Reverse engineering
Reverse engineering
Introduction When I was listening to the question and answer session at LinuxCon, there was some interesting discussion going on: some of the latest news inf
September 25, 2013
Dejan Lukan
Reverse engineering
Abstract The purpose of this article is to show how to bypass various security checks by modifying binary code directly, rather than source code, through th
September 23, 2013
Ajay Yadav
Reverse engineering
Between constant password breaches and the NSA looking in on everything you do, you've probably got privacy on the mind lately. If you're looking for a litt
September 13, 2013
Warlock
Reverse engineering
Introduction: Python is an open source, interactive, object oriented programming language. It's very easy to learn and an extremely powerful high level langu
September 04, 2013
arD3n7
Reverse engineering
Abstract This article delves into various aspects of memory access and management. There are distinctive categorizations of memory, for instance static data
August 13, 2013
Ajay Yadav
Reverse engineering
Introduction We have done lots of IL grammar so far. As I warned you earlier, Reverse engineering could be exercising both offensive and defensive motives.
August 06, 2013
Ajay Yadav
Reverse engineering
Introduction We shall explore round-trip engineering, which is one of the most advanced tactics to disassemble IL code in order to manipulate reverse engine
August 02, 2013
Ajay Yadav
Reverse engineering
Introduction We have taken tour of the syntax and semantics of raw CIL up till now. In this article, we shall be confronted with the rest of implementation
July 31, 2013
Ajay Yadav
Reverse engineering
Introduction The first Article of this series touched the most significant aspect of the MSIL code Instructions, for instance, how a program written in ILAS
July 26, 2013
Ajay Yadav
Reverse engineering
Introduction This article will give you a broad understanding of key networking concepts, such as ISO stack and TCP/IP, and how applications can logically an
July 19, 2013
Ajay Yadav- Exam Pass Guarantee
- Live expert instruction
- Hands-on labs
- CREA exam voucher
In this series
- Kali Linux: Top 8 tools for reverse engineering
- Stacks and Heap
- Top 8 reverse engineering tools for cyber security professionals [updated 2021]
- Arrays, Structs and Linked Lists
- Reverse engineering obfuscated assemblies [updated 2019]
- Crack Me Challenge Part 4 [Updated 2019]
- Writing windows kernel mode driver [Updated 2019]
- Assembly programming with Visual Studio.NET
- The basics of IDA pro
- Reverse engineering tools
- Hacking tools: Reverse engineering
- Reverse engineering a JavaScript obfuscated dropper
- Reverse Engineering – LAB 3
- Exploiting Protostar – Stack 0-3
- Reversing Binary: Spotting Bug without Source Code
- Reverse engineering virtual machine protected binaries
- Introduction to Reverse Engineering
- Pafish (Paranoid Fish)
- Extending Debuggers
- Encrypted code reverse engineering: Bypassing obfuscation
- Buffer Overflow Attack & Defense
- Invoking Assembly Code in C#
- iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)
- Hooking IDT
- A Guide to Debugging Android Binaries
- Kernel debugging with Qemu and WinDbg
- Shared Folders with Samba and Qemu
- Testing Hooks via the Windows Debugger – An Introduction to RevEngX
- Reverse Engineering with Reflector
- Applied Reverse Engineering with IDA Pro
- Injecting spyware in an EXE (code injection)
- Disassembler Mechanized Part 4: DLL Injector Development
- Disassembler Mechanized Part 3: Code Injection Operation
- Debugging TLS callbacks
- Disassembler Mechanized Part 2: Generating C# and MSIL code
- System address map initialization in x86/x64 architecture part 2: PCI express-based systems
- Coding of Disassembler
- Applied cracking & byte patching with IDA Pro
- .NET reversing with Reflexil
- Reversing firmware part 1
- Reverse Engineering with Reflector: Part 1
- Remoting Technology
- Reverse engineering with OllyDbg
- Understanding Session Fixation
- Optimizing Managed Code Execution
- File system manipulation
- The BodgeIt store part two
- The BodgeIt store part one
- Understanding Windows Internal Call Structure
- Pin: Dynamic Binary Instrumentation Framework
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!