Tagged articles
101 articles
Page 1 of 2
Yunqi AI+
Yunqi AI+
Apr 29, 2026 · R&D Management

How to Reverse Engineer Legacy Systems for Reliable AI Coding

The article outlines a systematic reverse‑engineering process for legacy systems that extracts factual system knowledge, organizes it into AI‑consumable context, and integrates the workflow into a continuous delivery loop to improve AI draft accuracy and team cognition.

AI CodingSoftware Architectureknowledge management
0 likes · 14 min read
How to Reverse Engineer Legacy Systems for Reliable AI Coding
Black & White Path
Black & White Path
Apr 17, 2026 · Information Security

OpenAI Unveils GPT-5.4-Cyber: A Defensive Large Model for Cybersecurity

OpenAI's GPT-5.4-Cyber, released in April 2026, introduces advanced defensive capabilities such as lifted safety restrictions, binary reverse engineering, cross‑codebase reasoning, and a Trust Access System, while reshaping cybersecurity workflows, accelerating threat response, and raising new attacker risks.

AI defenseGPT-5.4-CyberOpenAI
0 likes · 6 min read
OpenAI Unveils GPT-5.4-Cyber: A Defensive Large Model for Cybersecurity
Black & White Path
Black & White Path
Apr 11, 2026 · Information Security

Why Network Security Professionals Must Reject AI‑Driven Automation

It warns that over‑reliance on AI‑based automatic penetration tools erodes manual reverse‑engineering skills, jeopardizes national cyber defense, and endangers colleagues, urging security experts to retain hands‑on expertise and avoid becoming dependent on AI.

AI ethicsCyber DefenseInformation Security
0 likes · 3 min read
Why Network Security Professionals Must Reject AI‑Driven Automation
AI Open-Source Efficiency Guide
AI Open-Source Efficiency Guide
Mar 24, 2026 · Artificial Intelligence

Uncovering Claude’s 37 Hidden Tools: A Complete Reverse‑Engineered Guide

The article documents a week‑long, cross‑platform reverse‑engineering project that catalogs over 37 undocumented internal tools in Claude.ai, describing their schemas, behavior tests, edge cases, and platform‑specific availability, and reveals that Claude actually consists of three distinct toolsets with notable fragmentation.

AI toolsArtifactsClaude
0 likes · 11 min read
Uncovering Claude’s 37 Hidden Tools: A Complete Reverse‑Engineered Guide
Black & White Path
Black & White Path
Mar 24, 2026 · Information Security

Step‑by‑Step Reconstruction of Mini‑Program/Web Encryption Authentication Bypass Cases

The article walks through six real penetration‑testing scenarios, dissecting common encryption and authentication mechanisms in mini‑programs and web applications, demonstrating how to reverse‑engineer, debug, and script the bypass of Hawk signatures, MD5 timestamps, RSA and AES encryptions to achieve unauthorized data access and account takeover.

AESAuthentication BypassHawk protocol
0 likes · 13 min read
Step‑by‑Step Reconstruction of Mini‑Program/Web Encryption Authentication Bypass Cases
Black & White Path
Black & White Path
Mar 16, 2026 · Information Security

How I Discovered and Exploited a 0‑Day in an EIS Office Platform

The article walks through setting up a Windows 2012 IIS environment, reverse‑engineering the product’s 3DES license check, analyzing web.config permissions, and uncovering multiple vulnerabilities—including SSRF, several SQL injections, and arbitrary file‑upload flaws—culminating in a full bypass of the EIS system’s authentication.

0dayEISSQL injection
0 likes · 8 min read
How I Discovered and Exploited a 0‑Day in an EIS Office Platform
AI Explorer
AI Explorer
Mar 11, 2026 · Artificial Intelligence

Unlock Programmatic Access to Google NotebookLM with notebooklm-py

The unofficial notebooklm-py library reverse‑engineers Google’s private NotebookLM API, offering a full Python and CLI interface that enables batch downloads, content export, AI‑agent integration, and automated research workflows, while outlining its architecture, quick‑start steps, suitable users, and the risk of API changes.

AICLIPython
0 likes · 7 min read
Unlock Programmatic Access to Google NotebookLM with notebooklm-py
Black & White Path
Black & White Path
Feb 19, 2026 · Information Security

How to Hard‑Code the Encryption Key of a WeChat Public Account

The article walks through a security test of a WeChat public account that uses AES‑encrypted payloads, RSA‑encrypted keys, and an MD5 signature, showing how the author first tried memory editing with Cheat Engine, then succeeded by intercepting and modifying the JavaScript in Burp Suite to fix the key, and finally summarises why front‑end encryption can be bypassed.

