Search code examples
Reverse engineer 4 hex values to DateTime...

datetimetimestamphexdecimalreverse-engineering

Read More
How to reverse engineer/extract code ATmega32...

arduinoreverse-engineeringmicrocontrollerdecompilingatmega

Read More
Bulls and Cows game?...

javareverse-engineering

Read More
How to solve LLDB error about N_SO in symbol with UID 1...

iosiphonedebuggingreverse-engineeringlldb

Read More
Why does MSVC debug mode leave out the cmp/jcc for one empty if() body but not another (i++ vs. ++i)...

cassemblyvisual-c++reverse-engineering

Read More
Get function called by inputbox...

javascriptweb-applicationsreverse-engineering

Read More
CRC32 Parameters Reverse Engineering having access to multiple examples...

reverse-engineeringcrccrc32

Read More
How can I find the data structure that represents mine layout of Minesweeper in memory?...

reverse-engineeringwindbgidaminesweepermemory-editing

Read More
Given this hash function, an expected output, and the length of the input string, how do I find the ...

javascriptreverse-engineeringbrute-forcehash-function

Read More
Java code which creates UML diagrams...

javaumlreverse-engineering

Read More
Add menu item to another application...

c#vb.netmenureverse-engineering

Read More
Reverse engineering a statistics data file from my insulin pump controller...

rubyreverse-engineeringbinary-data

Read More
Reading and writing non-standard floating point values...

c#floating-pointhexbytereverse-engineering

Read More
Fail-safe way of round-tripping Flash swf files to text-representation and back...

actionscript-3actionscriptflashreverse-engineering

Read More
Windbg Local kernel debugging on a .sys file...

reverse-engineeringwindbgida

Read More
Somebody is reverse engineering my app. Should I afraid of stealing? Is it legal?...

androidreverse-engineering

Read More
Reverse-engineering asm using sub / cmp / setbe back to C? My attempt is compiling to branches...

cassemblyx86-64reverse-engineering

Read More
How would I implement this inverse exponential in lua?...

mathluareverse-engineering

Read More
How to preserve sensitive information in Client-Side-Binary?...

androidiphonereverse-engineeringclient-sidebinary-data

Read More
How to verify the identity of the app sending an POST request...

javaandroidhttpreverse-engineeringsignature

Read More
What is the difference between the 'Avl' suffix and the original function in the Win32 API?...

winapidllreverse-engineering

Read More
How to control dynamic class names which are auto-generated via CSS modules or styled-components wit...

javascriptcssreactjsuser-defined-functionsreverse-engineering

Read More
How does the Apple Color List format (CLR) work?...

macoscolorsreverse-engineering

Read More
what is the difference between "python -c 'print' " and "(python -c 'prin...

pythonclinuxreverse-engineeringcracking

Read More
Redundant store in JIT disassemble...

assemblyjvmreverse-engineeringjitjvm-hotspot

Read More
Reverse engineer Amiga monitor files...

driverreverse-engineeringamiga

Read More
Hexadecimal Meaning in Hopper Disassembler iOS Files...

iosassemblyarmreverse-engineeringdisassembly

Read More
Is it possible to build a client app that makes use of Facebook's private API?...

facebookapifacebook-graph-apireverse-engineering

Read More
Figuring out how a number is represented in hex form...

reverse-engineeringbinaryfiles

Read More
Reverse Engineering - EA (Enterprise Architect tool )...

reverse-engineeringenterprise-architect

Read More
BackNext