Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

All Activity

This stream auto-updates

  1. Past hour
  2. 333
    333 joined the community
  3. BLOACKC0DE
    BLOACKC0DE joined the community
  4. Today
  5. lixu
    lixu joined the community
  6. osmanaga
    osmanaga joined the community
  7. lovejoy226 started following was._it_.me
  8. Yesterday
  9. catalina
    catalina joined the community
  10. shane
    shane joined the community
  11. blabla
    blabla joined the community
  12. 0xman
    Here is little video i can make. tool I use.rar
  13. Last week
  14. Torraske
    Torraske replied to Washi's topic in Reverse Engineering Articles
    Yes unbelievable... what happened this year?
  15. daliaimperialis
    damn it's already been taken down :/ thank you for trying to upload it anyways!
  16. NorthernLight
    NorthernLight replied to lengyue's topic in UnPackMe
    Highly appreciate if someone could upload a video tutorial regarding this topic. So that newbies like can at least pick up few ideas how things work. Thank you very much
  17. fu1grim
    fu1grim posted a topic in x64dbg
    What is the fastest way of finding OEP? Are there any specific techniques you guys use for this?
  18. xlatb
    xlatb changed their profile photo
  19. Earlier
  20. xdbruh1234
    xdbruh1234 replied to Washi's topic in Reverse Engineering Articles
    the prize is a fornicationin tote bag T.T hell nah
  21. xetsu
    xetsu changed their profile photo
  22. Torraske
    Torraske replied to Washi's topic in Reverse Engineering Articles
    Look at how it checks if the order is correct
  23. adicto
    adicto replied to Washi's topic in Reverse Engineering Articles
    For challenge 9. Any tips on how to find out dll load order?
  24. fu1grim
    Awesome analysis, would like to see more. I'm myself into the water of reversing, hopefully cracking denuvo.
  25. dbrown
    dbrown replied to Washi's topic in Reverse Engineering Articles
    try to do all with python 3.12
  26. Washi
    Washi replied to Washi's topic in Reverse Engineering Articles
    Hey! Some rabbit holes are fun to dive into. And sometimes you also don't realize you are in a rabbit hole 🙃 (Definitely guilty of that myself here 😅)
  27. maracucho
    maracucho commented on Teddy Rogers's file in Tools & Utilities
    hi, serial please?
  28. kao
    kao replied to Washi's topic in Reverse Engineering Articles
    @Rurik : riiight! 😂 Some people leave no stone unturned and analyze each challenge in details. Good for them. 👍 But me, I've lost count how many easter eggs I did not find over the years...
  29. Rurik
    Rurik replied to Washi's topic in Reverse Engineering Articles
    TIL people actually 'solved' four instead of it solving itself
  30. kao
    kao replied to Washi's topic in Reverse Engineering Articles
    @Pau1 : random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. You went in the wrong direction.
  31. Pau1
    Pau1 replied to Washi's topic in Reverse Engineering Articles
    I'm a bit stuck on ch4 I've reversed the .exe and found the part where it takes the file version, XORs it with 0x6746, and then runs it through an LCG and a modulo operation. This seems to generate a file index and a value to XOR with that file. I've already generated the results for the 100 versions after 150, but I'm still not seeing the connection to the flag. I feel like I'm missing something obvious. Could you give me a nudge in the right direction? Any help would be appreciated, thanks!
  32. Anticataclyst
    Anticataclyst changed their profile photo
  33. kao
    At least search results are not featured prominently at the top of the main page.. 😄 Hopefully it all will be resolved someday.. Thanks Ted!
  34. Rurik
    Rurik replied to Washi's topic in Reverse Engineering Articles
    @NoHayShark Sometimes malware does silly things that don't make sense. Assume the operator is dumb.
  35. NoHayShark
    NoHayShark replied to Washi's topic in Reverse Engineering Articles
    I think I'm in the same boat with 75%. I see where a value could potentially be changed, but it looks like it's being set to the same exact thing. Would you mind giving me a nudge?
  36. Teddy Rogers
    This is a known issue, and there is an open bug report with the Invision team to have it resolved. Spoiler contents are also visible in search results too... Ted.
  37. kao
    When we put a text into spoiler block, the natural assumption would be that it's hidden until someone intentionally clicks to open it. Currently, it doesn't work like in the sidebar:
  38. kao
    kao replied to Washi's topic in Reverse Engineering Articles
    @lpu random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. You shouldn't be making any assumptions - it's a crypto problem, not a guessing game. You were given all the data you need to solve it.
  39. lpu
    lpu replied to Washi's topic in Reverse Engineering Articles
    Could really do with a nudge in the right direction for ch6, been working at it for a few days now and feel like I'm very close but missing something critical. I'm 99% certain I understand the logic and have re-implemented locally off-chain and can decrypt my own conversations for both modes but it won't work for the provided logs (seems a few people have hit this point). I've also adjusted my code in a few different ways based on assumptions about the chat logs being a two way conversation, e.g. the message count may vary at each end of the convo as would the conversation time, there might be two rsa keys etc, but still not having any success. At this stage I'm looking at trying to derive the lcg parameters, assuming none of the given states in the chat logs are actually the seed, but that seems to be mathematically very difficult.
  40. naveenkancharla
    can you please share devirtualization working tool for dotnet reactor
  41. sm0k
    sm0k commented on m!x0r's file in Tools & Utilities
    Thanks bro

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.