Search code examples
CRC mismatch using calculation with CRC RevEng results...

creverse-engineeringcrc

Read More
How to write an encryption function for this decryption function (picoCTF GDB Test Drive)?...

cassemblyencryptionreverse-engineeringelf

Read More
Entity Framework Core creating model from existing database...

c#.netentity-frameworkreverse-engineeringscaffolding

Read More
Floating Point numbers on VAX machine...

floating-pointreverse-engineeringieee-754floatingvax

Read More
Symbols of function in a library...

shared-librariesreverse-engineeringsymbols

Read More
Reverse engineer UPS serial protocol: Checksum/CRC?...

reverse-engineeringchecksumcrc

Read More
frida-server being targeted by port scan?...

candroid-ndkreverse-engineeringandroid-networkingfrida

Read More
What is `PhysicalAddress` used for in `IMAGE_SECTION_HEADER`?...

windowswinapireverse-engineeringportable-executable

Read More
Label printer file reverse engineering...

stringprintingreverse-engineeringbarcode

Read More
Understanding a malicious js file...

javascriptreverse-engineering

Read More
How to send a Wic based Render Target on the screen?...

ms-officereverse-engineeringdirect3ddirect2d

Read More
Discard unused symbos from dlopen()'ed .so...

reverse-engineeringdlopenobjdumpobjcopysprof

Read More
Bomb lab phase 4 func4 - doubly-recursive function that calls itself with n-1 and n-2...

assemblyx86-64reverse-engineeringdisassemblybinary-bomb

Read More
Binary bomb phase 4 assembly...

assemblyx86gdbreverse-engineeringbinary-bomb

Read More
Given an instruction address, can the starting address of the function enclosing it be determined?...

x86reverse-engineeringdisassemblydecompiling

Read More
How can I determine which framework was used to build a particular Windows desktop application?...

frameworksreverse-engineering

Read More
How to declare a struct with fields at specific offsets in C++?...

c++macrosreverse-engineering

Read More
Obfuscation of variable and function names in C++ to prevent basic reverse engineering...

c++assemblyg++obfuscationreverse-engineering

Read More
Understanding PLT, GOT and hooking them (Linux and Android)...

androidlinuxreverse-engineeringgot

Read More
IDAPYTHON got wrong data from memory...

reverse-engineeringdisassemblyida

Read More
In C python, accessing the bytecode evaluation stack...

pythonreverse-engineeringbytecodecpythondisassembly

Read More
Angr unconstrained state has the same address as a found state...

assemblyreverse-engineeringctfsymbolic-executionangr

Read More
Recovery of local names in .Net...

c#.netreflectionreverse-engineeringdisassembly

Read More
How to understand the operand encoding of Renesas M16C bit instructions?...

embeddedreverse-engineering

Read More
Can i reverse engineer my own dll?...

.netreverse-engineeringreflector

Read More
How to use Hibernate reverse engineering to create annotatedClasses style?...

javamysqlspringhibernatereverse-engineering

Read More
Force compile (missing source files)...

javareverse-engineering

Read More
How to open network adapter properties via Windows API?...

c++windowswinapicomreverse-engineering

Read More
"Not enough data for store" while solving Angr CTF example...

assemblyreverse-engineeringctfsymbolic-executionangr

Read More
Reverse Engineering an Installer...

installationwindows-installerreverse-engineering

Read More
BackNext