01_Reverse_Engineering

๐Ÿ”ฌ 01_Reverse_Engineering

SafeTest-Dev | Binary Security Research
A structured collection of reverse engineering labs covering binary analysis, malware inspection, and product security research.


๐Ÿ“– About This Repository

This repository is a hands-on reverse engineering research collection maintained by SafeTest-Dev. Each lab folder contains a self-contained case study targeting a specific binary, firmware, or executable artifact โ€” documenting the full methodology from initial reconnaissance through exploitation and remediation.

Labs are designed for:

  • ๐ŸŽ“ Security researchers and students learning binary analysis
  • ๐Ÿ› ๏ธ Practitioners studying real-world trust enforcement mechanisms
  • ๐Ÿ“‹ Reference material for product security assessments

## ๐Ÿงช Labs Index

# Lab Target Type Techniques Severity
Lab01 Secure Boot Validator ELF 64-bit Linux Binary Authentication Bypass Static Disassembly, GDB, Binary Patching ๐Ÿ”ด Critical
Lab02 Encoded Authenticator ELF 64-bit Linux Binary Authentication Bypass Static Disassembly, Radare2, XOR Decoding, Python Solver ๐Ÿ”ด Critical
Lab03 Algorithm Check ELF 64-bit Linux Binary Authentication Bypass Static Disassembly, GDB, Radare2, XOR Decoding, Binary Patching ๐Ÿ”ด Critical
Lab04 Secure Loader v2.1 PE32+ Windows Binary Authentication Bypass Static Disassembly, Radare2, Wine, NOP Injection, Binary Patching ๐Ÿ”ด Critical

New labs are added progressively. Each lab follows the same structured methodology.


๐Ÿ” Methodology

Every lab in this repository follows a consistent analysis pipeline:

1. RECONNAISSANCE
   โ””โ”€โ”€ file, checksec, readelf, strings, strace

2. STATIC ANALYSIS
   โ””โ”€โ”€ objdump, Ghidra, IDA, Binary Ninja

3. DYNAMIC ANALYSIS
   โ””โ”€โ”€ GDB, ltrace, strace, Frida

4. EXPLOITATION
   โ””โ”€โ”€ Patch, inject, manipulate, bypass

5. DOCUMENTATION
   โ””โ”€โ”€ Full report (.docx) + README + artifacts

๐Ÿ› ๏ธ Common Tools Used Across Labs

Category Tools
Identification file, xxd, strings, binwalk
Mitigations checksec, readelf
Disassembly objdump, Ghidra, IDA Pro, Binary Ninja
Debugging GDB (with pwndbg/peda), ltrace, strace
Patching dd, printf, python, pwntools
Dynamic Frida, angr, Unicorn

๐Ÿ“‚ Lab Types (Planned)

Type Description
๐Ÿง ELF Binary Linux executables โ€” authentication, license checks, validators
๐ŸชŸ PE Binary Windows executables โ€” keygens, CrackMe, protection schemes
๐Ÿ“ฆ Firmware Embedded firmware โ€” UART extraction, filesystem analysis
๐Ÿ”Œ Shared Library .so / .dll โ€” hooking, symbol hijacking
๐Ÿ Scripted Payload Python bytecode, Lua, compiled scripts
๐Ÿ“ฑ APK / DEX Android reverse engineering

โš ๏ธ Disclaimer

All content in this repository is created solely for educational and authorized security research purposes under the SafeTest-Dev lab framework.

  • โœ… All binaries analyzed are purpose-built lab samples
  • โœ… All techniques are documented for defensive understanding
  • โŒ Do not apply these techniques to systems without explicit written authorization

๐Ÿ‘ค Author

Michael.A โ€” SafeTest-Dev
Binary | Reverse | Malware | AI


SafeTest-Dev ยฉ 2026 โ€” All rights reserved

Repository

01_Reverse_Engineering

Owner
Statistic
  • 0
  • 0
  • 0
  • 0
  • 0
  • about 11 hours ago
  • March 4, 2026
License

Links
Synced at

Sat, 04 Apr 2026 18:23:48 GMT

Languages