JADX might be a bit more popular than MASSCAN. We know about 27 links to it since March 2021 and only 27 links to MASSCAN. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Can I get banned for mass scanning with https://github.com/robertdavidgraham/masscan or does it slow down any other vms from other persons? Source: 11 months ago
Nope, this doesn't work any more. Shodan checks all ports (so any attackers using data from Shodan already know which ports you have open), and tools like masscan (https://github.com/robertdavidgraham/masscan) let you portscan the entire IPv4 address space in less than 10 minutes. Source: 12 months ago
The discord user at the time used the tool "Masscan" to scan every 25565 port on the internet, he claims he was able to get the entire internet scanned in just a few minutes with a 512MB buyvm slice. Source: about 1 year ago
Changing the default port does nothing for security. It only prevents some basic brute force or default password scripts. Anyone is able to scan for it in no time anyway (https://github.com/robertdavidgraham/masscan). Source: about 1 year ago
But it should blow away the far-too-common belief that no-one's after you because you're not interesting enough. IPv4 is smaller than we think. It is not difficult to scan the entire ipv4 space in minutes. And every single one of those is going to knock your door on the way past. Source: about 1 year ago
The best way is to just start practicing. I would say pick some simple apps on your (Android) phone and dig straight in. The great thing about Android applications is that often they generally decompile quite nice into human readable Java soo the barrier of entry can be quite low to start reversing. Grab a copy of JADX[1] - it will decompress and decompile the APK files. If you don't have an Android handset, use... - Source: Hacker News / 10 months ago
This may be overkill but you can use an oscilloscope to manually calculate the baudrate, i.e. Like this. It looks like it could be UART serial data, but this is a good resource to reference. Sometimes http is used as a means for communicating, and not necessarily directly to a browser see here. This is pretty common in embedded applications actually. You can try using dirbuster to see what hidden endpoints there... Source: 11 months ago
Jadx - skylot/jadx: Dex to Java decompiler (github.com) - Used for decompiling the apk - make the code readable. Source: 11 months ago
I realized when app is decompiled using JADX class names are recreated as shown in this screenshot of sample app. Source: 12 months ago
Not sure. I started reverse engineering Java apps very early in my life — initially it was J2ME games. Decompilers of the time sucked but that didn't stop me from modding Gravity Defied :P I honestly don't know what's a good way of getting started on reverse engineering. There's a bunch of everything about Windows executables in particular, including "crackmes", but native machine code is a level up from JVM... - Source: Hacker News / about 1 year ago
Nmap - Nmap Free Security Scanner, Port Scanner, & Network Exploration Tool. Download open source software for Linux, Windows, UNIX, FreeBSD, etc.
Apktool - Apktool is an all-in-one tool that can extract all the resources inside an APK.
Advanced IP Scanner - Advanced IP Scanner shows all network devices, gives you access to shared folders, and can even remotely switch computers off. Download it Free.
APK Editor Studio - APK Editor Studio is an open-source Android application editor that allows you to edit APKs with the help of reverse engineering.
Angry IP Scanner - Open-source and cross-platform network scanner designed to be fast and simple to use
APK Studio - APK Studio is an open-source Integrated Development Environment that allows you to recompile and decompile Android applications with its unified interface.