Day 1 of 365: Mastering Pentesting with LazyOwn RedTeam - Daily Command ...
Hello everyone! In this 20-minute episode, we will build a disassembler for the x86-64 architecture entirely from scratch using Python. This project is released under the GPL v3 license and will be an invaluable tool for anyone interested in reverse engineering, binary analysis, or cybersecurity.
[0:00] Introduction
[1:00] Chapter 1: Setting Up the Disassembler Class
[3:30] Chapter 2: Parsing ELF Headers
[6:45] Chapter 3: Decoding ModR/M and SIB Bytes
[9:20] Chapter 4: Operand String Representation
[12:10] Chapter 5: Disassembling Instructions
[14:30] Compiling and Testing the Disassembler
[16:45] Integration with LazyOwn RedTeam Framework
[19:00] Closing Remarks and Downloads
Download the latest version of LazyOwn:
[+] Github: https://github.com/grisuno/LazyOwn
[+] Web: https://grisuno.github.io/LazyOwn/
[+] Reddit: https://www.reddit.com/r/LazyOwn/
[+] Facebook: https://web.facebook.com/profile.php?id=61560596232150
[+] HackTheBox: https://app.hackthebox.com/teams/overview/6429
[+] Grisun0 Profile: https://app.hackthebox.com/users/1998024
[+] Patreon: https://patreon.com/LazyOwn
If you enjoyed this content, please give it a LIKE, SUBSCRIBE to the channel, and hit the BELL ICON to stay updated on future videos. Your support helps me continue creating free, high-quality, GPL-licensed content!
#Disassembler #Python #ReverseEngineering #Cybersecurity #GPLv3 #LazyOwn
Comentarios
Publicar un comentario