Search code examples
I need help deobfucate gLua code but cannot find any solutions...

luareverse-engineeringdeobfuscationgarrys-mod

Read More
how to find the native c++ function who called a java method in a android app and in which library?...

javaandroidreverse-engineeringfridajava-native-library

Read More
__ctype_b_loc what is its purpose?...

reverse-engineeringglibc

Read More
Matlab open a file in hexadecimal bit after bit...

matlabencodingbinaryreverse-engineering

Read More
X64dbg is not loading program expected address space (Not same as Ghidra shows)...

assemblyreverse-engineeringghidrax64dbg

Read More
x86 ASM using Ghidra, understanding decompiler results for an inlined function call...

assemblyx86reverse-engineeringdecompilingghidra

Read More
Is it possible to edit and recompile an iOS Binary?...

iosreverse-engineeringidaotool

Read More
Deciphering simple assembly code: is it strcpy or strcat?...

assemblyx86-64reverse-engineering

Read More
How to generate derive shared secret key from public key...

cryptographyreverse-engineeringelliptic-curvenode-cryptosecp256k1

Read More
How to mimic rand() function of C in python?...

pythoncrandomreverse-engineeringrandom-seed

Read More
Making commercial Java software (DRM)...

javareverse-engineeringcopy-protectioncommerce

Read More
What is the iBeacon Bluetooth Profile...

iosbluetoothbluetooth-lowenergyreverse-engineeringibeacon

Read More
Why are the ILT and IAT separate tables?...

windowsreverse-engineeringportable-executablemalwareinternals

Read More
What this piece of code does and where it is used...

calgorithmassemblyx86-64reverse-engineering

Read More
Python `requests` cookies not loading all cookies into subdomain from main domain...

pythonpython-requestsreverse-engineering

Read More
How to fix apps that miss alarms in doze mode?...

androidreverse-engineeringapktoolandroid-doze

Read More
What is difference between Digital Forensic and Reverse Engineering?...

debuggingassemblyreverse-engineeringdecompiling

Read More
Strange date/time protocol, need help solving...

datetimehexreverse-engineering

Read More
Shellcode searching for Bytes String: 0C330408Bh...

assemblyreverse-engineeringmalwareshellcodemalware-detection

Read More
Reverse engineer CRC/checksum algorithm in CAN messages...

reverse-engineeringchecksumxorcan-buscrc

Read More
How to modify checksum after making changes in Nokia 215 4G firmware?...

reverse-engineeringchecksumnokiafirmware

Read More
How to log CPU instructions executed by a Python program?...

pythonassemblyreverse-engineering

Read More
How to decode a PDF stream?...

pdfadobereverse-engineeringmalwareexploit

Read More
Open source ER diagramming tool for mysql...

mysqlreverse-engineeringerd

Read More
Binary Bomb Phase 5 - Looking for two ints as input...

cassemblyx86-64reverse-engineeringbinary-bomb

Read More
frida hook native non exported functions...

androidreverse-engineeringfridaghidra

Read More
ret2libc attack MOVAPS segfault...

pythoncgdbreverse-engineeringbuffer-overflow

Read More
What is _IO_stdin_used...

c++assemblyprintfx86-64reverse-engineering

Read More
Translating RCL assembly into C/C++...

c++assemblyx86reverse-engineeringinline-assembly

Read More
Host header differs from Target in handshake request for WebSocket...

pythonazurewebsocketreverse-engineeringburp

Read More
BackNext