Burp SuiteFront-end securityJavaScript
0 likes · 7 min read
How to Hard‑Code the Encryption Key of a WeChat Public Account
IT Services Circle
IT Services Circle
Dec 14, 2025 · Mobile Development

Unlock AirPods Features on Android & Linux with LibrePods – Open‑Source Reverse‑Engineered Tool

LibrePods is an open‑source project that reverse‑engineers Apple’s proprietary AirPods protocol, enabling Android and Linux users to access native features such as active noise cancellation, ear detection, battery status, and custom transparency modes, with detailed compatibility notes, installation steps, and a public GitHub repository.

AirPodsAndroidBluetooth
0 likes · 5 min read
Unlock AirPods Features on Android & Linux with LibrePods – Open‑Source Reverse‑Engineered Tool
Deepin Linux
Deepin Linux
Aug 21, 2025 · Fundamentals

Master Debugging Stripped Executables with GDB: A Step‑by‑Step Guide

This comprehensive guide explains why debugging stripped binaries is crucial, walks through installing GDB, shows how to disassemble code, set address‑based breakpoints, inspect memory, handle signals, use advanced features like backtraces, conditional breakpoints, watchpoints, remote debugging, and even basic heap analysis for C/C++ programs.

C Programmingcore dumpdebugging
0 likes · 40 min read
Master Debugging Stripped Executables with GDB: A Step‑by‑Step Guide
Instant Consumer Technology Team
Instant Consumer Technology Team
Jul 24, 2025 · Artificial Intelligence

Inside Claude Code: How a Local AI Agent OS Was Reverse‑Engineered

An in‑depth reverse‑engineering of Anthropic’s Claude Code reveals its multi‑agent architecture, real‑time steering queue, and novel context‑compression engine, exposing the 50k+ line obfuscated JavaScript core, the Agent scheduling layers, tool ecosystem, and storage system that power this local AI coding assistant.

AI agentsClaude CodeJavaScript obfuscation
0 likes · 11 min read
Inside Claude Code: How a Local AI Agent OS Was Reverse‑Engineered
Python Crawling & Data Mining
Python Crawling & Data Mining
May 1, 2025 · Information Security

Master Frida Hooking: Advanced Android Reverse‑Engineering Techniques

This comprehensive tutorial walks through using Frida to hook Android applications, covering official API references, loading APKs, hooking normal and static methods, modifying parameters and return values, handling constructors, inner and anonymous classes, enumerating loaded classes and methods, dynamic dex loading, selective hooking, and practical examples such as programmatically clicking a login button, all illustrated with clear code snippets and explanations.

AndroidFridaHooking
0 likes · 18 min read
Master Frida Hooking: Advanced Android Reverse‑Engineering Techniques
Python Crawling & Data Mining
Python Crawling & Data Mining
Apr 26, 2025 · Information Security

Master Frida: Step-by-Step Guide to Hook Android Apps with Python

This tutorial walks you through setting up a Python virtual environment, installing Frida and frida‑server on a rooted Android device, configuring the server, verifying the connection, and writing JavaScript hooks to intercept login functions, complete with code snippets, command examples, and troubleshooting tips.

AndroidFridaHooking
0 likes · 11 min read
Master Frida: Step-by-Step Guide to Hook Android Apps with Python
Deepin Linux
Deepin Linux
Aug 19, 2024 · Fundamentals

Using GDB to Debug Executables Without Debug Information

This article provides a comprehensive guide on how to employ GDB for debugging programs that lack symbol information, covering basic commands, breakpoint techniques, core‑dump analysis, reverse debugging, and a practical example of integrating VSCode, GDB, and QEMU to debug an ARM64 Linux kernel.

kernelno-debug-inforeverse engineering
0 likes · 33 min read
Using GDB to Debug Executables Without Debug Information
IT Services Circle
IT Services Circle
Jul 15, 2024 · Fundamentals

Understanding Stack Pointer Corruption When Mixing RSP and ESP in 64‑bit Windows: A Reverse‑Engineering Case Study

The article analyzes a crash that occurs on Windows 10 when a 64‑bit program mixes RSP and ESP instructions, explains how writing to the 32‑bit ESP register zero‑extends the upper 32 bits of RSP, and shows how this stack‑pointer mismatch leads to an access‑violation error that does not appear on Windows 7.

