Search code examples
frida-server being targeted by port scan?...


candroid-ndkreverse-engineeringandroid-networkingfrida

Read More
What is `PhysicalAddress` used for in `IMAGE_SECTION_HEADER`?...


windowswinapireverse-engineeringportable-executable

Read More
Label printer file reverse engineering...


stringprintingreverse-engineeringbarcode

Read More
Understanding a malicious js file...


javascriptreverse-engineering

Read More
How to send a Wic based Render Target on the screen?...


ms-officereverse-engineeringdirect3ddirect2d

Read More
Discard unused symbos from dlopen()'ed .so...


reverse-engineeringdlopenobjdumpobjcopysprof

Read More
Bomb lab phase 4 func4 - doubly-recursive function that calls itself with n-1 and n-2...


assemblyx86-64reverse-engineeringdisassemblybinary-bomb

Read More
Binary bomb phase 4 assembly...


assemblyx86gdbreverse-engineeringbinary-bomb

Read More
Given an instruction address, can the starting address of the function enclosing it be determined?...


x86reverse-engineeringdisassemblydecompiling

Read More
How can I determine which framework was used to build a particular Windows desktop application?...


frameworksreverse-engineering

Read More
How to declare a struct with fields at specific offsets in C++?...


c++macrosreverse-engineering

Read More
Obfuscation of variable and function names in C++ to prevent basic reverse engineering...


c++assemblyg++obfuscationreverse-engineering

Read More
Understanding PLT, GOT and hooking them (Linux and Android)...


androidlinuxreverse-engineeringgot

Read More
IDAPYTHON got wrong data from memory...


reverse-engineeringdisassemblyida

Read More
In C python, accessing the bytecode evaluation stack...


pythonreverse-engineeringbytecodecpythondisassembly

Read More
Angr unconstrained state has the same address as a found state...


assemblyreverse-engineeringctfsymbolic-executionangr

Read More
Recovery of local names in .Net...


c#.netreflectionreverse-engineeringdisassembly

Read More
How to understand the operand encoding of Renesas M16C bit instructions?...


embeddedreverse-engineering

Read More
Can i reverse engineer my own dll?...


.netreverse-engineeringreflector

Read More
How to use Hibernate reverse engineering to create annotatedClasses style?...


javamysqlspringhibernatereverse-engineering

Read More
Force compile (missing source files)...


javareverse-engineering

Read More
How to open network adapter properties via Windows API?...


c++windowswinapicomreverse-engineering

Read More
"Not enough data for store" while solving Angr CTF example...


assemblyreverse-engineeringctfsymbolic-executionangr

Read More
Reverse Engineering an Installer...


installationwindows-installerreverse-engineering

Read More
Best practice for storing and protecting private API keys in applications...


androidreverse-engineeringproguardapi-key

Read More
Why does dup2(2) function has no effect here?...


reverse-engineeringsystem-calls

Read More
How can an Android app receive UI updates without HTTP requests?...


androidreverse-engineeringcharles-proxysslpinninghttp-toolkit

Read More
What does "0010 ^0.16 ___u8_ iv;" in Hex-Rays IDA Pro mean?...


reverse-engineeringida

Read More
What Does the "Arguments" Field in the Functions Tab of IDA Represent?...


cx86-64reverse-engineeringida

Read More
whatsapp sniffing ssl traffic with wireshark...


network-programmingsslreverse-engineeringwiresharkwhatsapp

Read More
BackNext