Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in reverse-engineering

How do I view the source code of a Gwbasic .bas file?

a = -2147483648 - a; compiler optimization

How to protect decryption key from decompilation?

Programmatically edit a Google doc with JavaScript

Windows Heap Chunk Header Parsing and Size Calculation

Why do Compilers put data inside .text(code) section of the PE and ELF files and how does the CPU distinguish between data and code?

Is there a tool to allow inspecting .NET objects in a running process?

.net reverse-engineering

Reverse Engineering a C# Solution

Reverse engineering on my simple C program

What are the key differences between IDA and x64dbg? [closed]

Disassembler for Linux capable of disassembling old DOS .COM/.EXE files

Why is ebx saved in the stack frame of a simple function, calling gets?

Binary Bomb - Phase 4

How does one disassemble Pro*C/C++ programs? [closed]

Differences between call, push+ret and push+jump in assembly

sub eax,0 - does it do anything?

Secure Java from reverse-engineering using industry grade encryption

How to check if binaries are built from particular sources

java reverse-engineering