AssemblyWindowsdebugging
0 likes · 6 min read
Understanding Stack Pointer Corruption When Mixing RSP and ESP in 64‑bit Windows: A Reverse‑Engineering Case Study
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jul 13, 2024 · Information Security

OpenCoreAnalysisKit: Open‑Source Offline Memory Core File Analysis Suite for Android

This article introduces the OpenCoreAnalysisKit project, an open‑source suite for offline analysis of Android Core memory files across multiple architectures, detailing its components, build requirements, usage guides for kernel‑ and user‑mode debugging, and various command‑line tools and code snippets for comprehensive reverse‑engineering and memory‑analysis workflows.

AndroidMemory analysiscore dump
0 likes · 20 min read
OpenCoreAnalysisKit: Open‑Source Offline Memory Core File Analysis Suite for Android
Python Programming Learning Circle
Python Programming Learning Circle
Jun 24, 2024 · Backend Development

Technical Overview of Ticket‑Grabbing: Selenium Automation and API Reverse Engineering

This article explains the ticket‑purchasing workflow, identifies critical timing points for successful ticket grabbing, and presents two common technical approaches—browser automation with Selenium and reverse‑engineering ticket‑booking APIs—to automate the process, while warning about limitations and legal considerations.

PythonSeleniumreverse engineering
0 likes · 6 min read
Technical Overview of Ticket‑Grabbing: Selenium Automation and API Reverse Engineering
Java Tech Enthusiast
Java Tech Enthusiast
Jun 9, 2024 · Information Security

Exploring Hidden x86 CPU Instructions and Their Security Implications

The article investigates undocumented x86 opcodes, describing a depth‑first search that uses page‑faults to locate hidden instruction boundaries, and reports finding dozens of executable but undocumented instructions on Intel and AMD CPUs, highlighting potential security risks and the need for vigilant hardware analysis.

AssemblyCPUhidden instructions
0 likes · 9 min read
Exploring Hidden x86 CPU Instructions and Their Security Implications
Liangxu Linux
Liangxu Linux
May 8, 2024 · Fundamentals

Bypassing WeChat’s Singleton Check: Run Multiple Instances on Windows

This guide explains how a simple batch file can launch two or more WeChat instances on Windows by analyzing the app’s global mutex mechanism, reverse‑engineering the related DLL functions, and showing why the rapid start‑up bypasses the built‑in single‑instance guard.

BatchSingletonWeChat
0 likes · 6 min read
Bypassing WeChat’s Singleton Check: Run Multiple Instances on Windows
Python Programming Learning Circle
Python Programming Learning Circle
Apr 23, 2024 · Fundamentals

How to Decompile a Python .exe Back to Python Source Code

This guide explains how to extract .pyc files from a Python‑generated executable, restore missing bytecode headers, and use tools such as pyinstxtractor, pyi‑archive_viewer, and uncompyle6 to decompile the bytecode back into readable Python scripts while highlighting common pitfalls and protection mechanisms.

ExecutablePythonbytecode
0 likes · 12 min read
How to Decompile a Python .exe Back to Python Source Code
OPPO Amber Lab
OPPO Amber Lab
Nov 30, 2023 · Information Security

Uncovering Android Socket Service Vulnerabilities: Techniques and Case Study

This article details the methodology for discovering and analyzing Android local socket service vulnerabilities, outlines prerequisite skills, explains service classifications, demonstrates data‑handling function tracing, and presents a CVE‑2023‑35694 case study, highlighting common flaw types and mitigation insights.

AndroidCVESocket
0 likes · 8 min read
Uncovering Android Socket Service Vulnerabilities: Techniques and Case Study
Tencent Cloud Developer
Tencent Cloud Developer
Nov 2, 2023 · Artificial Intelligence

Reverse Engineering GitHub Copilot: Architecture and Implementation Analysis

The article reverse‑engineers GitHub Copilot’s VSCode extension, detailing how its webpack‑bundled JavaScript is unpacked, its registerGhostText entry point identified, and its prompt‑building, multi‑layer caching, debouncing, and Jaccard‑based similarity mechanisms operate, offering insights into AI‑assisted code completion design.

AI programming assistantGitHub CopilotJaccard similarity
0 likes · 31 min read
Reverse Engineering GitHub Copilot: Architecture and Implementation Analysis
Alipay Experience Technology
Alipay Experience Technology
Sep 8, 2023 · Mobile Development

Uncovering the iOS 16 Keyboard Crash: Root Cause, Reverse‑Engineered Fix, and Zero‑Crash Deployment

This article details how a hidden memory‑management bug in iOS 16’s keyboard component caused massive crashes in the Alipay app, explains the reverse‑engineering process that identified the faulty UIKeyboardTaskQueue logic, and describes the assembly‑level patch that eliminated the issue across millions of devices.

