This is a write-up of the reverse engineering challenge from the 2019 BambooFox CTF competition. It provides a detailed explanation of the challenge and its solution. The write-up includes a step-by-step guide on how to reverse engineer the challenge, as well as insights into the techniques and tools used to solve it. This resource is suitable for anyone interested in reverse engineering and wants to learn from a real-world example.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A better version of my xssfinder tool that scans for different types of XSS on a list of URLs.
VxSig is a tool to automatically generate AV byte signatures from similar binaries.
Tools for working with Android .dex and Java .class files, including dex-reader/writer, d2j-dex2jar, and smali/baksmali.
A backend agnostic debugger frontend for debugging binaries without source code access.
Collection of Python scripts for automating tasks and enhancing IDA Pro functionality
A serverless, real-time, and retroactive malware detection tool that scans files with YARA rules and alerts incident response teams.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.