New: reverse-engineeringAll contenthive-129948hive-196917krhive-185836hive-183959zzansteemphotographyhive-180932hive-150122hive-101145hive-183397hive-166405hive-144064uncommonlabhive-184714hive-188619bitcoinkrsuccesshive-193186hive-193637hive-103599hive-145157hive-179660hive-180301TrendingNewHotLikersdisizsarg3 (42)inย designย โขย 6 years agoReverse Engineering a Newsfeed Post: Amiibo EditionIf there is something that I would like anyone to know about me: I am a gamer. No, it's not as bad as you may think. Everyone needs a hobby, and video games are definitely one of them! So being aโฆjej2660 (25)inย programmingย โขย 6 years agoshell code์์ฝ๋ ์์คํ ์์ ํน์ ๋ช ๋ น์ ์คํํ๋ ์์ ์ฌ์ด์ฆ์ ์ฝ๋ ์ผ๋ฐ์ ์ผ๋ก ๊ธฐ๊ณ์ด ์ฝ๋๋ก ์์ฑ๋ EXโฆjej2660 (25)inย programmingย โขย 6 years agoassembly language์ด์ ๋ธ๋ฆฌ์ด ๊ธฐ๊ณ์ด ์ 1๋1๋ก ๋์ํ๋ ์ธ์ด ์์คํ ์ดํด์ ํ์ํจ ๋ ์ง์คํฐ ๋ฒ์ฉ ๋ ์ง์คํฐ, ์ํ ๋ ์ง์คํฐ, ํ๋๊ทธ ๋ ์ง์ค(cpu ๋ด์ ์ ์ฅ๊ณต๊ฐ) ๋ ์ง์คํฐ ๊ตฌ์กฐ 1.๋ฐ์ดํฐ ๋ ์ง์คํฐ:EAX, EBX, ECX, EDX EAX: ย ย Extended Accumulator Register ย ย ๊ณฑ์ ์ด๋ ๋๋์ ์ฐ์ฐ์ ์ฌ์ฉ, ํจ์์ ๊ฒฐ๊ณผ๊ฐ ์ ์ฅโฆcristi (70)inย scienceย โขย 6 years agoMalware Analysis - Intro to RE - Lecture 2 [CS7038]This is the second lecture of the malware analysis course taught by Professor Coleman Kane. It's a one hour lecture comprising of the following topics: inspecting raw pdfs creating a pythonโฆcristi (70)inย cybersecurityย โขย 7 years agoDisassembling with IDA - Malware Analysis TutorialI'm not sure I've suggested this tutorial before, but here goes. So, for those who are into malware analysis, one of the tools in your repertoire is a disassembler. A very large majority ofโฆcristi (70)inย cybersecurityย โขย 7 years agoHow to Set Up a Malware Analysis Lab - [OALabs]I know I was very confused the first time I created a virtual machine for malware analysis. My biggest concern was how to make sure that the samples I'm analyzing are not to escape the isolationโฆcristi (70)inย programmingย โขย 7 years agoReverse Engineering Android Applications - [Talk]I got a little bit surprised when I tried looking for information on reverse engineering android applications. Usually, I go for lectures, talks, and most importantly demonstrations and hands-onโฆcristi (70)inย cybersecurityย โขย 7 years agoBinary Reverse Engineering - Lafarge2 [CrackMe]Finally, I've been able to work on and post my first reverse engineering tutorial. So, in this demonstration I'm patching a binary from the very popular repository of crackmes. Up until not longโฆcristi (70)inย cybersecurityย โขย 7 years agoHow to Solve a Crackme the Right Way - [Gynvael]Gynvael Coldwind makes a lot of live hacking and computer security demonstrations on his channel on Youtube. He and his team are frequently ranked high and reach the podium in CTF-like challengesโฆcristi (70)inย cybersecurityย โขย 7 years agoMalware Analysis with IDA Pro - [Demonstration]Yet another malware analysis video... I guess I kindof gotten you used to these materials. Folks at OpenAnalysis have posted, not too long ago, a video on their youtube channel, which is aboutโฆcristi (70)inย cybersecurityย โขย 7 years agoModern Exploitation - by RSA2018 Conference - [Presentation]Folks at the RSA Conference have been posting a lot of videos on their youtube channel over the past couple of days. One of them that caught my attention was the one I'm suggesting here. It'sโฆcristi (70)inย cybersecurityย โขย 7 years agoBuffer Overflow in Modern Applications - [Video Demonstration]In this video,T3JV1L demonstrates how he found a buffer overflow type SEH vulnerability in a binary application. He told me that he first reported the vulnerability to the software company in causeโฆcristi (70)inย cybersecurityย โขย 7 years agoTeaching myself Reverse Engineering - Lafarge CrackMe [RE Tutorial]One of the ways in which I teach myself reverse engineering is through hands-on practice. So, I take these binaries that are hosted on crackmes.one and I try to reverse them. In this contextโฆmys (62)inย hodlthecoinย โขย 7 years agoHow to achieve unlimited score in ๐ฎ Hodl the Coin Steem game [Hack]There is new retro Steem game by @LimeSoda. Hodl the Coin is a tribute to Flappy Bird in the galaxies. Player try to hodl the Steem coin through downsides and upsides for as many days as heโฆcristi (70)inย programmingย โขย 7 years agoDisassembling Binaries with IDA - [A Reverse Engineering Tutorial]In my penetration testing training, I'm currently working on a vulnerable machine that doesn't seem to have too many ways in. There are only 2 open ports, both for web services. I was able toโฆjustblink (25)inย cybersecurityย โขย 7 years agoA brief, holistic view of (some) CybersecurityDisclaimer: I am not a seasoned veteran in Cybersecurity, I am simply someone who loves the field and wants to push their skills as far as possible within their favoured topics. Ultimately, nettingโฆtech.ninja (48)inย utopian-ioย โขย 7 years agoOPEN-SOURCE PROJECT: Remote control a power-wheelchair!This repo holds code to control power-wheelchairs with R-Net electronics. I want people to spread the word and maybe even make cool stuff with it... Some electronic wheelchairs use the sameโฆgaissa (43)inย programmingย โขย 8 years agoReverse Engineering One Line of JavaScript: Raytraced CheckboardPretty cool and educational. This guy Alex Kras reverse engineered this nice piece of a oneliner demo made by Mathie "p01" Henri . I just gotta love his work. What about an Ascii artโฆmiohtama (52)inย pokemongoย โขย 9 years agoReverse engineering Pokemon GoAdrien Couque from Appdium takes Pokemon Go Android APK distribution apart and shows what it takes to run the highest scalability mobile game ever. Nothing was obfuscated. Good to read if you wantโฆ