Search code examples
How to Decompile FMX file...

oracle-databasereverse-engineeringoracleformsdecompiler

Read More
Recompile apk using original certificate...

androidapkreverse-engineeringapktoolapksigner

Read More
Reversing Bitwise Operator Left Shift...

bit-manipulationreverse-engineeringbitwise-operators

Read More
Can't find native libraries used by apk on my phone...

javaandroidapkreverse-engineeringjava-native-library

Read More
Third operand of imul instruction is a memory address, what was its original value?...

assemblyreverse-engineering

Read More
How to keep track of source code call stack...

c++reverse-engineering

Read More
Is there a program to decompile Delphi?...

delphireverse-engineeringdecompiling

Read More
Why do Compilers put data inside .text(code) section of the PE and ELF files and how does the CPU di...

x86cpureverse-engineeringcompiler-optimizationelf

Read More
Error with dex2jar classes.dex file for reverse engineering of apk file...

javaandroidreverse-engineeringdex2jar

Read More
How to re-engineering design from source code using rational rose...

c++visual-c++reverse-engineeringclass-diagramrational-rose

Read More
Two compiled binary files with exactly same assembly code behaves differently while cracking binary ...

diffreverse-engineeringpatchcrackingghidra

Read More
Getting Imports/Exports from an PE using a Ghidra Script...

reverse-engineeringghidra

Read More
Why PE need Original First Thunk(OFT)?...

windowsassemblyexereverse-engineeringportable-executable

Read More
Read variable from anonymous Javascript function from devtools console...

javascriptdebugginggoogle-chrome-devtoolsreverse-engineeringfirefox-developer-tools

Read More
Analyzing obfuscated ELF binary...

cgdbreverse-engineeringelf

Read More
Access Violation using ReadProcessMemory to get a string value...

c++winapireverse-engineering

Read More
Jboss Hibernate Tools: Reading error schema - Probably a JDBC driver Issue...

javahibernatejbossreverse-engineering

Read More
Detouring a member-function via an injected DLL...

c++winapihookreverse-engineeringdetours

Read More
How to modify machine code in radare2 under the cursor by incrementing and decrementing single bytes...

assemblyreverse-engineeringradare2

Read More
Add custom menu items to the Finder context menu...

cocoamacosreverse-engineeringfinder

Read More
What kind of anti-debugging technique doesn't allow attaching with usermode debugger?...

windowsreverse-engineeringmalwaremalware-detectionantimalware

Read More
How do Instagram layout comment textview and user name textview together as one?...

javaandroidkotlinlayoutreverse-engineering

Read More
Is it possible to use Android Studio's decompiler from command line?...

androidandroid-studioreverse-engineeringdecompiling

Read More
Redundant register values in GCC-compiled binary?...

cgccassemblyx86-64reverse-engineering

Read More
Does ADR x9, sub_xxxxxx call a subroutine? Why does code use ADR / NOP...

assemblyreverse-engineeringarm64

Read More
The meaning of LOBYTE(some_var) = 0; in IDA HexRays?...

reverse-engineeringida

Read More
Running data shellcode in c executable...

assemblymemory-managementx86reverse-engineering

Read More
How to convert cordova apk to html source instead of java...

htmlcordovareverse-engineering

Read More
What is the legality of creating a client for a not public api?...

apireverse-engineering

Read More
How can I use a stack buffer overflow to make an attack...

securityreverse-engineeringbuffer-overflow

Read More
BackNext