[公告]不安全上线【我的收藏】功能
2019-09-26 17:32:30  •  阅读 ♾  
[公告]不安全更换新域名为: buaq.net 短域名:https://f5.pm
2019-09-26 17:32:30  •  阅读 ♾  
Malware Analysis of a Password Stealer
2021-04-19 20:22:24  •  阅读 22 •  点我收藏   
CVE-2021-3493: a vulnerability in OverlayFS allows local users under Ubuntu to gain root privileges
2021-04-19 18:42:50  •  阅读 28 •  点我收藏   
/r/ReverseEngineering's Weekly Questions Thread
2021-04-19 16:00:15  •  阅读 25 •  点我收藏   
Reverse-engineering a vintage comparator chip
2021-04-19 11:27:24  •  阅读 22 •  点我收藏   
Union Based SQLi To RCE! - Escalate your SQL injections!
2021-04-18 23:25:28  •  阅读 25 •  点我收藏   
Breaking Instagram - Automating Page Growth: Part 1
2021-04-18 06:01:27  •  阅读 37 •  点我收藏   
Ghidra Script To Auto-Name Function From Capabilities
2021-04-17 20:50:47  •  阅读 32 •  点我收藏   
Resolving Embedded Files at Runtime via strace
2021-04-17 09:54:28  •  阅读 38 •  点我收藏   
Reverse Engineering Challenge (HTB) Walkthrough incl binary patching with Ghidra + PwnTools
2021-04-16 22:16:56  •  阅读 45 •  点我收藏   
Towards Optimal Use of Exception Handling Information for Function Detection
2021-04-16 02:12:03  •  阅读 48 •  点我收藏   
Konami 007121 arcade video chip (used in Contra arcade) schematics release by furrtek
2021-04-14 02:27:32  •  阅读 51 •  点我收藏   
Most popular SketchUp Components of 3D Warehouse - SketchupFamily
2021-04-14 00:35:19  •  阅读 50 •  点我收藏   
Getting Started Reverse Engineering Bare Metal Kernel Images - (Part 1/Setup) | This is a series, more will be released soon.
2021-04-13 10:15:54  •  阅读 48 •  点我收藏   
Reverse engineering LEGO Island 2: part 2 of 2
2021-04-12 23:40:33  •  阅读 60 •  点我收藏   
Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study
2021-04-12 22:13:42  •  阅读 65 •  点我收藏   
/r/ReverseEngineering's Weekly Questions Thread
2021-04-12 16:00:16  •  阅读 45 •  点我收藏   
[TUTORIAL] Stealthy way to hijack the existing game process handle within the game launcher (Steam and Blizzard/Battle.net launchers)
2021-04-12 05:10:24  •  阅读 45 •  点我收藏   
Working Around the Inherent Slowness of Debugger Conditional Breakpoints
2021-04-12 04:04:20  •  阅读 55 •  点我收藏   
DTrace's StpGetArgType accesses a metadata table that stores complete arg type information for every syscall
2021-04-12 03:52:21  •  阅读 66 •  点我收藏   
1-Click Reverse Engineering JavaScript dropper for IcedID Malware
2021-04-11 23:26:47  •  阅读 53 •  点我收藏   
Memory corruption vulnerability in QNAP QTS’s Surveillance Station plugin leads to a pre-auth RCE
2021-04-11 16:01:43  •  阅读 72 •  点我收藏   
Bjoern Kerler, baseband & bootrom reverser/pwner, started streaming his stuff on twitch (every saturday 20:00 EST Paris time)
2021-04-11 14:33:48  •  阅读 22 •  点我收藏   
unscramble embedded i.MX28 firmware ?
2021-04-11 03:42:27  •  阅读 85 •  点我收藏   
Hello, shows how the electricity bills at industrial sites can be saved using VFDs!!!
2021-04-10 23:02:46  •  阅读 74 •  点我收藏   
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
2021-04-10 21:41:31  •  阅读 83 •  点我收藏   
Malware Analysis: IcedID Javascript dropper
2021-04-10 20:38:45  •  阅读 80 •  点我收藏   
Angstrom CTF 2021 - Reverse Engineering Challenge Walkthroughs (first 2)
2021-04-10 05:43:52  •  阅读 61 •  点我收藏   
Hard Disk Firmware Hacking (2015) - MalwareTech
2021-04-09 04:02:21  •  阅读 54 •  点我收藏   
Game Hacking Presentation - BSides Munich 2020
2021-04-09 00:21:25  •  阅读 52 •  点我收藏   
GDB Tutorial for Reverse Engineers: Breakpoints, Modifying Memory and Printing its Contents
2021-04-08 23:58:30  •  阅读 67 •  点我收藏