Step 0 · Orientation
Reverse Engineering Manual & Lab
Calm, guided workspace for static analysis.
This sidecar app keeps your RE flow organized: capture binary context, map IOCs, interpret imports, document functions, assess anti-analysis, and export findings.
- Everything is client-side; localStorage holds your state.
- Use alongside IDA/Ghidra/objdump/strings for quick triage.
- Navigate via the workflow rail; completion dots mark progress.
Record Binary Metadata
Identity, platform, and packing signals.
Paste Strings Output
Classify URLs, IPs, paths, and indicators.
Paste Imports List
Map capabilities and plan the next dive.
Notebook & Export
Compile findings into a shareable report.
Step 1 · Context
Binary Overview & Metadata
Capture the who/what/where before deeper analysis.
Step 2 · Strings & Indicators
Strings & IOC Explorer
Drop in your strings dump to triage URLs, IPs, paths, and suspicious hits.
strings or static triage tools to surface quick leads.Step 3 · Capabilities
Imports & API Usage
Classify API calls to understand capability footprint.
Step 4 · Functions & Flow
Control Flow & Function Notes
Document important routines and craft the narrative.
Add Function
Working List
Documented Functions
No functions documented yet. Add your first function above.
Overall Control Flow Narrative
Step 5 · Resilience Checks
Anti-Analysis Indicators
Track signs of packing, obfuscation, and anti-RE techniques.
Indicator Checklist
Step 6 · Reporting
RE Notebook & Report Export
Pull everything together and export cleanly.
Final Summary / Assessment
Preview
Report Preview
Click "Refresh Report" to generate a preview of your analysis report.
Step 7 · Notes
Disclaimer
Professional students already know the ground rules.
This space intentionally minimal — operate responsibly and keep your lab isolated.