01_Reverse_Engineering
๐ฌ 01_Reverse_Engineering
SafeTest-Dev | Binary Security Research
A structured collection of reverse engineering labs covering binary analysis, malware inspection, and product security research.
๐ About This Repository
This repository is a hands-on reverse engineering research collection maintained by SafeTest-Dev. Each lab folder contains a self-contained case study targeting a specific binary, firmware, or executable artifact โ documenting the full methodology from initial reconnaissance through exploitation and remediation.
Labs are designed for:
- ๐ Security researchers and students learning binary analysis
- ๐ ๏ธ Practitioners studying real-world trust enforcement mechanisms
- ๐ Reference material for product security assessments
## ๐งช Labs Index
| # | Lab | Target | Type | Techniques | Severity |
|---|---|---|---|---|---|
| Lab01 | Secure Boot Validator | ELF 64-bit Linux Binary | Authentication Bypass | Static Disassembly, GDB, Binary Patching | ๐ด Critical |
| Lab02 | Encoded Authenticator | ELF 64-bit Linux Binary | Authentication Bypass | Static Disassembly, Radare2, XOR Decoding, Python Solver | ๐ด Critical |
| Lab03 | Algorithm Check | ELF 64-bit Linux Binary | Authentication Bypass | Static Disassembly, GDB, Radare2, XOR Decoding, Binary Patching | ๐ด Critical |
| Lab04 | Secure Loader v2.1 | PE32+ Windows Binary | Authentication Bypass | Static Disassembly, Radare2, Wine, NOP Injection, Binary Patching | ๐ด Critical |
New labs are added progressively. Each lab follows the same structured methodology.
๐ Methodology
Every lab in this repository follows a consistent analysis pipeline:
1. RECONNAISSANCE
โโโ file, checksec, readelf, strings, strace
2. STATIC ANALYSIS
โโโ objdump, Ghidra, IDA, Binary Ninja
3. DYNAMIC ANALYSIS
โโโ GDB, ltrace, strace, Frida
4. EXPLOITATION
โโโ Patch, inject, manipulate, bypass
5. DOCUMENTATION
โโโ Full report (.docx) + README + artifacts
๐ ๏ธ Common Tools Used Across Labs
| Category | Tools |
|---|---|
| Identification | file, xxd, strings, binwalk |
| Mitigations | checksec, readelf |
| Disassembly | objdump, Ghidra, IDA Pro, Binary Ninja |
| Debugging | GDB (with pwndbg/peda), ltrace, strace |
| Patching | dd, printf, python, pwntools |
| Dynamic | Frida, angr, Unicorn |
๐ Lab Types (Planned)
| Type | Description |
|---|---|
| ๐ง ELF Binary | Linux executables โ authentication, license checks, validators |
| ๐ช PE Binary | Windows executables โ keygens, CrackMe, protection schemes |
| ๐ฆ Firmware | Embedded firmware โ UART extraction, filesystem analysis |
| ๐ Shared Library | .so / .dll โ hooking, symbol hijacking |
| ๐ Scripted Payload | Python bytecode, Lua, compiled scripts |
| ๐ฑ APK / DEX | Android reverse engineering |
โ ๏ธ Disclaimer
All content in this repository is created solely for educational and authorized security research purposes under the SafeTest-Dev lab framework.
- โ All binaries analyzed are purpose-built lab samples
- โ All techniques are documented for defensive understanding
- โ Do not apply these techniques to systems without explicit written authorization
๐ค Author
Michael.A โ SafeTest-Dev
Binary | Reverse | Malware | AI
SafeTest-Dev ยฉ 2026 โ All rights reserved
01_Reverse_Engineering
- 0
- 0
- 0
- 0
- 0
- about 11 hours ago
- March 4, 2026
Sat, 04 Apr 2026 18:23:48 GMT