AssemblyCrashKeyboard
0 likes · 27 min read
Uncovering the iOS 16 Keyboard Crash: Root Cause, Reverse‑Engineered Fix, and Zero‑Crash Deployment
37 Interactive Technology Team
37 Interactive Technology Team
May 8, 2023 · Information Security

Android Reverse Engineering: Process, Tools, and Code Examples

Android reverse engineering involves extracting an APK, decompiling it with tools like apktool, dex2jar, or JADX, analyzing and modifying Smali or Java code, recompiling and signing the package with jarsigner, and testing the changes, while using adb commands to retrieve the original file and emphasizing deeper analysis for robust security.

APKAPKToolAndroid
0 likes · 10 min read
Android Reverse Engineering: Process, Tools, and Code Examples
360 Tech Engineering
360 Tech Engineering
Apr 21, 2023 · Information Security

FirmAE: Automated Firmware Emulation and Vulnerability Analysis – Installation, Usage, and Zyxel Router Case Study

This article introduces FirmAE, an automated framework for firmware emulation and vulnerability analysis, details its installation and usage steps on Ubuntu, and presents a comprehensive reverse‑engineering case study of a Zyxel router firmware to illustrate troubleshooting and manual analysis techniques.

EmulationFirmAEIoT security
0 likes · 8 min read
FirmAE: Automated Firmware Emulation and Vulnerability Analysis – Installation, Usage, and Zyxel Router Case Study
21CTO
21CTO
Jan 3, 2023 · Artificial Intelligence

Inside GitHub Copilot: How Prompts, Models, and Telemetry Really Work

A University of Illinois researcher reverse‑engineers GitHub Copilot, revealing how its VS Code extension builds complex prompts, selects models, manages telemetry, and decides which suggestions to display, while exposing configuration details, prompt‑engineering pipelines, model calls, and privacy implications for developers.

GitHub CopilotModel Internalsprompt engineering
0 likes · 19 min read
Inside GitHub Copilot: How Prompts, Models, and Telemetry Really Work
HomeTech
HomeTech
Aug 11, 2022 · Fundamentals

Mach-O File Format: Dynamic and Static Library Attribution and API Scanning Solutions

This article introduces the Mach-O executable format, explains how its structure can be leveraged to attribute dynamic and static libraries at runtime and during build, and presents two practical projects—library attribution and fast API scanning—complete with implementation details and code snippets.

API scanningMach-Obinary analysis
0 likes · 15 min read
Mach-O File Format: Dynamic and Static Library Attribution and API Scanning Solutions
Open Source Linux
Open Source Linux
Aug 3, 2022 · Information Security

Unmasking a Fake GitHub Leak: From Weak Passwords to a Red Team Backdoor

During a penetration testing exercise, the team discovered a cleverly disguised GitHub repository that leaked credentials, leading to a vulnerable admin interface, a malicious Python‑based VPN client which, after reverse‑engineering with PyInstaller extraction, revealed embedded shellcode hidden in images, allowing the attackers to trace the command‑and‑control server and pinpoint the origin of the intrusion.

Information SecuritygitHub leakagemalware analysis
0 likes · 7 min read
Unmasking a Fake GitHub Leak: From Weak Passwords to a Red Team Backdoor
Python Crawling & Data Mining
Python Crawling & Data Mining
Jun 21, 2022 · Information Security

Master Frida: Hook Android Apps with Advanced Techniques

This tutorial walks you through using Frida to hook Android applications, covering API basics, method interception, constructor and field manipulation, overload handling, dynamic class loading, and practical code snippets for both static and instance methods, all while emphasizing safe, educational use.

AndroidFridaHooking
0 likes · 19 min read
Master Frida: Hook Android Apps with Advanced Techniques
Liangxu Linux
Liangxu Linux
May 12, 2022 · Information Security

Do CPUs Hide Secret Instructions? Uncovering the Dark Corners of the x86 ISA

This article explores whether modern CPUs contain undocumented or hidden instructions, explains the challenges of searching the variable‑length x86 ISA, presents a depth‑first algorithm that skips irrelevant bytes, shows how to infer instruction length using page‑fault side‑effects, and reveals discovered hidden opcodes on Intel and AMD processors.

