Media is too big
VIEW IN TELEGRAM
#Tutorial_In_Arabic_0x1
تعلم استخدام ghidra و radare2 لتحليل البرامج و حل التحديات
رابط التطبيق CrackMes.One
سكربت بايثون معتمد على دالة Check
Pass_Gen.py
الفيديو بواسطة
@Mohamed_Abozaid1
#New_Cracking_Era
تعلم استخدام ghidra و radare2 لتحليل البرامج و حل التحديات
رابط التطبيق CrackMes.One
سكربت بايثون معتمد على دالة Check
Pass_Gen.py
الفيديو بواسطة
@Mohamed_Abozaid1
#New_Cracking_Era
❤2😐2
This media is not supported in your browser
VIEW IN TELEGRAM
☛ Solving a Simple CTF based on C Programming Language Using Ghidra and Cutter
◉ strncmp() In Official C Documentation
◉ For The Source Code and The Compiled App Check Comments
☛ Github Source
☛ For Ghidra
☛ For Cutter
☛ For radare2 Plugins
𖣘 There is a typo in the video it should be strncmp not strcmpn, I apologize for that
➭ By 𝓜𝓸𝓱𝓪𝓶𝓮𝓭 𝓐𝓫𝓸𝔃𝓪𝓲𝓭
#New_Cracking_Era
◉ strncmp() In Official C Documentation
int strncmp( const char* lhs, const char* rhs, size_t count );
◉ For The Source Code and The Compiled App Check Comments
☛ Github Source
☛ For Ghidra
☛ For Cutter
☛ For radare2 Plugins
𖣘 There is a typo in the video it should be strncmp not strcmpn, I apologize for that
➭ By 𝓜𝓸𝓱𝓪𝓶𝓮𝓭 𝓐𝓫𝓸𝔃𝓪𝓲𝓭
#New_Cracking_Era
👍5
Media is too big
VIEW IN TELEGRAM
In this video you will not learn to mod an app from Google play
This is a basic video for people who want to understand the logic of the apps
The video is based on UnCrackable-Level1
I hope that you will enjoy with it
*sorry if some words aren't clear
Credit : @Mohamed_Abozaid1
This is a basic video for people who want to understand the logic of the apps
The video is based on UnCrackable-Level1
I hope that you will enjoy with it
*sorry if some words aren't clear
Credit : @Mohamed_Abozaid1
👍7
This media is not supported in your browser
VIEW IN TELEGRAM
⌲ Cracking a Windows Application
➜ in This Video :
◉ in x86 64 assembly learn :
- loops
- conditions
- control flow
- decrement
- saving values in registers and switching between them
◉ Understand The logic To find the password
◉ Control application stack flow to bypass the checks for the correct password
◉ New function in C/C++ (memcmp)
◉ an overview about using radare2 and commands
➜ By @reverseengineer101 | @Mohamed_Abozaid1
➜ in This Video :
◉ in x86 64 assembly learn :
- loops
- conditions
- control flow
- decrement
- saving values in registers and switching between them
◉ Understand The logic To find the password
◉ Control application stack flow to bypass the checks for the correct password
◉ New function in C/C++ (memcmp)
◉ an overview about using radare2 and commands
➜ By @reverseengineer101 | @Mohamed_Abozaid1
🔥4❤3👍3
reverse engineering
Something great is coming 😉 @reverseengineer101
If you are asking about this
This is a solution for the owasp challenge UnCrackable-Level2
In this tutorial you will learn how to analyze full the app and understand its behavior, to bypass root detection by Frida and manually by patching the app, find the activation code which will be in the native code and this will open your eyes on how the integration between java codes and native codes is also what is JNI at the and finally how to patch disassembly by radare2 to bypass the checks of the secret code and more !
I know that there are a lot of people solved that change but I worked on it in a different way with various methods to solve problems
This is a solution for the owasp challenge UnCrackable-Level2
In this tutorial you will learn how to analyze full the app and understand its behavior, to bypass root detection by Frida and manually by patching the app, find the activation code which will be in the native code and this will open your eyes on how the integration between java codes and native codes is also what is JNI at the and finally how to patch disassembly by radare2 to bypass the checks of the secret code and more !
