rurik/noriben](https://github.com/rurik/noriben) Portable, Simple, Malware Analysis Sandbox 3169 | - [**662**星][8m] [Shell] [rfxn/linux-malware-detect](https://github.com/rfxn/linux-malware-detect) Linux Malware Detection (LMD) 3170 | - [**653**星][26d] [YARA] [eset/malware-ioc](https://github.com/eset/malware-ioc) Indicators of Compromises (IOC) of our various investigations 3171 | - [**619**星][] [Py] [eliasgranderubio/dagda](https://github.com/eliasgranderubio/dagda) Docker安全套件 3172 | - [**600**星][5m] [fabrimagic72/malware-samples](https://github.com/fabrimagic72/malware-samples) 恶意软件样本 3173 | - [**574**星][2m] [HTML] [gwillem/magento-malware-scanner](https://github.com/gwillem/magento-malware-scanner) 用于检测 Magento 恶意软件的规则/样本集合 3174 | - [**563**星][3m] [Py] [certsocietegenerale/fame](https://github.com/certsocietegenerale/fame) 自动化恶意代码评估 3175 | - [**536**星][2m] [Py] [tencent/habomalhunter](https://github.com/tencent/habomalhunter) HaboMalHunter is a sub-project of Habo Malware Analysis System ( 3176 | - [**494**星][1m] [C] [hasherezade/demos](https://github.com/hasherezade/demos) Demos of various injection techniques found in malware 3177 | - [**493**星][5d] [Py] [ctxis/cape](https://github.com/ctxis/cape) Malware Configuration And Payload Extraction 3178 | - [**417**星][4m] [Py] [misterch0c/malsploitbase](https://github.com/misterch0c/malsploitbase) Malware exploits 3179 | - [**401**星][t] [C#] [collinbarrett/filterlists](https://github.com/collinbarrett/filterlists) independent, comprehensive directory of filter and host lists for advertisements, trackers, malware, and annoyances. 3180 | - [**395**星][2m] [YARA] [guelfoweb/peframe](https://github.com/guelfoweb/peframe) PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents. 3181 | - [**393**星][6m] [JS] [capacitorset/box-js](https://github.com/capacitorset/box-js) A tool for studying JavaScript malware. 3182 | - [**384**星][9d] [Py] [alexandreborges/malwoverview](https://github.com/alexandreborges/malwoverview) Malwoverview.py is a first response tool to perform an initial and quick triage in a directory containing malware samples, specific malware sample, suspect URL and domains. Additionally, it allows to download and send samples to main online sandboxes. 3183 | - [**375**星][7m] [Py] [secrary/ssma](https://github.com/secrary/ssma) SSMA - Simple Static Malware Analyzer [This project is not maintained anymore] 3184 | - [**375**星][] [Shell] [whonix/whonix](https://github.com/whonix/whonix) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. 3185 | - [**374**星][3m] [AngelScript] [inquest/malware-samples](https://github.com/inquest/malware-samples) A collection of malware samples and relevant dissection information, most probably referenced from 3186 | - [**365**星][4m] [Py] [neo23x0/munin](https://github.com/neo23x0/munin) Online hash checker for Virustotal and other services 3187 | - [**354**星][5m] [Py] [hasherezade/malware_analysis](https://github.com/hasherezade/malware_analysis) Various snippets created during malware analysis 3188 | - [**342**星][9m] [Py] [iphelix/dnschef](https://github.com/iphelix/dnschef) DNS 代理,用于渗透测试和恶意代码分析 3189 | - [**337**星][8m] [Py] [rek7/fireelf](https://github.com/rek7/fireelf) Fileless Linux Malware Framework 3190 | - [**332**星][20d] [Py] [fireeye/stringsifter](https://github.com/fireeye/stringsifter) A machine learning tool that ranks strings based on their relevance for malware analysis. 