Requirements: JDK 11.0.X 64 bit, 64-bit OS
mod by CXV
Press Generate a Key in welcome window
- fix all integrity checks\timebomb
- Time-limited sessions fixed
- Requires an Internet connection fixed
- dexdec: fix string decrypt via emulation
- dexdec: instruction conversion recovered
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency 2 Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms...
Android App Reverse Engineering 101 is a workshop! The workshop’s goal is to give you the foundations to begin reverse engineering Android applications. While this workshop won’t teach you the details of Android app development, Android malware analysis, Android vulnerability hunting, etc., I...
0000 - nop
Moves the content of vy into vx. Both registers must be in the first 256 register range.
0110 - move v0, v1
Moves v1 into v0.
Moves the content of vy into vx. vy may be in the 64k...
Reverse Engineering: Frida for Beginners
A beginner's introduction to reverse engineering Android and windows applications using the Frida toolkit
What you'll learn
Listing process libraries
Reversing Android apps
Hooking Classes and Functions
Examining and modifying function parameters and...
The Service Pack 1 of IDA 7.6 is primarily a bug fixes release that provides fixes for a few errors that might affect many users.
IDA Installers for Apple Silicon (arm64) don't require Rosetta2 anymore and refuse to install on Intel Macs
IDA 7.7.220218 (maintenance release)
+ decompiler: improve handling of volatile reads (some were incorrectly propagated)
+ golang: apply reflection function prototypes to methods when available
+ golang: create function types from reflection metadata
+ PDB: support SP-relative...