[公告]不安全上线【我的收藏】功能
2019-09-26 17:32:30  •  阅读 ♾  
[公告]不安全更换新域名为: buaq.net 短域名:https://f5.pm
2019-09-26 17:32:30  •  阅读 ♾  
DC540 Hacking Challenge 0x00001
2021-02-23 08:41:42  •  阅读 97 •  点我收藏   
Offensive Windows IPC Internals 2
2021-02-22 21:16:20  •  阅读 104 •  点我收藏   
Let’s know How I have explored the buried secrets in Xamarin application
2021-02-22 21:16:20  •  阅读 117 •  点我收藏   
/r/ReverseEngineering's Weekly Questions Thread
2021-02-22 17:58:59  •  阅读 79 •  点我收藏   
Arbitrary Code Execution Proof of Concept in Paper Mario
2021-02-22 17:58:59  •  阅读 105 •  点我收藏   
2021 NDSS Binary Analysis Research Workshop: Papers & Source Code
2021-02-22 06:28:14  •  阅读 108 •  点我收藏   
Exploiting JWT key confusion attack without public RSA key - Cr0wnAir Web Challenge - Union CTF
2021-02-22 04:50:47  •  阅读 118 •  点我收藏   
UPX anti-unpacking techniques in IoT malware
2021-02-21 20:35:28  •  阅读 84 •  点我收藏   
ScanLime: Reverse Engineering an Active Styl
2021-02-21 04:01:04  •  阅读 99 •  点我收藏   
Obfvious - a CLang (v 12) based compiler that allows for Windows binaries obfuscation [WiP]
2021-02-21 02:21:15  •  阅读 94 •  点我收藏   
Reverse engineering the SARS-CoV-2 vaccine source code [Animated with permission from OP]
2021-02-20 19:37:41  •  阅读 104 •  点我收藏   
Unknown (and unemulated) internal ROM inside SEGA's SVP chip [i.e. enhancement chip in Virtua Racing Sega Genesis 3D game cart]
2021-02-20 14:37:05  •  阅读 103 •  点我收藏   
BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-Program Path Sampling and Per-Path Abstract Interpretation [PDF]
2021-02-20 11:19:25  •  阅读 86 •  点我收藏   
Reversing a third-party closed-source application to add additional security features.
2021-02-20 06:24:40  •  阅读 104 •  点我收藏   
Fun reverse engineering on the MSX to trigger easter eggs in a game
2021-02-20 03:09:09  •  阅读 116 •  点我收藏   
ImHex 1.7.0 : Light mode, Node data processor, custom encodings and more
2021-02-19 04:09:38  •  阅读 86 •  点我收藏   
Getting Information Disclosure in Adobe Reader Through the ID Tag
2021-02-19 04:09:38  •  阅读 81 •  点我收藏   
When you go fighting malware don´t forget your VT plugins - Register For Free!
2021-02-19 00:55:15  •  阅读 89 •  点我收藏   
Siliconpr0n
2021-02-18 19:56:34  •  阅读 86 •  点我收藏   
Embedded World-in-a-Box idea: good or bad?
2021-02-18 08:28:32  •  阅读 92 •  点我收藏   
How Malware Can Resolve APIs By Hash
2021-02-18 05:12:43  •  阅读 103 •  点我收藏   
Dump o01 string files on flip phones
2021-02-18 01:54:48  •  阅读 83 •  点我收藏   
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary [PDF]
2021-02-17 22:33:39  •  阅读 132 •  点我收藏   
JEB Community Edition
2021-02-17 20:53:09  •  阅读 89 •  点我收藏   
Using eBPF to uncover in-memory loading
2021-02-17 20:53:09  •  阅读 86 •  点我收藏   
New sister subreddit: /r/AskReverseEngineering
2021-02-17 09:15:50  •  阅读 111 •  点我收藏   
Fuzzing combined with symbolic execution: a demonstration on SymCC and AFL
2021-02-17 09:15:50  •  阅读 122 •  点我收藏   
Manually fixing opaque predicates and using X-Rays for decryption [Malware Reverse Engineering video]
2021-02-17 04:21:35  •  阅读 120 •  点我收藏   
Fuzzing Python library using Google Atheris Fuzzer (video tutorial)
2021-02-16 21:46:37  •  阅读 101 •  点我收藏   
Integrated Circuit Offensive Security | Olivier Thomas from Texplained | hardwear.io USA 2019
2021-02-16 20:06:37  •  阅读 108 •  点我收藏