Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Reverse Engineering Articles

Share an interesting blog, news page or other RE related site...

  1. whoknows
    Started by whoknows,

    https://medium.com/syscall59/solved-solving-mexican-crackme-82d71a28e189

    • 0 replies
    • 7.2k views
  2. Artic

    i have noticed there are no real good information about how to get started with OSX reversing. i hope thats a little overview and will help any OSX reversing newbies. (im an OSX newbie myself) a few mac crackmes http://reverse.put.as/crackmes/ RCE for newbies on MAC http://reverse.put.as/2011/02/12/universes-best-and-legal-mac-os-x-reversing-tutorial-for-newbies-or-maybe-not/ (here is the text file on pastebin posted: http://pastebin.com/vqJBfDcX ) part I was removed because it contains a commercial program - maybe i can find it somewhere. Tools for OSX reversing http://reverse.put.as/tools/ (the page is holding local copies of the non commercial tools) …

    • 2 replies
    • 8.3k views
  3. Bidasci
    Started by Bidasci,

    I have renamed the program to ensure anonymity. Hello everyone. I am trying to debug this program that is compiled with py2exe (you can tell from the icon) But when I try to debug it (x64dbg and others) it does not show the text. When you first run the program it gives you 3 options. One is to start mining, 2nd is to Send coins, and 3rd is to Check balance or view your public key. What I expected is that when running in a debugger it would expose what server it connects to and other ways. I can tell that the program is created in python because when ran in a debugger it shows Py commands. I have tried a method known as unpy2exe to decompile it but when I…

      • Thanks
      • Like
    • 6 replies
    • 7.9k views
  4. Teddy Rogers
    Started by Teddy Rogers,

    https://www.uperesia.com/hancitor-packer-demystified Ted.

    • 2 replies
    • 6.7k views
  5. Teddy Rogers
    Started by Teddy Rogers,

    https://medium.com/@lduck11007/a-crash-course-in-everything-cryptographic-50daa0fda482 Ted.

    • 0 replies
    • 6k views
  6. whoknows
    Started by whoknows,

    https://youtu.be/Sv8yu12y5zM bonus - VSCodium - Binary releases of VS Code without MS branding/telemetry/licensing - hxxps://github.com/VSCodium/vscodium

    • 0 replies
    • 6.7k views
  7. DefCon42
    Started by DefCon42,

    Hey all! I recently came across this neat paper here: https://tel.archives-ouvertes.fr/tel-01623849/document where they used what they called "Mixed-Boolean Arithmetic" to obfuscate arithmetic expressions, and then showed ways to deobfuscate them. Looking a the deobfuscation methods, they seemed largely either pattern-based or wouldn't work when bigger numbers were involved. So I thought to myself, "How can I mess with this?" Well, first things first, they have no concrete method there for creating these expressions. There are two pages total dedicated to the creation of these expressions, so I had to get creative to make it work. They describe using n…

    • 1 reply
    • 7k views
  8. CodeExplorer
    Started by CodeExplorer,

    slugsnacks reversing series by c0lo: Link: https://kienmanowar.wordpress.com/slugsnacks-reversing-series-by-c0lo/slugsnacks-reversing-series-5/

    • 0 replies
    • 8.5k views
  9. CodeExplorer
    Started by CodeExplorer,

    Anti Debugging Protection Techniques With Examples: https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software

  10. RYDB3RG
    Started by RYDB3RG,

    Lets assume we have this code: test_proc proc VM_EAGLE_BLACK_START add rax, rcx add rax, rdx add rax, rsi add rax, rdi ret VM_EAGLE_BLACK_END test_proc endp So we have a single basicblock with multiple inputs: RAX, RCX, RDX, RSI, RDI and a single output: RAX. The protected version of that has about 10.000.000 instructions (Themida 2.4.6.0 demo). Lets run it through Unicorn and connect instructions via their sideeffects. While we are at it, lets assume we have an unlimited number of registers so we can remove memory indirections and connect instructions directly. Out of the initial 10mio instructions, how many contribute directly or ind…

  11. evilcry

    Reversing ALPC: Where are your windows bugs and sandbox escapes - https://sandboxescaper.blogspot.com/2018/10/reversing-alpc-where-are-your-windows.html

