Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Reverse Engineering Articles

Share an interesting blog, news page or other RE related site...

  1. Bidasci
    Started by Bidasci,

    I have renamed the program to ensure anonymity. Hello everyone. I am trying to debug this program that is compiled with py2exe (you can tell from the icon) But when I try to debug it (x64dbg and others) it does not show the text. When you first run the program it gives you 3 options. One is to start mining, 2nd is to Send coins, and 3rd is to Check balance or view your public key. What I expected is that when running in a debugger it would expose what server it connects to and other ways. I can tell that the program is created in python because when ran in a debugger it shows Py commands. I have tried a method known as unpy2exe to decompile it but when I…

      • Thanks
      • Like
    • 6 replies
    • 7.8k views
  2. Teddy Rogers
    Started by Teddy Rogers,

    https://www.uperesia.com/hancitor-packer-demystified Ted.

    • 2 replies
    • 6.7k views
  3. Teddy Rogers
    Started by Teddy Rogers,

    https://medium.com/@lduck11007/a-crash-course-in-everything-cryptographic-50daa0fda482 Ted.

    • 0 replies
    • 6k views
  4. whoknows
    Started by whoknows,

    https://youtu.be/Sv8yu12y5zM bonus - VSCodium - Binary releases of VS Code without MS branding/telemetry/licensing - hxxps://github.com/VSCodium/vscodium

    • 0 replies
    • 6.6k views
  5. DefCon42
    Started by DefCon42,

    Hey all! I recently came across this neat paper here: https://tel.archives-ouvertes.fr/tel-01623849/document where they used what they called "Mixed-Boolean Arithmetic" to obfuscate arithmetic expressions, and then showed ways to deobfuscate them. Looking a the deobfuscation methods, they seemed largely either pattern-based or wouldn't work when bigger numbers were involved. So I thought to myself, "How can I mess with this?" Well, first things first, they have no concrete method there for creating these expressions. There are two pages total dedicated to the creation of these expressions, so I had to get creative to make it work. They describe using n…

    • 1 reply
    • 6.9k views
  6. CodeExplorer
    Started by CodeExplorer,

    slugsnacks reversing series by c0lo: Link: https://kienmanowar.wordpress.com/slugsnacks-reversing-series-by-c0lo/slugsnacks-reversing-series-5/

    • 0 replies
    • 8.5k views
  7. CodeExplorer
    Started by CodeExplorer,

    Anti Debugging Protection Techniques With Examples: https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software

  8. RYDB3RG
    Started by RYDB3RG,

    Lets assume we have this code: test_proc proc VM_EAGLE_BLACK_START add rax, rcx add rax, rdx add rax, rsi add rax, rdi ret VM_EAGLE_BLACK_END test_proc endp So we have a single basicblock with multiple inputs: RAX, RCX, RDX, RSI, RDI and a single output: RAX. The protected version of that has about 10.000.000 instructions (Themida 2.4.6.0 demo). Lets run it through Unicorn and connect instructions via their sideeffects. While we are at it, lets assume we have an unlimited number of registers so we can remove memory indirections and connect instructions directly. Out of the initial 10mio instructions, how many contribute directly or ind…

  9. evilcry

    Reversing ALPC: Where are your windows bugs and sandbox escapes - https://sandboxescaper.blogspot.com/2018/10/reversing-alpc-where-are-your-windows.html

    • 0 replies
    • 5.9k views
  10. evilcry
    Started by evilcry,

    Reverse-Engineering WebAssembly binaries: https://www.forcepoint.com/blog/security-labs/analyzing-webassembly-binaries Best Regards, Evilcry

      • Like
    • 5 replies
    • 9.9k views
  11. kao
    Started by kao,

    The FireEye Labs Advanced Reverse Engineering (FLARE) team’s annual reverse engineering challenge will start at 8:00 p.m. ET on Aug. 24, 2018. This is a CTF-style challenge for all active and aspiring reverse engineers, malware analysts, and security professionals. So dust off your disassembler, put a new coat of oil on your old debugger, and get your favorite chat client ready to futilely beg your friends for help. Once again, this contest is designed for individuals, not teams, and it is a single track of challenges. The contest runs for six full weeks and ends at 8:00 p.m. ET on Oct. 5, 2018. This year’s contest will once again host a total of 12 challenges coveri…