3191 | - [**331**星][t] [Batchfile] [mitchellkrogza/ultimate.hosts.blacklist](https://github.com/mitchellkrogza/ultimate.hosts.blacklist) The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware. 3192 | - [**326**星][1y] [C++] [m0n0ph1/process-hollowing](https://github.com/m0n0ph1/process-hollowing) Great explanation of Process Hollowing (a Technique often used in Malware) 3193 | - [**317**星][1m] [C#] [malware-dev/mdk-se](https://github.com/malware-dev/mdk-se) Malware's Development Kit for SE 3194 | - [**305**星][5m] [JS] [hynekpetrak/malware-jail](https://github.com/hynekpetrak/malware-jail) Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js 3195 | - [**301**星][12m] [Assembly] [guitmz/virii](https://github.com/guitmz/virii) Collection of ancient computer virus source codes 3196 | - [**301**星][5d] [Shell] [mitchellkrogza/apache-ultimate-bad-bot-blocker](https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker) Apache Block Bad Bots, (Referer) Spam Referrer Blocker, Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites, Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders 3197 | - [**292**星][10d] [PHP] [phpmussel/phpmussel](https://github.com/phpmussel/phpmussel) PHP-based anti-virus anti-trojan anti-malware solution. 3198 | - [**285**星][7m] [Java] [katjahahn/portex](https://github.com/katjahahn/portex) Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness 3199 | - [**283**星][8m] [Py] [phage-nz/ph0neutria](https://github.com/phage-nz/ph0neutria) ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and manageability. 3200 | - [**278**星][8m] [C] [rieck/malheur](https://github.com/rieck/malheur) A Tool for Automatic Analysis of Malware Behavior 3201 | - [**273**星][2m] [JS] [hynekpetrak/javascript-malware-collection](https://github.com/hynekpetrak/javascript-malware-collection) Collection of almost 40.000 javascript malware samples 3202 | - [**262**星][2m] [Py] [felixweyne/imaginaryc2](https://github.com/felixweyne/imaginaryc2) Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads. 3203 | - [**259**星][1m] [Py] [diogo-fernan/malsub](https://github.com/diogo-fernan/malsub) A Python RESTful API framework for online malware analysis and threat intelligence services. 3204 | - [**256**星][10m] [C++] [ramadhanamizudin/malware](https://github.com/ramadhanamizudin/malware) Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: 3205 | - [**241**星][8m] [C++] [mstfknn/malware-sample-library](https://github.com/mstfknn/malware-sample-library) Malware sample library. 3206 | - [**240**星][2m] [Py] [a3sal0n/falcongate](https://github.com/a3sal0n/falcongate) A smart gateway to stop hackers and Malware attacks 3207 | - [**240**星][7d] [Shell] [essandess/macos-fortress](https://github.com/essandess/macos-fortress) Firewall and Privatizing Proxy for Trackers, Attackers, Malware, Adware, and Spammers with Anti-Virus On-Demand and On-Access Scanning (PF, squid, privoxy, hphosts, dshield, emergingthreats, hostsfile, PAC file, clamav) 3208 | - [**237**星][3m] [C++] [richkmeli/richkware](https://github.com/richkmeli/richkware) Framework for building Windows malware, written in C++ 3209 | - [**233**星][2m] [C] [elfmaster/libelfmaster](https://github.com/elfmaster/libelfmaster) Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools 3210 | - [**220**星][15d] [Py] [wazuh/wazuh-ruleset](https://github.com/wazuh/wazuh-ruleset) ruleset is used to detect attacks, intrusions, software misuse, configuration problems, application errors, malware, rootkits, system anomalies or security policy violations. 