Some notes, tools, and techniques for reverse engineering Golang binaries.
Some notes/resources for bypassing anti-bot/scraping features on Cloudflare, Akamai, etc.
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code.
Some notes and techniques for reverse engineering Webpack (and a little bit about React/Vue/Angular) apps.
Figured it would make sense to create a single gist collating my previous deep dive explorations and notes.. so here it is!
- Dissecting Go Binaries
- Go: Overview of the Compiler
- Go compiler internals: adding a new statement to Go - Part 1
- Go compiler internals: adding a new statement to Go - Part 2
- Reversing GO binaries like a pro
- How a Go Program Compiles down to Machine Code
- Analyzing Golang Executables
- Go Reverse Engineering Tool Kit
- go-internals book
- [Reconstructing Program Semantics from Go Binaries](http://home.in.tum.de/
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/** | |
* run the script to a running app: frida -U "appName" -l flutter_ios.js --no-pause | |
* start app direct with the script: frida -Uf bundleIdentifier -l flutter_ios.js --no-pause | |
*/ | |
// ############################################# | |
// HELPER SECTION START | |
var colors = { | |
"resetColor": "\x1b[0m", | |
"green": "\x1b[32m", | |
"yellow": "\x1b[33m", |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
X-Forwarded-Host | |
X-Forwarded-Port | |
X-Forwarded-Scheme | |
Origin: null | |
Origin: [siteDomain].attacker.com | |
X-Frame-Options: Allow | |
X-Forwarded-For: 127.0.0.1 | |
X-Client-IP: 127.0.0.1 | |
Client-IP: 127.0.0.1 | |
---For injecting BXSS(blind XSS) || SQLI payloads--- |
NewerOlder