CPUInstruction Sethidden instructions
0 likes · 10 min read
Do CPUs Hide Secret Instructions? Uncovering the Dark Corners of the x86 ISA
IT Services Circle
IT Services Circle
Apr 15, 2022 · Information Security

Exploring Hidden x86 CPU Instructions and Their Security Implications

The article investigates whether modern x86 CPUs contain undocumented or hidden instructions, explains how to search the instruction space using a depth‑first algorithm that leverages page‑fault side‑effects to determine instruction length, and presents the results of uncovering such hidden opcodes on Intel and AMD processors, highlighting the potential security risks.

CPUhidden instructionsreverse engineering
0 likes · 11 min read
Exploring Hidden x86 CPU Instructions and Their Security Implications
High Availability Architecture
High Availability Architecture
Mar 11, 2022 · Information Security

Technical Analysis of Y‑BotManager Anti‑Spam Mechanism and SensorData Reverse Engineering

This article presents a detailed technical analysis of the Y‑BotManager anti‑spam system, describing its architecture, the reverse‑engineering process of its SensorData generation, the device and user‑interaction features used for bot detection, and the practical attempts to bypass the protection.

BotnetFingerprintingInformation Security
0 likes · 12 min read
Technical Analysis of Y‑BotManager Anti‑Spam Mechanism and SensorData Reverse Engineering
IT Services Circle
IT Services Circle
Feb 22, 2022 · Backend Development

Understanding RPC and Its Use in Web Reverse Engineering with Sekiro

This article explains the concept of Remote Procedure Call (RPC), demonstrates how to apply RPC for web reverse engineering by injecting JavaScript through WebSocket communication, and introduces the Sekiro framework and related tools for automating encryption parameter retrieval in browser environments.

JavaScriptRPCSekiro
0 likes · 15 min read
Understanding RPC and Its Use in Web Reverse Engineering with Sekiro
Meituan Technology Team
Meituan Technology Team
Nov 25, 2021 · Information Security

Analysis of Apple FairPlay DRM: Architecture, Obfuscation Techniques, and Weaknesses

The article dissects Apple’s FairPlay DRM, detailing its kernel‑driver and daemon decryption workflow, the LC_ENCRYPTION_INFO metadata, per‑user licensing files, LLVM‑level obfuscation techniques such as opaque predicates and control‑flow flattening, and the identified weaknesses that enable reverse‑engineering and key extraction.

DRMFairPlayObfuscation
0 likes · 18 min read
Analysis of Apple FairPlay DRM: Architecture, Obfuscation Techniques, and Weaknesses
21CTO
21CTO
Nov 24, 2021 · Information Security

How Parents Built an Open‑Source School App to Beat a $117M Failure

Swedish parents, frustrated by the costly and unusable official Skolplattformen app, reverse‑engineered its API and released the open‑source Öppna Skolplattformen, sparking legal battles, privacy debates, and a community‑driven alternative that now serves thousands of families.

Information SecuritySwedenprivacy
0 likes · 12 min read
How Parents Built an Open‑Source School App to Beat a $117M Failure
Sohu Tech Products
Sohu Tech Products
Oct 20, 2021 · Information Security

Overview of Android App Hardening and Unpacking Techniques Across Generations

This article provides a comprehensive overview of Android app hardening methods, detailing the evolution from first‑generation dex and so protection to advanced code virtualization, and outlines various unpacking (脱壳) techniques—including memory dump, dynamic debugging, hook‑based and custom ROM approaches—used to bypass these protections.

AndroidDEXFrida
0 likes · 11 min read
Overview of Android App Hardening and Unpacking Techniques Across Generations
Open Source Linux
Open Source Linux
Oct 7, 2021 · Fundamentals

Inside Apple’s M1 Chip: A 350‑Page Reverse‑Engineering Deep Dive

A former Apple developer has released a 350‑page reverse‑engineering report that dissects the M1 ARM chip’s architecture, performance, and cache design, offering detailed experiments, patent analysis, and insights for readers with strong CPU knowledge while highlighting the challenges of opening Apple’s closed hardware ecosystem.

ARM architectureApple M1CPU analysis
0 likes · 5 min read
Inside Apple’s M1 Chip: A 350‑Page Reverse‑Engineering Deep Dive
Tongcheng Travel Technology Center
Tongcheng Travel Technology Center
Aug 27, 2021 · Information Security

JavaTweakHook: A Lightweight Android Java Method Hook Framework without Xposed

The article introduces JavaTweakHook, a lightweight Android hook framework that avoids Xposed by directly manipulating ART structures, compares it with existing solutions, details the hook process—including method creation, ArtMethod copying, assembly trampolines, and native‑Java integration—and provides compilation, usage, and limitation notes.