3211 | - [**219**星][8d] [JS] [strangerealintel/cyberthreatintel](https://github.com/strangerealintel/cyberthreatintel) Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups 3212 | - [**211**星][2m] [Py] [eset/malware-research](https://github.com/eset/malware-research) 恶意代码分析中用到的代码/工具 3213 | - [**207**星][5m] [YARA] [th3hurrican3/pepper](https://github.com/th3hurrican3/pepper) An open source script to perform malware static analysis on Portable Executable 3214 | - [**202**星][24d] [Py] [doomedraven/virustotalapi](https://github.com/doomedraven/virustotalapi) VirusTotal Full api 3215 | - [**200**星][2m] [C++] [secrary/drsemu](https://github.com/secrary/drsemu) 根据动态行为检测恶意代码并进行分类 3216 | 3217 | 3218 | # Rootkit&&Bootkit 3219 | 3220 | 3221 | *** 3222 | 3223 | 3224 | ## 工具 3225 | 3226 | 3227 | - [**1527**星][19d] [Py] [zerosum0x0/koadic](https://github.com/zerosum0x0/koadic) 类似于Meterpreter、Powershell Empire 的post-exploitation rootkit,区别在于其大多数操作都是由 Windows 脚本主机 JScript/VBScript 执行 3228 | - [**1200**星][10m] [C] [f0rb1dd3n/reptile](https://github.com/f0rb1dd3n/reptile) LKM Linux rootkit 3229 | - [**724**星][9m] [C] [mempodippy/vlany](https://github.com/mempodippy/vlany) Linux LD_PRELOAD rootkit (x86 and x86_64 architectures) 3230 | - [**587**星][6m] [d30sa1/rootkits-list-download](https://github.com/d30sa1/rootkits-list-download) Rootkit收集 3231 | - [**511**星][6m] [C] [nurupo/rootkit](https://github.com/nurupo/rootkit) Linux rootkit,针对 Ubuntu 16.04 及 10.04 (Linux 内核 4.4.0/2.6.32), 支持 i386 和 amd64 3232 | - [**501**星][2m] [C] [m0nad/diamorphine](https://github.com/m0nad/diamorphine) 适用于Linux Kernels 2.6.x / 3.x / 4.x(x86和x86_64)的LKM rootkit 3233 | - [**429**星][1y] [C] [novicelive/research-rootkit](https://github.com/novicelive/research-rootkit) LibZeroEvil & the Research Rootkit project. 3234 | - [**391**星][2m] [milabs/awesome-linux-rootkits](https://github.com/milabs/awesome-linux-rootkits) awesome-linux-rootkits 3235 | - [**378**星][3m] [Shell] [screetsec/vegile](https://github.com/screetsec/vegile) This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell 3236 | - [**264**星][9m] [C] [landhb/hideprocess](https://github.com/landhb/hideprocess) A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager 3237 | 3238 | 3239 | *** 3240 | 3241 | 3242 | ## 文章 3243 | 3244 | 3245 | - 2019.12 [freebuf] [AntiSpy:一款功能强大的反病毒&反Rootkit免费工具套件](https://www.freebuf.com/articles/system/221820.html) 3246 | - 2019.12 [jm33] [Linux Rootkit for Fun and Profit - 0x03 - LKM - Hide from ss/netstat](https://jm33.me/linux-rootkit-for-fun-and-profit-0x03-lkm-hide-from-ssnetstat.html) 3247 | - 2019.12 [jm33] [Linux Rootkit for Fun and Profit - 0x02 - LKM - Hide files/procs](https://jm33.me/linux-rootkit-for-fun-and-profit-0x02-lkm-hide-filesprocs.html) 3248 | - 2019.12 [jm33] [Linux Rootkit for Fun and Profit - 0x02 - LKM](https://jm33.me/linux-rootkit-for-fun-and-profit-0x02-lkm.html) 