DC540 Hacking Challenge 0x00001
2021-02-23 08:41:42 •
阅读 97 •
点我收藏
|
Offensive Windows IPC Internals 2
2021-02-22 21:16:20 •
阅读 104 •
点我收藏
|
Let’s know How I have explored the buried secrets in Xamarin application
2021-02-22 21:16:20 •
阅读 117 •
点我收藏
|
/r/ReverseEngineering's Weekly Questions Thread
2021-02-22 17:58:59 •
阅读 79 •
点我收藏
|
Arbitrary Code Execution Proof of Concept in Paper Mario
2021-02-22 17:58:59 •
阅读 105 •
点我收藏
|
2021 NDSS Binary Analysis Research Workshop: Papers & Source Code
2021-02-22 06:28:14 •
阅读 108 •
点我收藏
|
Exploiting JWT key confusion attack without public RSA key - Cr0wnAir Web Challenge - Union CTF
2021-02-22 04:50:47 •
阅读 118 •
点我收藏
|
UPX anti-unpacking techniques in IoT malware
2021-02-21 20:35:28 •
阅读 84 •
点我收藏
|
ScanLime: Reverse Engineering an Active Styl
2021-02-21 04:01:04 •
阅读 99 •
点我收藏
|
Obfvious - a CLang (v 12) based compiler that allows for Windows binaries obfuscation [WiP]
2021-02-21 02:21:15 •
阅读 94 •
点我收藏
|
Reverse engineering the SARS-CoV-2 vaccine source code [Animated with permission from OP]
2021-02-20 19:37:41 •
阅读 104 •
点我收藏
|
Unknown (and unemulated) internal ROM inside SEGA's SVP chip [i.e. enhancement chip in Virtua Racing Sega Genesis 3D game cart]
2021-02-20 14:37:05 •
阅读 103 •
点我收藏
|
BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-Program Path Sampling and Per-Path Abstract Interpretation [PDF]
2021-02-20 11:19:25 •
阅读 86 •
点我收藏
|
Reversing a third-party closed-source application to add additional security features.
2021-02-20 06:24:40 •
阅读 104 •
点我收藏
|
Fun reverse engineering on the MSX to trigger easter eggs in a game
2021-02-20 03:09:09 •
阅读 116 •
点我收藏
|
ImHex 1.7.0 : Light mode, Node data processor, custom encodings and more
2021-02-19 04:09:38 •
阅读 86 •
点我收藏
|
Getting Information Disclosure in Adobe Reader Through the ID Tag
2021-02-19 04:09:38 •
阅读 81 •
点我收藏
|
When you go fighting malware don´t forget your VT plugins - Register For Free!
2021-02-19 00:55:15 •
阅读 89 •
点我收藏
|
Siliconpr0n
2021-02-18 19:56:34 •
阅读 86 •
点我收藏
|
Embedded World-in-a-Box idea: good or bad?
2021-02-18 08:28:32 •
阅读 92 •
点我收藏
|
How Malware Can Resolve APIs By Hash
2021-02-18 05:12:43 •
阅读 103 •
点我收藏
|
Dump o01 string files on flip phones
2021-02-18 01:54:48 •
阅读 83 •
点我收藏
|
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary [PDF]
2021-02-17 22:33:39 •
阅读 132 •
点我收藏
|
JEB Community Edition
2021-02-17 20:53:09 •
阅读 89 •
点我收藏
|
Using eBPF to uncover in-memory loading
2021-02-17 20:53:09 •
阅读 86 •
点我收藏
|
New sister subreddit: /r/AskReverseEngineering
2021-02-17 09:15:50 •
阅读 111 •
点我收藏
|
Fuzzing combined with symbolic execution: a demonstration on SymCC and AFL
2021-02-17 09:15:50 •
阅读 122 •
点我收藏
|
Manually fixing opaque predicates and using X-Rays for decryption [Malware Reverse Engineering video]
2021-02-17 04:21:35 •
阅读 120 •
点我收藏
|
Fuzzing Python library using Google Atheris Fuzzer (video tutorial)
2021-02-16 21:46:37 •
阅读 101 •
点我收藏
|
Integrated Circuit Offensive Security | Olivier Thomas from Texplained | hardwear.io USA 2019
2021-02-16 20:06:37 •
阅读 108 •
点我收藏
|