      • Like
    • 29 replies
    • 18.3k views
    Extreme Coders
  12. evilcry
    Started by evilcry,

    Here you go: https://crackmes.one/ BR, Evilcry

    • 1 reply
    • 6.6k views
  13. Techlord

    Protecting RSA-based Protocols Against Adaptive Chosen-Ciphertext Attacks : Link to Full Article

    • 0 replies
    • 8.8k views
  14. Techlord
    Started by Techlord,

    Full Article here: An excerpt from the post:

    • 0 replies
    • 6k views
  15. loggedout

    I just came across to this video on YouTube and thought it will not be a bad idea to share it with the community, and I don't know if this is new for some people or not but...

      • Like
    • 6 replies
    • 8.6k views
  16. evilcry

    https://kbdsmoke.me/obtaining-unexported-function-addresses-using-exceptions BR, Evilcry

    • 0 replies
    • 5.3k views
  17. evilcry
    Started by evilcry,

    A malware explicitly designed to sabotage the computer systems of the Olympic opening ceremony, how infects,steal credentials, performs lateral movements to propagate across the network and destroy the victim machines. https://cyber.wtf/2018/03/28/dissecting-olympic-destroyer-a-walk-through BR, Evilcry

    • 0 replies
    • 5.6k views
  18. evilcry
    Started by evilcry,

    Hi, this is a really nice blog-post about using IDAPython to write an x86 emulator in order to solve (obtain) statically a challenge. http://0xeb.net/2018/02/writing-a-simple-x86-emulator-with-idapython

    • 0 replies
    • 5.7k views
  19. crystalboy
    Started by crystalboy,

    There you can find awesome articles on how to face FinSpy VM: http://www.msreverseengineering.com/blog/2018/1/23/a-walk-through-tutorial-with-code-on-statically-unpacking-the-finspy-vm-part-one-x86-deobfuscation https://www.welivesecurity.com/wp-content/uploads/2018/01/WP-FinFisher.pdf Credits to Rolf Rolles and Filip Kafka

      • Like
    • 8 replies
    • 14.9k views
  20. rubendodge
    Started by rubendodge,

    These couple hundred of tutorials also contains mainly game programming aswell . http://www.moviex.info/forums/index.php?ac...t=0#entry649239 NOTE:This website requires you to register at it to download stuff from it so register and enjoy first of all all these tutorials and second of all this great site to dl movies and stuff from .

    • 7 replies
    • 10.1k views
  21. Teddy Rogers
    Started by Teddy Rogers,

    White Rabbit crackme! https://hshrzd.wordpress.com/2018/02/03/white-rabbit-crackme/ Ted.

    • 0 replies
    • 6.5k views
  22. AGSKY
    Started by AGSKY,

    Print("hii") from math import math * Dec("1024)

    • 0 replies
    • 12.8k views
  23. Teddy Rogers
    Started by Teddy Rogers,

    Reverse engineering a Gameboy ROM with radare2 https://www.megabeets.net/reverse-engineering-a-gameboy-rom-with-radare2/ Ted.

    • 1 reply
    • 9.3k views
  24. CodeExplorer
    Started by CodeExplorer,

    LinuxReversing&Links: LinuxReversing.txt: small tutorial about reversing command for linux. LinuxReversingLinks.txt Maybe someone will find them usefull. I am not a linux expert! LinuxReversing&Links.zip

    • 0 replies
    • 6.9k views
  25. Teddy Rogers
    Started by Teddy Rogers,

    Introducing New Packing Method: First Reflective PE Packer Amber https://pentest.blog/introducing-new-packing-method-first-reflective-pe-packer/ Ted.

      • Like
    • 1 reply
    • 5.7k views

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.