3249 | - 2019.12 [jm33] [Linux Rootkit for Fun and Profit - 0x01 - LKM](https://jm33.me/linux-rootkit-for-fun-and-profit-0x01-lkm.html) 3250 | - 2019.12 [jm33] [Linux Rootkit for Fun and Profit - 0x00 - Design](https://jm33.me/linux-rootkit-for-fun-and-profit-0x00-design.html) 3251 | - 2019.11 [hakin9] [Antispy - A Free But Powerful Anti Virus And Rootkits Toolkit](https://hakin9.org/antispy-a-free-but-powerful-anti-virus-and-rootkits-toolkit/) 3252 | - 2019.10 [HackersOnBoard] [Black Hat USA 2016 Horse Pill A New Type of Linux Rootkit](https://www.youtube.com/watch?v=RcYcJarMVWI) 3253 | - 2019.10 [Kaspersky] [Rootkit Detection and Removal](https://www.youtube.com/watch?v=goyiuyA-Ckw) 3254 | - 2019.09 [infosecinstitute] [Malware: What are rootkits?](https://resources.infosecinstitute.com/malware-what-are-rootkits/) 3255 | - 2019.09 [trendmicro] [Skidmap Linux Malware Uses Rootkit Capabilities to Hide Cryptocurrency-Mining Payload](https://blog.trendmicro.com/trendlabs-security-intelligence/skidmap-linux-malware-uses-rootkit-capabilities-to-hide-cryptocurrency-mining-payload/) 3256 | - 2019.08 [KindredSecurity] [Live Malware Analysis | Checking out a User-land Rootkit](https://www.youtube.com/watch?v=FvYjM8eZ7Ck) 3257 | - 2019.06 [aliyun] [威胁快报|挖矿团伙8220进化,rootkit挖矿趋势兴起](https://xz.aliyun.com/t/5482) 3258 | - 2019.06 [4hou] [威胁快报 | 挖矿团伙8220进化,rootkit挖矿趋势兴起](https://www.4hou.com/system/18409.html) 3259 | - 2019.05 [4hou] [使用Rootkit实现恶意挖矿:CVE-2019-3396漏洞新型恶意利用方式分析](https://www.4hou.com/vulnerable/17918.html) 3260 | - 2019.05 [trendmicro] [CVE-2019-3396 Redux: Confluence Vulnerability Exploited to Deliver Cryptocurrency Miner With Rootkit](https://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-3396-redux-confluence-vulnerability-exploited-to-deliver-cryptocurrency-miner-with-rootkit/) 3261 | - 2019.04 [h2hconference] [Linux Kernel Rootkits - Matveychikov & f0rb1dd3n - H2HC 2018](https://www.youtube.com/watch?v=8_0_FT-rKfw) 3262 | - 2019.04 [mediacccde] [Easterhegg 2019 - Anatomie eines containerfähigen Linux-Kernel-Rootkits](https://www.youtube.com/watch?v=4sPAYgR29E4) 3263 | - 2019.04 [freebuf] [BUF早餐铺 | Scranos rootkit从中国扩散到全世界;厄瓜多尔政府和机构网站遭到4千万次攻击;国家网信办启动小众即时通信工具专项整治](https://www.freebuf.com/news/201305.html) 3264 | - 2019.01 [fuzzysecurity] [Capcom Rootkit Proof-Of-Concept](http://fuzzysecurity.com/tutorials/28.html) 3265 | 3266 | 3267 | # 硬件 3268 | 3269 | 3270 | *** 3271 | 3272 | 3273 | ## 固件 3274 | 3275 | 3276 | ### Firmware&&固件 3277 | 3278 | 3279 | - [**6213**星][6m] [rmerl/asuswrt-merlin](https://github.com/rmerl/asuswrt-merlin) Enhanced version of Asus's router firmware (Asuswrt) (legacy code base) 3280 | - [**3772**星][5d] [C] [atmosphere-nx/atmosphere](https://github.com/atmosphere-nx/atmosphere) Atmosphère is a work-in-progress customized firmware for the Nintendo Switch. 