I know that there are a lot of people solved that change but I worked on it in a different way with various methods to solve problems
👍6❤5👏1
Tools you should know :
1 - radare2 :
> official website :
https://rada.re/n/
> github :
https://github.com/radareorg
2 - Ghidra :
> official website :
https://ghidra-sre.org/
> github :
https://github.com/NationalSecurityAgency/ghidra
3 - IDA Free / IDA Pro (Hex-Rays) :
https://hex-rays.com
4 - Cutter :
> official website :
https://cutter.re/
> github :
https://github.com/rizinorg/cutter
5 - iaito :
> official website :
https://rada.re/n/iaito.html
> github :
https://github.com/radareorg/iaito
6 - reflutter :
https://github.com/ptswarm/reFlutter
7 - B(l)utter :
https://github.com/worawit/blutter
8 - Apktool :
> official website :
https://apktool.org/
> github :
https://github.com/iBotPeaches/Apktool
9 - Jadx-gui :
https://github.com/skylot/jadx
10 - dnSpy :
https://github.com/dnSpy/dnSpy
11 - Binary Ninja :
https://binary.ninja/
12 - x64dbg :
https://x64dbg.com/
1 - radare2 :
> official website :
https://rada.re/n/
> github :
https://github.com/radareorg
2 - Ghidra :
> official website :
https://ghidra-sre.org/
> github :
https://github.com/NationalSecurityAgency/ghidra
3 - IDA Free / IDA Pro (Hex-Rays) :
https://hex-rays.com
4 - Cutter :
> official website :
https://cutter.re/
> github :
https://github.com/rizinorg/cutter
5 - iaito :
> official website :
https://rada.re/n/iaito.html
> github :
https://github.com/radareorg/iaito
6 - reflutter :
https://github.com/ptswarm/reFlutter
7 - B(l)utter :
https://github.com/worawit/blutter
8 - Apktool :
> official website :
https://apktool.org/
> github :
https://github.com/iBotPeaches/Apktool
9 - Jadx-gui :
https://github.com/skylot/jadx
10 - dnSpy :
https://github.com/dnSpy/dnSpy
11 - Binary Ninja :
https://binary.ninja/
12 - x64dbg :
https://x64dbg.com/
❤6⚡5👏1
reverse engineering
If you are asking about this This is a solution for the owasp challenge UnCrackable-Level2 In this tutorial you will learn how to analyze full the app and understand its behavior, to bypass root detection by Frida and manually by patching the app, find the…
Some resources in the video
I am not uploading now because it is late and my battery is going to die
I am not uploading now because it is late and my battery is going to die
❤2
Media is too big
VIEW IN TELEGRAM
➜ Solving OWASP's challenge UnCrackable-Level2
➜ You can consider this video a crash course (Beginner Friendly)
➜ APK full analysis
❍ Tools and Resources :
➜ Keep Supporting Us @reverseengineer101
➜ You can consider this video a crash course (Beginner Friendly)
➜ APK full analysis
⚠ This app is made for security testing and reverse engineering propuses
❍ Tools and Resources :
🔗App link : https://mas.owasp.org/crackmes/Android/#android-uncrackable-l2
◉ Frida releases : https://github.com/frida/frida/releases/tag/16.4.8
◉ Radare2 :
https://rada.re/n/
◉ Jadx-gui :
https://github.com/skylot/jadx
◉ APKtool :
https://apktool.org/
◉ Keytool :
https://docs.oracle.com/javase/8/docs/technotes/tools/unix/keytool.html
◉ Jarsigner :
https://docs.oracle.com/javase/8/docs/technotes/tools/windows/jarsigner.html
◉ adb :
https://developer.android.com/tools/adb?hl=ar
⊷ Genymotion :
https://www.genymotion.com/
◉ Java :
https://www.java.com/en/
◉ Python :
https://www.python.org/
⊷ If you are interested about the OS (Kali Linux) :
https://www.kali.org/
➜ Keep Supporting Us @reverseengineer101
🔥11👏3👌2👍1
reverse engineering
➜ Solving OWASP's challenge UnCrackable-Level2 ➜ You can consider this video a crash course (Beginner Friendly) ➜ APK full analysis ⚠ This app is made for security testing and reverse engineering propuses ❍ Tools and Resources : 🔗App link : https://…
I will upload on YouTube ASAP
😘5❤1
Forwarded from Useful Patches
🚀 Introducing SigTool: APK Signature Analyzer Pro
SigTool is an open-source tool designed for developers and security analysts to perform in-depth APK signature analysis. It offers:
- Signature Extraction & Hash Calculation
- Java-style HashCode Calculation
- PEM Certificate Generation
🔗 GitHub Repository:
https://github.com/muhammadrizwan87/sigtool
✅ Requirements:
📦 Install:
💡 Usage:
Your feedback and contributions are welcome! If you find it helpful, don’t forget to star ⭐ the repo and share it with your peers.
━━━━━━━━━━━━━━━━━━━
♻️ Join Channel: @Android_Patches
📣 Second Channel: @TDOhex
💬 Discussion Group: @TDOhex_Discussion
━━━━━━━━━━━━━━━━━━━
SigTool is an open-source tool designed for developers and security analysts to perform in-depth APK signature analysis. It offers:
- Signature Extraction & Hash Calculation
- Java-style HashCode Calculation
- PEM Certificate Generation
🔗 GitHub Repository:
https://github.com/muhammadrizwan87/sigtool
✅ Requirements:
pkg install python aapt openssl-tool 📦 Install:
pip install sigtool 💡 Usage:
sigtool -hYour feedback and contributions are welcome! If you find it helpful, don’t forget to star ⭐ the repo and share it with your peers.
━━━━━━━━━━━━━━━━━━━
♻️ Join Channel: @Android_Patches
📣 Second Channel: @TDOhex
💬 Discussion Group: @TDOhex_Discussion
━━━━━━━━━━━━━━━━━━━
🔥2🤣2👍1
Do you know about
You can run various Linux distributions on your Windows via wsl like Ubuntu, kali linux or Arch linux
Note :
To-do :
1 - Open cmd
2 - run :
To see more info
3 - you can run
4 - To uninstall run :
Visit Microsoft official website to know more
wsl
wsl (Windows Sub-system for Linux) commandYou can run various Linux distributions on your Windows via wsl like Ubuntu, kali linux or Arch linux
Note :
This feature isn't coming as a pre-installed program with windows, so you have to install manually
To-do :
1 - Open cmd
2 - run :
wsl --help
To see more info
3 - you can run
wsl --install -d <DistroName>
4 - To uninstall run :
wsl --uninstall
Visit Microsoft official website to know more
Docs
Install WSL
Install Windows Subsystem for Linux with the command, wsl --install. Use a Bash terminal on your Windows machine run by your preferred Linux distribution - Ubuntu, Debian, SUSE, Kali, Fedora, Pengwin, Alpine, and more are available.
👍4
❤4🔥2
Useful Channels 🔥
@android_reverse
@android_reverse2
Can be a great resources for courses, tools and more 😉
@android_reverse
@android_reverse2
Can be a great resources for courses, tools and more 😉
🥰4👍3❤2🔥1
