Burp Suite Certificate setup on genymotion and proxy settings configuration
https://youtu.be/CUdXhgHrj8c
@reverseengineer101
https://youtu.be/CUdXhgHrj8c
@reverseengineer101
YouTube
How to set-up burp suite certificate on genymotion and configure proxy settings #android #proxy
How to set-up burp suite certificate on genymotion and configure proxy settings to capture the traffic in Android apps using burp suite
I am running on genymotion Android 9
Files can be found on telegram, also a bash script for quick setup with the '.0'…
I am running on genymotion Android 9
Files can be found on telegram, also a bash script for quick setup with the '.0'…
❤4
cert+dirs.zip
965 B
Burp Suite Certificate (.der) and The Directories used in the video
Quick-setup.zip
1.1 KB
a bash script for quick setup and the '.0' certificate
To use extract the contents of that file into download folder (
And run :
To use extract the contents of that file into download folder (
storage/emulated/0/Download/)And run :
cd /storage/emulated/0/Download/; bash burpcert-setup.bash
❤5👍2
1. C source code which just prints "Hello World!"
2. Compiling using gcc ('-o' to customize the output file name 'libtest.so') and verifying if the file generated (ls | grep 'test')
3. Opening APKTOOL M in the same directory where is the compiled file
4. Showing the binary sections and the strings in dynstr section
5. rodata (ascii) strings section
6. Editing and saving
7. Saving the changes and exit
➜ (Before) shows strings dump before editing using rabin2 ('-z' for dump strings in data section only)
➜ (After) shows strings dump after editing using rabin2 ('-z' for dump strings in data section only)
◉ APKTOOL M @apktool_m
ⓘ @reverseengineer101
2. Compiling using gcc ('-o' to customize the output file name 'libtest.so') and verifying if the file generated (ls | grep 'test')
3. Opening APKTOOL M in the same directory where is the compiled file
4. Showing the binary sections and the strings in dynstr section
5. rodata (ascii) strings section
6. Editing and saving
7. Saving the changes and exit
➜ (Before) shows strings dump before editing using rabin2 ('-z' for dump strings in data section only)
➜ (After) shows strings dump after editing using rabin2 ('-z' for dump strings in data section only)
◉ APKTOOL M @apktool_m
ⓘ @reverseengineer101
👍6❤1
reverse engineering
New releases of find_fnc.py with a new name with more functionality, you don't need to use tow scripts now To run : python Find Inst.py or python3 FindInst.py Supports the latest version of python (3.12.7) and pptool latest version (1.6) *Note : The script…
ⓘ Updated (V1.1) :
◉ Improved logic
◉ add a function at the start to check if r2pipe is installed or no and if it's not it will be installed automatically
https://github.com/ReEng101/Find-Inst
⊷ @reverseengineer101
◉ Improved logic
◉ add a function at the start to check if r2pipe is installed or no and if it's not it will be installed automatically
https://github.com/ReEng101/Find-Inst
⊷ @reverseengineer101
GitHub
GitHub - ReEng101/Find-Inst: Python Tool to help reverse engineering flutter apps beside pptool
Python Tool to help reverse engineering flutter apps beside pptool - ReEng101/Find-Inst
❤6👍2
root module (xposed-based) to bypass SSL Pinning in Android apps
https://github.com/Xposed-Modules-Repo/com.simo.ssl.killer/releases/tag/1-1.0.2
@sslkiller
@android_reverse
https://github.com/Xposed-Modules-Repo/com.simo.ssl.killer/releases/tag/1-1.0.2
@sslkiller
@android_reverse
GitHub
Release 1.0.2 · Xposed-Modules-Repo/com.simo.ssl.killer
Change logs:
issues fixed.
issues fixed.
👍11🔥1
I noticed that no one is reacting on the last posts, Isn't it useful 😐 ?
👍16
Soon binary comparison and more about the usages of r2 plugins
🔥9👍2👏2🤩2
For programming stuff Black Box is a great choice :
https://www.blackbox.ai/
For cyber security and reverse engineering (things that chatgpt can't answer, it can even make attack scripts) :
https://www.whiterabbitneo.com
@reverseengineer101
https://www.blackbox.ai/
For cyber security and reverse engineering (things that chatgpt can't answer, it can even make attack scripts) :
https://www.whiterabbitneo.com
@reverseengineer101
www.deephat.ai
Deep Hat - Defense in the AI Abyss
Deep Hat, formerly Whiterabbitneo, is Kindo's uncensored red team cybersecurity model built for real offensive reasoning, long-context analysis, and secure execution.
100❤8👍3
reverse engineering
Soon binary comparison and more about the usages of r2 plugins
YouTube
Binary Comparison (How to use radiff2) #reverseengineering #radare2 #binary
A video about binary comparison using radiff2 which is a pre-installed plugin for radare2 based on diff tool for Linux/Unix and more basic information about radare2 plugins
Demo files can be found on telegram channel (in frist comment)
Don't forget to see…
Demo files can be found on telegram channel (in frist comment)
Don't forget to see…
❤3
https://youtube.com/shorts/guI192luRFs
Additional information about '-g' flag with radiff2
@reverseengineer101
Additional information about '-g' flag with radiff2
@reverseengineer101
❤3