    • 0 replies
    • 6k views
  12. evilcry
    Started by evilcry,

    Reverse-Engineering WebAssembly binaries: https://www.forcepoint.com/blog/security-labs/analyzing-webassembly-binaries Best Regards, Evilcry

      • Like
    • 5 replies
    • 10k views
  13. kao
    Started by kao,

    The FireEye Labs Advanced Reverse Engineering (FLARE) team’s annual reverse engineering challenge will start at 8:00 p.m. ET on Aug. 24, 2018. This is a CTF-style challenge for all active and aspiring reverse engineers, malware analysts, and security professionals. So dust off your disassembler, put a new coat of oil on your old debugger, and get your favorite chat client ready to futilely beg your friends for help. Once again, this contest is designed for individuals, not teams, and it is a single track of challenges. The contest runs for six full weeks and ends at 8:00 p.m. ET on Oct. 5, 2018. This year’s contest will once again host a total of 12 challenges coveri…

      • Like
    • 29 replies
    • 18.4k views
    Extreme Coders
  14. evilcry
    Started by evilcry,

    Here you go: https://crackmes.one/ BR, Evilcry

    • 1 reply
    • 6.6k views
  15. Techlord

    Protecting RSA-based Protocols Against Adaptive Chosen-Ciphertext Attacks : Link to Full Article

    • 0 replies
    • 8.9k views
  16. Techlord
    Started by Techlord,

    Full Article here: An excerpt from the post:

    • 0 replies
    • 6.1k views
  17. loggedout

    I just came across to this video on YouTube and thought it will not be a bad idea to share it with the community, and I don't know if this is new for some people or not but...

      • Like
    • 6 replies
    • 8.6k views
  18. evilcry

    https://kbdsmoke.me/obtaining-unexported-function-addresses-using-exceptions BR, Evilcry

    • 0 replies
    • 5.3k views
  19. evilcry
    Started by evilcry,

    A malware explicitly designed to sabotage the computer systems of the Olympic opening ceremony, how infects,steal credentials, performs lateral movements to propagate across the network and destroy the victim machines. https://cyber.wtf/2018/03/28/dissecting-olympic-destroyer-a-walk-through BR, Evilcry

    • 0 replies
    • 5.7k views
  20. evilcry
    Started by evilcry,

    Hi, this is a really nice blog-post about using IDAPython to write an x86 emulator in order to solve (obtain) statically a challenge. http://0xeb.net/2018/02/writing-a-simple-x86-emulator-with-idapython

    • 0 replies
    • 5.8k views
  21. crystalboy
    Started by crystalboy,

    There you can find awesome articles on how to face FinSpy VM: http://www.msreverseengineering.com/blog/2018/1/23/a-walk-through-tutorial-with-code-on-statically-unpacking-the-finspy-vm-part-one-x86-deobfuscation https://www.welivesecurity.com/wp-content/uploads/2018/01/WP-FinFisher.pdf Credits to Rolf Rolles and Filip Kafka

      • Like
    • 8 replies
    • 14.9k views
  22. rubendodge
    Started by rubendodge,

    These couple hundred of tutorials also contains mainly game programming aswell . http://www.moviex.info/forums/index.php?ac...t=0#entry649239 NOTE:This website requires you to register at it to download stuff from it so register and enjoy first of all all these tutorials and second of all this great site to dl movies and stuff from .

    • 7 replies
    • 10.1k views
  23. Teddy Rogers
    Started by Teddy Rogers,

    White Rabbit crackme! https://hshrzd.wordpress.com/2018/02/03/white-rabbit-crackme/ Ted.

    • 0 replies
    • 6.5k views
  24. AGSKY
    Started by AGSKY,

    Print("hii") from math import math * Dec("1024)

    • 0 replies
    • 12.9k views
  25. Teddy Rogers
    Started by Teddy Rogers,

    Reverse engineering a Gameboy ROM with radare2 https://www.megabeets.net/reverse-engineering-a-gameboy-rom-with-radare2/ Ted.

    • 1 reply
    • 9.4k views

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.