3281 | - [**3247**星][] [C] [betaflight/betaflight](https://github.com/betaflight/betaflight) Open Source Flight Controller Firmware 3282 | - [**3166**星][6d] [C++] [px4/firmware](https://github.com/px4/firmware) PX4 Autopilot Software 3283 | - [**2834**星][18d] [C] [tmk/tmk_keyboard](https://github.com/tmk/tmk_keyboard) Atmel AVR 和 Cortex-M键盘固件收集 3284 | - [**2282**星][2m] [C] [aurorawright/luma3ds](https://github.com/aurorawright/luma3ds) Noob-proof (N)3DS "Custom Firmware" 3285 | - [**1473**星][2d] [C] [tianocore/edk2](https://github.com/tianocore/edk2) A modern, feature-rich, cross-platform firmware development environment for the UEFI and PI specifications 3286 | - [**797**星][5d] [C] [fwupd/fwupd](https://github.com/fwupd/fwupd) A simple daemon to allow session software to update firmware 3287 | - [**634**星][6m] [C] [travisgoodspeed/md380tools](https://github.com/travisgoodspeed/md380tools) Python tools and patched firmware for the TYT-MD380 3288 | - [**421**星][5m] [preos-security/awesome-firmware-security](https://github.com/preos-security/awesome-firmware-security) Awesome Firmware Security & Other Helpful Documents 3289 | - [**381**星][3d] [Py] [fkie-cad/fact_core](https://github.com/fkie-cad/fact_core) Firmware Analysis and Comparison Tool 3290 | - [**294**星][5m] [C++] [rampagex/firmware-mod-kit](https://github.com/rampagex/firmware-mod-kit) Automatically exported from code.google.com/p/firmware-mod-kit 3291 | - [**281**星][2m] [Py] [pspreverse/psptool](https://github.com/PSPReverse/psptool) Display, extract, and manipulate PSP firmware inside UEFI images 3292 | - [**243**星][10d] [Py] [avatartwo/avatar2](https://github.com/avatartwo/avatar2) targetorchestration 框架,重点是嵌入式设备固件的动态分析 3293 | - [**234**星][12m] [C] [reisyukaku/reinand](https://github.com/reisyukaku/reinand) Minimalist 3DS custom firmware. 3294 | 3295 | 3296 | ### Intel 3297 | 3298 | 3299 | - [**510**星][2m] [Py] [platomav/meanalyzer](https://github.com/platomav/meanalyzer) Intel Engine Firmware Analysis Tool 3300 | - [**465**星][1y] [Py] [ptresearch/unme11](https://github.com/ptresearch/unme11) Intel ME 11.x Firmware Images Unpacker 3301 | 3302 | 3303 | 3304 | 3305 | # Crypto&&加密&&算法 3306 | 3307 | 3308 | *** 3309 | 3310 | 3311 | ## 工具 3312 | 3313 | 3314 | - [**2374**星][2m] [TeX] [crypto101/book](https://github.com/crypto101/book) Crypto 101, the introductory book on cryptography. 3315 | - [**1653**星][6d] [Go] [bitnami-labs/sealed-secrets](https://github.com/bitnami-labs/sealed-secrets) A Kubernetes controller and tool for one-way encrypted Secrets 3316 | - [**1484**星][25d] [C++] [microsoft/seal](https://github.com/microsoft/seal) Microsoft SEAL is an easy-to-use and powerful homomorphic encryption library. 3317 | - [**832**星][5d] [Haskell] [galoisinc/cryptol](https://github.com/galoisinc/cryptol) The Language of Cryptography 3318 | - [**773**星][1y] [pfarb/awesome-crypto-papers](https://github.com/pfarb/awesome-crypto-papers) A curated list of cryptography papers, articles, tutorials and howtos. 3319 | - [**693**星][5m] [C++] [stealth/opmsg](https://github.com/stealth/opmsg) opmsg message encryption 3320 | - [**673**星][4d] [Java] [google/conscrypt](https://github.com/google/conscrypt) Conscrypt is a Java Security Provider that implements parts of the Java Cryptography Extension and Java Secure Socket Extension. 3321 | - [**482**星][3m] [C] [microsoft/symcrypt](https://github.com/microsoft/symcrypt) Cryptographic library 3322 | - [**469**星][21d] [C] [skeeto/enchive](https://github.com/skeeto/enchive) Encrypted personal archives 3323 | - [**467**星][4m] [miscreant/meta](https://github.com/miscreant/meta) 具备错误使用抗性的(Misuse-resistant )对称加密库,支持 AES-SIV (RFC5297) 和 CHAIN/STREAM 3324 | - [**433**星][2m] [Go] [gorilla/securecookie](https://github.com/gorilla/securecookie) Package gorilla/securecookie encodes and decodes authenticated and optionally encrypted cookie values for Go web applications. 