Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in reverse-engineering

Semantics of __imp_ symbols

What's the difference between the import table, import adress table, and import name table?

How C header files import win32api functions?

is obfuscated C# or Java easier to decompile than C because of stack machine - register machine difference? or are there other reasons?

Reverse-engineering a virtual method that only XORs the low byte of EAX before returning

What's the best practice to reverse engineering a binary file in windows? [closed]

c++ reverse-engineering

Convert large amount of code to data in IDA

what is the base relocation table in the PE file format?

How would I monitor Pokemon Go's Http requests?

Detecting debugger on Mac OS X

whatsapp sniffing ssl traffic with wireshark

protect python code from reverse engineering

How can I determine which framework was used to build a particular Windows desktop application?

C# - Executables decompilable (can be reverse engineered)?

c# c++ reverse-engineering

Hacker proofing a jar file

java reverse-engineering