AndroidHookjava
0 likes · 15 min read
JavaTweakHook: A Lightweight Android Java Method Hook Framework without Xposed
Liangxu Linux
Liangxu Linux
Mar 20, 2021 · Game Development

How a Hacker Cut GTA Online’s Loading Time by 70% Using Code Hooks

A reverse‑engineer discovered that GTA Online’s slow startup stems from an inefficient if‑loop that scans a 10 MB JSON file 1.98 billion times, and by hooking strlen and replacing the loop with a hash‑map, reduced load times from six minutes to under two minutes.

GTA Onlinecode hookinggame loading
0 likes · 6 min read
How a Hacker Cut GTA Online’s Loading Time by 70% Using Code Hooks
MaGe Linux Operations
MaGe Linux Operations
Feb 3, 2021 · Information Security

Reverse Engineering and Patching Python .pyd Modules with IDA

This guide explains how to compile Python code into .pyd files, unpack PyInstaller‑packed executables, decompile bytecode, analyze the generated assembly in IDA, and patch conditional logic to bypass license checks, providing a practical workflow for binary reverse engineering.

IDAPythonbinary patching
0 likes · 8 min read
Reverse Engineering and Patching Python .pyd Modules with IDA
Sohu Tech Products
Sohu Tech Products
Jan 13, 2021 · Mobile Development

Understanding Hook Techniques and Fishhook Implementation on iOS

This article explains the fundamentals of hooking on iOS, covering Method Swizzle and Facebook's fishhook, detailing the Mach‑O file structure, PIC technique, and providing complete source code examples that demonstrate how to replace system functions such as NSLog at runtime.

FishhookHookMach-O
0 likes · 22 min read
Understanding Hook Techniques and Fishhook Implementation on iOS
ITPUB
ITPUB
Dec 9, 2020 · Fundamentals

ImHex: The Vision‑Friendly Open‑Source Hex Editor Taking GitHub by Storm

ImHex is a rapidly popular open‑source hex editor designed for eye‑friendly binary editing, offering features such as hex view, byte patching, custom language support, multi‑architecture disassembly, data import/export, and a sleek dark‑theme UI, with compilation instructions for Windows and Linux provided.

c++hex editorreverse engineering
0 likes · 7 min read
ImHex: The Vision‑Friendly Open‑Source Hex Editor Taking GitHub by Storm
Efficient Ops
Efficient Ops
Aug 17, 2020 · Information Security

How to Analyze and Reproduce an Nginx Backdoor: Step‑by‑Step Guide

This article walks through the discovery, reverse‑engineering, and full reproduction of a malicious Nginx backdoor, detailing its cookie‑based trigger, shell‑reversal mechanism, code analysis, compilation steps, and detection methods for security researchers.

backdoorreverse engineeringreverse shell
0 likes · 9 min read
How to Analyze and Reproduce an Nginx Backdoor: Step‑by‑Step Guide
Architects Research Society
Architects Research Society
Aug 10, 2020 · Information Security

Awesome Penetration Testing Resources and Tools

This article compiles a comprehensive, categorized collection of penetration testing resources—including anonymity tools, antivirus evasion utilities, books, CTF frameworks, Docker containers, network analysis tools, OSINT platforms, and more—providing security professionals and researchers with a valuable reference for offensive security engagements.

CTFDockerOSINT
0 likes · 36 min read
Awesome Penetration Testing Resources and Tools
360 Quality & Efficiency
360 Quality & Efficiency
Jul 24, 2020 · Mobile Development

Static Analysis of Android APK Files Using Python and Androguard

This article explains how to perform static analysis of Android APK files with Python, covering environment preparation, unpacking the APK, extracting basic metadata, analyzing classes and methods using the Androguard library, and generating a method call graph for deeper reverse‑engineering insights.

APKAndroguardAndroid
0 likes · 7 min read
Static Analysis of Android APK Files Using Python and Androguard
Sohu Tech Products
Sohu Tech Products
Jun 17, 2020 · Information Security

Analyzing and Removing Dead Code and Flower‑Instruction Obfuscation from JavaScript

This tutorial explains how to recognize and eliminate dead code and flower‑instruction obfuscation techniques in JavaScript, walks through using Obfuscator.io to generate heavily mixed code, and demonstrates step‑by‑step static analysis to strip away useless statements, ultimately restoring the original concise logic.

