Some notes, tools, and techniques for reverse engineering macOS binaries.
const fs = require("fs"); | |
const { SourceMapConsumer, SourceMapGenerator } = require("source-map"); | |
function reverseSourceMap(sourceMap) { | |
return SourceMapConsumer.with(sourceMap, null, (consumer) => { | |
const reversedMap = new SourceMapGenerator(); | |
consumer.eachMapping((mapping) => { | |
reversedMap.addMapping({ | |
generated: { | |
line: mapping.originalLine, |
Some notes/resources for bypassing anti-bot/scraping features on Cloudflare, Akamai, etc.
As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.
(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))
**1.
Some notes and techniques for reverse engineering Webpack (and a little bit about React/Vue/Angular) apps.
#!/bin/env python3 | |
import argparse | |
import datetime | |
import re | |
import sys | |
import uuid | |
############################################################################### | |
# Based off of Daniel Thatcher's guid tool |
I have been installing Windows for a long time. Does it get easier? I want to say it gets easier, but it seems like there's always some new wrinkle! These instructions are as much a note to my future self as they may be useful to anyone else.
For me, I was not able to get any exfat-based installs, or even any of the GUI helpers to make this process any more straightforward. Maybe on your target Windows / host OS those helpers will work, but the below process (as of current year) is consistent, and not overly complicated.
Overview:
- Downloading an official ISO image from MS:
- Formatting the drive (at least 8GB) as GPT, and one FAT-format partition (aka MS-DOS)
- Can use Disks or Disk Utilty for this
Minimalist installation of OpenBSD on the Apple M2 using QEMU
- Apple M2 running macOS Sonoma 14.4.1
- QEMU version 8.2.1
- OpenBSD 7.5 arm64
qemu-system-aarch64 -L /Applications/UTM.app/Contents/Resources/qemu -S -qmp tcp:127.0.0.1:4444,server,nowait -nodefaults -vga none -spice "unix=on,addr=/Users/edu/Library/Group Containers/WDNLXAD4W8.com.utmapp.UTM/1AEA40F1-1FDC-4EF7-9D4B-D2FA79DFC7E5.spice,disable-ticketing=on,image-compression=off,playback-compression=off,streaming-video=off,gl=off" -device virtio-ramfb -cpu host -smp cpus=2,sockets=1,cores=2,threads=1 -machine virt, -accel hvf -accel tcg,tb-size=512 -drive if=pflash,format=raw,unit=0,file=/Applications/UTM.app/Contents/Resources/qemu/edk2-aarch64-code.fd,readonly=on -drive "if=pflash,unit=1,file=/Users/edu/Library/Containers/com.utmapp.UTM/Data/Documents/OpenBSD 7.1.utm/Images/efi_vars.fd" -boot menu=on -m 2048 -name "OpenBSD 7.1" -device nec-usb-xhci,id=usb-bus -device usb-tablet,bus=usb-bus.0 -device usb-mouse,bus=usb-bus.0 -device usb-kbd,bus=usb-bus.0 -device qemu-xhci,id=usb-controller-0 -chardev spicevmc,name=usbredir,id=usbredirchardev0 -device usb-redir,chardev=usbredirchardev0,id= |