3325 | - [**381**星][18d] [C++] [msoos/cryptominisat](https://github.com/msoos/cryptominisat) An advanced SAT solver 3326 | - [**350**星][8m] [Haskell] [jpmorganchase/constellation](https://github.com/jpmorganchase/constellation) Peer-to-peer encrypted message exchange 3327 | - [**341**星][1m] [Shell] [umputun/nginx-le](https://github.com/umputun/nginx-le) Nginx with automatic let's encrypt (docker image) 3328 | - [**330**星][10d] [Py] [efforg/starttls-everywhere](https://github.com/efforg/starttls-everywhere) A system for ensuring & authenticating STARTTLS encryption between mail servers 3329 | - [**326**星][6m] [JS] [hr/crypter](https://github.com/hr/crypter) An innovative, convenient and secure cross-platform encryption app 3330 | - [**309**星][1m] [C] [jhuisi/charm](https://github.com/jhuisi/charm) A Framework for Rapidly Prototyping Cryptosystems 3331 | - [**268**星][5d] [Py] [nucypher/nucypher](https://github.com/nucypher/nucypher) A decentralized network offering accessible, intuitive, and extensible cryptographic runtimes and interfaces for secrets management and dynamic access control. 3332 | - [**253**星][13d] [C] [icing/mod_md](https://github.com/icing/mod_md) Let's Encrypt (ACME) support for Apache httpd 3333 | - [**248**星][26d] [C++] [evpo/encryptpad](https://github.com/evpo/encryptpad) Minimalist secure text editor and binary encryptor that implements RFC 4880 Open PGP format: symmetrically encrypted, compressed and integrity protected. The editor can protect files with passwords, key files or both. 3334 | - [**233**星][8m] [C] [ctz/cifra](https://github.com/ctz/cifra) A collection of cryptographic primitives targeted at embedded use. 3335 | - [**224**星][12m] [C] [gkdr/lurch](https://github.com/gkdr/lurch) XEP-0384: OMEMO Encryption for libpurple. 3336 | - [**224**星][2d] [C] [libyal/libfvde](https://github.com/libyal/libfvde) Library and tools to access FileVault Drive Encryption (FVDE) encrypted volumes 3337 | - [**224**星][13d] [vixentael/my-talks](https://github.com/vixentael/my-talks) List of my talks and workshops: security engineering, applied cryptography, secure software development 3338 | - [**221**星][3m] [Go] [cloudflare/tls-tris](https://github.com/cloudflare/tls-tris) crypto/tls, now with 100% more 1.3. THE API IS NOT STABLE AND DOCUMENTATION IS NOT GUARANTEED. 3339 | - [**215**星][11d] [C] [hypersine/how-does-navicat-encrypt-password](https://github.com/HyperSine/how-does-navicat-encrypt-password) Transferred from 3340 | - [**211**星][5m] [Py] [nucypher/nufhe](https://github.com/nucypher/nufhe) NuCypher fully homomorphic encryption (NuFHE) library implemented in Python 3341 | - [**202**星][5m] [TeX] [decrypto-org/rupture](https://github.com/decrypto-org/rupture) A framework for BREACH and other compression-based crypto attacks 3342 | - [**201**星][3d] [anudeepnd/blacklist](https://github.com/anudeepnd/blacklist) Curated and well-maintained host file to block ads, tracking, cryptomining and more! Updated regularly. 3343 | 3344 | 3345 | # 贡献 3346 | 内容为系统自动导出, 有任何问题请提issue --------------------------------------------------------------------------------