Dead CodeInformation SecurityObfuscation
0 likes · 12 min read
Analyzing and Removing Dead Code and Flower‑Instruction Obfuscation from JavaScript
Liangxu Linux
Liangxu Linux
May 14, 2020 · Information Security

Master Linux Binary Analysis: 10 Essential Commands Explained

This guide introduces ten fundamental Linux commands—file, ldd, ltrace, strace, hexdump, strings, readelf, objdump, nm, and gdb—explaining how each tool reveals a binary's type, dependencies, function calls, raw bytes, symbols, and runtime behavior for effective reverse‑engineering and debugging.

binary analysisfile commandgdb
0 likes · 14 min read
Master Linux Binary Analysis: 10 Essential Commands Explained
macrozheng
macrozheng
Apr 27, 2020 · Databases

Master Database Design with Navicat: A Step‑by‑Step Guide

This tutorial walks you through using Navicat 12 to design, relate, and export a database schema for a mall permission management module, covering model opening, table creation, foreign‑key setup, auto‑layout, SQL export, and reverse engineering with clear screenshots.

Database designForeign KeysNavicat
0 likes · 7 min read
Master Database Design with Navicat: A Step‑by‑Step Guide
21CTO
21CTO
Mar 22, 2020 · Information Security

Fake WeChat App Exposes Security Flaws: From Reverse Engineering to Criminal Conviction

A Chinese court case reveals how a reverse‑engineered, unauthorized WeChat client for feature phones spread illegal ads, compromised encrypted communications, and led to criminal charges for providing tools to infiltrate computer systems, highlighting serious information‑security risks and the legal consequences of software piracy.

ChinaInformation SecuritySoftware Piracy
0 likes · 8 min read
Fake WeChat App Exposes Security Flaws: From Reverse Engineering to Criminal Conviction
Architects Research Society
Architects Research Society
Sep 19, 2019 · Information Security

Awesome Penetration Testing Resources and Tools

This comprehensive collection presents a curated list of penetration testing resources—including anonymity tools, antivirus‑evasion utilities, books, CTF frameworks, Docker containers for vulnerable systems, network analysis utilities, OSINT services, reverse‑engineering tools, and security education materials—providing security professionals and researchers with a valuable reference for offensive security testing and learning.

CTFDockerInfoSec
0 likes · 36 min read
Awesome Penetration Testing Resources and Tools
Tencent TDS Service
Tencent TDS Service
Mar 28, 2019 · Mobile Development

How to Harden Android Apps: Anti‑Debugging Techniques for Java & NDK

This article explains practical anti‑debugging methods for Android applications—covering Java tools like Proguard and debugger checks, as well as NDK strategies such as ptrace, file‑node monitoring, Inotify, SO hash verification, and timing analysis—to raise reverse‑engineering difficulty.

AndroidAnti-debuggingApp Security
0 likes · 7 min read
How to Harden Android Apps: Anti‑Debugging Techniques for Java & NDK
MaGe Linux Operations
MaGe Linux Operations
Nov 15, 2018 · Information Security

Top 123 Python Tools for Pen Testing, Reverse Engineering & Forensics

A comprehensive, curated list of 123 Python-based security tools spans network analysis, debugging, reverse engineering, fuzzing, web testing, forensics, malware analysis, PDF inspection, miscellaneous utilities, plus recommended libraries, books, and learning resources for penetration testers and security researchers.

Forensicsfuzzingpenetration testing
0 likes · 16 min read
Top 123 Python Tools for Pen Testing, Reverse Engineering & Forensics
360 Tech Engineering
360 Tech Engineering
Jul 27, 2018 · Fundamentals

Detailed Analysis of the ELF File Format (Part 2)

This article provides an in‑depth overview of the ELF file format, describing its headers, section and program tables, symbol structures, and demonstrates how to use this knowledge to locate and hook functions in Android native libraries such as libmedia.so.

AndroidBinary FormatELF
0 likes · 7 min read
Detailed Analysis of the ELF File Format (Part 2)
Baidu Intelligent Testing
Baidu Intelligent Testing
Jun 19, 2018 · Information Security

Comprehensive Guide to Android App Security, Reverse Engineering, and Protection Techniques

This article presents a detailed overview of Android app security threats, the essential components of an Android project, the full APK build and decompilation process, and a range of reverse‑engineering tools and protection strategies—including Smali analysis, SO manipulation, and signing bypass—to help developers safeguard their applications against piracy and data tampering.

