Reverse engineering
Reverse engineering
Abstract This paper intended to teach sophisticated reverse engineering tactics, mainly by using Red Gate Reflector. This article demystifies dissembling and
November 13, 2013
Ajay Yadav
Reverse engineering
Distributed Computing Abstract[pkadzone zone="main_top"] This article covers the means of cross-process and cross-machine interaction of applications develop
November 05, 2013
Ajay Yadav
Reverse engineering
The objective of writing this paper is to explain how to crack an executable without peeping at its source code by using the OllyDbg tool. Although, there ar
November 01, 2013
Ajay Yadav
Reverse engineering
1. Introduction Session ID is used to identify the user of web application. It can be sent with the GET method. An attacker can send a link to the user wit
October 31, 2013
Dawid Czagan
Reverse engineering
Abstract As an application grows ever more complex, it is necessary to build a more efficient and faster .NET application that requires a special treatment
October 28, 2013
Ajay Yadav
Reverse engineering
This article shows how to perform tasks involving reading and writing files from various partitions by using the C#.net programming API. In particular, it co
October 10, 2013
Ajay Yadav
Reverse engineering
Before we go any further, I would like to focus on how a developer thinks and likes to manage a web application development process. During the developmen
October 08, 2013
Interference Security
Reverse engineering
The Bodgelt store The BodgeIt Store created by Psiinon is a vulnerable web application. It consists of a wide variety of vulnerabilities and is NOT intend
October 04, 2013
Interference Security
Reverse engineering
Microsoft Windows is a modular architecture. Windows Components are split into smaller pieces known as DLL (Dynamic-Link Library) and sys files (system files
October 02, 2013
D12d0x34X
Reverse engineering
Introduction Pin is a DBI framework for IA-32 and x86-64 architectures, which can be used for dynamic analysis of the binary program at run time. When using
September 30, 2013
Dejan Lukan- Exam Pass Guarantee
- Live expert instruction
- Hands-on labs
- CREA exam voucher
In this series
- Kali Linux: Top 8 tools for reverse engineering
- Stacks and Heap
- Top 8 reverse engineering tools for cyber security professionals [updated 2021]
- Arrays, Structs and Linked Lists
- Reverse engineering obfuscated assemblies [updated 2019]
- Crack Me Challenge Part 4 [Updated 2019]
- Writing windows kernel mode driver [Updated 2019]
- Assembly programming with Visual Studio.NET
- The basics of IDA pro
- Reverse engineering tools
- Hacking tools: Reverse engineering
- Reverse engineering a JavaScript obfuscated dropper
- Reverse Engineering – LAB 3
- Exploiting Protostar – Stack 0-3
- Reversing Binary: Spotting Bug without Source Code
- Reverse engineering virtual machine protected binaries
- Introduction to Reverse Engineering
- Pafish (Paranoid Fish)
- Extending Debuggers
- Encrypted code reverse engineering: Bypassing obfuscation
- Buffer Overflow Attack & Defense
- Invoking Assembly Code in C#
- iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)
- Hooking IDT
- A Guide to Debugging Android Binaries
- Kernel debugging with Qemu and WinDbg
- Shared Folders with Samba and Qemu
- Testing Hooks via the Windows Debugger – An Introduction to RevEngX
- Reverse Engineering with Reflector
- Applied Reverse Engineering with IDA Pro
- Injecting spyware in an EXE (code injection)
- Disassembler Mechanized Part 4: DLL Injector Development
- Disassembler Mechanized Part 3: Code Injection Operation
- Debugging TLS callbacks
- Disassembler Mechanized Part 2: Generating C# and MSIL code
- System address map initialization in x86/x64 architecture part 2: PCI express-based systems
- Coding of Disassembler
- Applied cracking & byte patching with IDA Pro
- .NET reversing with Reflexil
- Reversing firmware part 1
- Reverse Engineering with Reflector: Part 1
- Remoting Technology
- Reverse engineering with OllyDbg
- Understanding Session Fixation
- Optimizing Managed Code Execution
- File system manipulation
- The BodgeIt store part two
- The BodgeIt store part one
- Understanding Windows Internal Call Structure
- Pin: Dynamic Binary Instrumentation Framework
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!