- Dissecting Go Binaries
- Go: Overview of the Compiler
- Go compiler internals: adding a new statement to Go - Part 1
- Go compiler internals: adding a new statement to Go - Part 2
- Reversing GO binaries like a pro
- How a Go Program Compiles down to Machine Code
- Analyzing Golang Executables
- Go Reverse Engineering Tool Kit
- go-internals book
- [Reconstructing Program Semantics from Go Binaries](http://home.in.tum.de/
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
^C[*] /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:72:in `initialize': Interrupt | |
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:72:in `new' | |
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:72:in `sign_jar' | |
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:119:in `generate_jar' | |
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:38:in `generate' | |
from /usr/share/metasploit-framework/lib/msf/core/payload.rb:203:in `size' | |
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:158:in `block (2 levels) in recalculate' | |
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:102:in `each_pair' | |
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:102:in `block in recalculate' | |
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:98:in `each_pair' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
All values are hexadecimal. | |
If [reg32] is [esp] add 24 at the end. | |
00 00-3f add [reg32],reg8 | |
00 40-7f xx add [reg32+xx],reg8 | |
01 00-3f add [reg32],reg32 | |
01 40-7f xx add [reg32+xx],reg32 | |
01 c0-ff add reg32,reg32 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# objdump --stabs hello.o | |
hello.o: file format elf64-x86-64 | |
Contents of .stab section: | |
Symnum n_type n_othr n_desc n_value n_strx String | |
-1 HdrSym 0 134 000000000000119e 1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <string.h> | |
#include <r_types.h> | |
#include <r_lib.h> | |
#include <r_asm.h> | |
#include <r_anal.h> | |
#include "../../asm/arch/tricore/gnu/tricore-opc.c" | |
static int tricore_anop(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) { |