APKAndroidApp Security
0 likes · 13 min read
Comprehensive Guide to Android App Security, Reverse Engineering, and Protection Techniques
Qizhuo Club
Qizhuo Club
Feb 9, 2018 · Fundamentals

Unlocking Android's ELF Files: A Beginner's Guide to the Binary Format

This article introduces the ELF file format used in Linux and Android, explains its three main types, compares it to Windows PE, and outlines how linkers and loaders interpret ELF headers, sections, and segments for native development and reverse engineering.

AndroidELFNative Development
0 likes · 8 min read
Unlocking Android's ELF Files: A Beginner's Guide to the Binary Format
Efficient Ops
Efficient Ops
Dec 17, 2017 · Information Security

How Android Security Works: Threats, Models, and Protection Strategies

This article examines the current Android security landscape, outlines the platform's security model, discusses program, data, and system vulnerabilities, analyzes a tampered APK case study, and presents comprehensive protection techniques such as obfuscation, shelling, and integrity verification.

APK protectionAndroidMobile Security
0 likes · 11 min read
How Android Security Works: Threats, Models, and Protection Strategies
MaGe Linux Operations
MaGe Linux Operations
Aug 12, 2017 · Information Security

123 Essential Python Tools for Penetration Testing and Security Research

This article compiles a comprehensive list of 123 Python-based penetration testing tools, covering network utilities, debugging and reverse‑engineering frameworks, fuzzing platforms, web testing kits, forensic analysis utilities, malware analysis helpers, PDF inspection modules, miscellaneous libraries, recommended books, talks, and additional resources for security professionals.

ForensicsPythonfuzzing
0 likes · 17 min read
123 Essential Python Tools for Penetration Testing and Security Research
Hujiang Technology
Hujiang Technology
Aug 7, 2017 · Frontend Development

Reverse Engineering a One‑Line JavaScript Animation: Step‑by‑Step Explanation

This article walks through the reverse‑engineering of a compact JavaScript one‑liner that draws a patterned image, refactors it into readable modules, explains each transformation—including variable renaming, loop conversion, ternary expansion, bitwise operations, and switch‑case replacement—while illustrating the underlying math with graphs and code snippets.

HTMLJavaScriptalgorithm analysis
0 likes · 18 min read
Reverse Engineering a One‑Line JavaScript Animation: Step‑by‑Step Explanation
Efficient Ops
Efficient Ops
Nov 7, 2016 · Operations

How to Train New SREs Effectively: Proven Practices and Playbooks

This article outlines a systematic approach to onboarding and training new Site Reliability Engineers, covering trust building, readiness assessment, diverse learning methods, structured curricula, on‑call milestones, project‑focused work, reverse‑engineering skills, statistical thinking, and improvisation techniques to develop high‑performing SRE teams.

On-CallOperationsSRE
0 likes · 17 min read
How to Train New SREs Effectively: Proven Practices and Playbooks
Qunar Tech Salon
Qunar Tech Salon
Aug 13, 2016 · Information Security

Android App Security Risks and Protection Strategies Presented at Qunar Tech Carnival

The article outlines common Android security vulnerabilities such as unprotected resources, easily decompiled Java and native code, and proposes protection measures like resource obfuscation, code encryption, native code hardening, and introduces the Qotector platform for APK analysis and reinforcement.

APK analysisMobile Securityapp protection
0 likes · 7 min read
Android App Security Risks and Protection Strategies Presented at Qunar Tech Carnival
ITPUB
ITPUB
May 11, 2016 · Information Security

Uncovering a Hidden Compiler Backdoor on a 3B2 System – A Day‑by‑Day Debugging Saga

A programmer hired to fix a quirky questionnaire program on an old 3B2 machine discovers that the source code repeatedly reverts, the curses library is tampered, and ultimately a malicious compiler injects backdoor code, leading to a multi‑day forensic investigation and replacement of the toolchain.

Information Securitycompilercurses
0 likes · 9 min read
Uncovering a Hidden Compiler Backdoor on a 3B2 System – A Day‑by‑Day Debugging Saga
21CTO
21CTO
Dec 17, 2015 · Mobile Development

How Qingting FM Tricks DAU Metrics: Inside Its Hidden Android Processes

This article dissects Qingting FM’s Android app, revealing how it spawns multiple background services, launches invisible activities, and uses hidden WebViews to fake daily active users and ad impressions, while providing step‑by‑step reverse‑engineering instructions for developers.

Ad FraudAndroidDAU manipulation
0 likes · 12 min read
How Qingting FM Tricks DAU Metrics: Inside Its Hidden Android Processes