Have you been interested in #reverseengineering but don't know where to begin or what tools to use? Are you still stuck in OllyDBG? Our researcher @pastaCLS recommends the coolest tools you'll see out there. Plus, our team uses them to defeat protection💙
#Ghidra is useful for static analysis of binaries; it disassembles and decompiles to "C pseudo code." It supports a lot of architecture, has hundreds of plugins from the community and, last but not least, an active community.💪 ghidra-sre.org
@x64dbg is a debugger for Windows x86 and x64, perfect for analyzing the behavior of the program while running and freezing it in specific points to examine a feature. x64dbg.com
R2, radare is a reverse engineering framework with multiple tools. Its learning curve is hard, but it is worth it. These tools allow you to analyze binaries in almost any operating system or architecture. github.com/radareorg/rada…
At the end of our list is #Bugchecker which is a debugger for the Windows kernel; this tool works similarly to the old and famous softICE. github.com/vitoplantamura…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Let's talk about security into the software development lifecycle. #DevSecOps help you identify and mitigate #security risks early in the development process, reducing the chance of a breach and improving the overall security of their apps. 🔒
This means designing security into the development process from the start. Here are some best practices for implementing #DevSecOps in your organization:⤵️
1) Shift left: Incorporate security early in the development process by integrating security testing, security-focused code review process and analysis tools into the continuous integration and continuous delivery (CI/CD) pipeline. Security from design to deployment.🔄