Skip to content
#

Reverse Engineering

The process of analyzing a subject system to identify the system's components and their interrelationships and to create representations of the system in another form or at a higher level of abstraction.

Here are 3,041 public repositories matching this topic...

MrMendelli
MrMendelli commented Feb 20, 2022

Feature type

Quality of life

Describe the feature

I would like to be able to use relative paths in the launcher settings file to point to x32dbg.exe and x64dbg.exe respectively. I've already tried editing the file manually and assuming my implementation (.\/\//) isn't wrong, the launcher seemingly refuses the use of relative paths.

elliotkillick
elliotkillick commented Dec 11, 2021

Environment

Sat Dec 11 06:20:24 AM UTC 2021
rasm2 5.5.2 27280 @ linux-x86-64 git.5.5.2
commit: e65e385e5308293c23611e16e531df8c52a9ff18 build: 2021-12-11__06:31:42
Linux x86_64

Description

The opcodes jecxz and jrcxz cannot assemble.

Test

$ rasm2 -a x86 -b 64 'jecxz 0x1'
Cannot assemble 'jecxz 0x1' at line 3
invalid
$ rasm2 -a x86 -b 64 'jrcxz 0x1
cutter
RazviOverflow
RazviOverflow commented Feb 9, 2022

Environment information

  • Operating System: Linux kali 5.15.0-kali2-amd64 1 SMP Debian 5.15.5-2kali2 (2021-12-22) x86_64 GNU/Linux (Kali 2021.4)
  • Cutter version: Cutter v2.0.5-x64.Linux (AppImage)
  • Obtained from:
    • Built from source
    • Downloaded release from Cutter website or GitHub
    • Distribution repository
  • File format: ELF 64-bit LSB executable

**Describe the

The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).

  • Updated Feb 25, 2022
  • Python
Recaf