- I bought IDAPro and I really didn't expect this... Need help http://hex-rays.com/ida-pro 5 comments reverseengineering
Linking pages
- Python Malware Starting to Employ Anti-Debug Techniques https://jfrog.com/blog/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques/ 104 comments
- Should We Chat, Too? Security Analysis of WeChat’s MMTLS Encryption Protocol - The Citizen Lab https://citizenlab.ca/2024/10/should-we-chat-too-security-analysis-of-wechats-mmtls-encryption-protocol/ 92 comments
- Reviving the coolest scanner you've never heard of · Kai Kaufman's tech blog https://ktkaufman03.github.io/blog/2022/09/04/pakon-reverse-engineering/ 80 comments
- Reverse engineering and removing Pokémon GO’s certificate pinning https://eaton-works.com/2016/07/31/reverse-engineering-and-removing-pokemon-gos-certificate-pinning/ 63 comments
- “Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping - The Citizen Lab https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/ 53 comments
- G-3PO: A Protocol Droid for Ghidra | by Olivia Lucca Fraser | Tenable TechBlog | Medium https://medium.com/tenable-techblog/g-3po-a-protocol-droid-for-ghidra-4b46fa72f1ff 52 comments
- Announcing version 7.6 for IDA Freeware! – Hex Rays https://www.hex-rays.com/blog/announcing-version-7-6-for-ida-freeware/ 43 comments
- Fast reciprocal square root... in 1997?! - Shane Peelar's Blog https://inbetweennames.net/blog/2021-05-06-i76rsqrt/ 39 comments
- All Your Base Are [Still] Belong To Us | RET2 Systems Blog http://blog.ret2.io/2021/07/21/wtf-snapshot-fuzzing/ 14 comments
- Reverse engineering a GameBoy Advance game — Complete Guide | by Bruno Macabeus | ITNEXT https://macabeus.medium.com/reverse-engineering-a-gameboy-advance-game-complete-guide-c2fca11f9e59?amp%3Bsk=c3fc1f8bf04975522f08d3805d400243&source=friends_link 14 comments
- GitHub - mikeroyal/Open-Source-Security-Guide: Open Source Security Guide. Learn all about Security Standards, Frameworks, Threat Models, Encryption, and Benchmarks. https://github.com/mikeroyal/Open-Source-Security-Guide 11 comments
- Should We Chat? Privacy in the WeChat Ecosystem - The Citizen Lab https://citizenlab.ca/2023/06/privacy-in-the-wechat-ecosystem-full-report/ 3 comments
- The not-so-silent type: Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers - The Citizen Lab https://citizenlab.ca/2024/04/vulnerabilities-across-keyboard-apps-reveal-keystrokes-to-network-eavesdroppers/ 3 comments
- GitHub - airbus-cert/Yagi: Yet Another Ghidra Integration for IDA https://github.com/airbus-cert/Yagi 2 comments
- GitHub - Martyx00/CollaRE: Multi-tool reverse engineering collaboration solution. https://github.com/martyx00/collare 2 comments
- GitHub - user1342/Awesome-Android-Reverse-Engineering: A curated list of awesome Android Reverse Engineering training, resources, and tools. https://github.com/user1342/Awesome-Android-Reverse-Engineering 2 comments
- Preserving Your Digital Sandcastles with an IDA Plugin - Cra0 - Software Engineer https://cra0.net/blog/posts/ida-plugin-for-function-signature-preservation/ 2 comments
- Annotating Malware Disassembly Functions Using Neural Machine Translation | Mandiant https://www.mandiant.com/resources/annotating-malware-disassembly-functions 1 comment
- GitHub - mikeroyal/Digital-Forensics-Guide: Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics. https://github.com/mikeroyal/Digital-Forensics-Guide 1 comment
- Cracking a 35 year old Macintosh Game | by Don Barber | Medium https://barberd.medium.com/cracking-a-35-year-old-macintosh-game-2a079a3a2422 1 comment
Related searches:
Search whole site: site:hex-rays.com
Search title: Hex Rays - State-of-the-art binary code analysis solutions
See how to search.