Reverse Engineering Articles
Share an interesting blog, news page or other RE related site...
350 topics in this forum
-
LabyREnth Capture the Flag (CTF) Challenge - 2017 1 2 3 4
by crystalboy- 92 replies
- 36.2k views
Official site: http://labyrenth.com/Announcement: https://researchcenter.paloaltonetworks.com/2017/04/unit42-labyrenth-ctf-2017/
-
movfuscator
by Loki- 13 replies
- 14.4k views
Following the publication of a paper which proves that using 'mov' is turing complete (http://www.cl.cam.ac.uk/~sd601/papers/mov.pdf) someone has written a mov only compiler.
-
NSA posts tools on GitHub
by whoknows- 0 replies
- 5.6k views
https://nationalsecurityagency.github.io/ src - https://nakedsecurity.sophos.com/2017/06/21/news-in-brief-wannacry-knocks-out-honda-plant-skype-hit-by-global-outage-nsa-shares-tools-on-github/
-
IDA Pro: News about the x64 edition
by whoknows- 1 reply
- 5.5k views
http://www.hexblog.com/?p=1096
-
A Couple of Nice Papers
by Techlord- 1 reply
- 5.6k views
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping : Get it HERE . Targeting Infeasibility Questions on Obfuscated Codes : Get it HERE .
-
- 1 reply
- 5.1k views
Scary new malware can take over your Android phone and you won’t even know it
-
- 0 replies
- 4.7k views
Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution
-
- 5 replies
- 7.1k views
Hi Guys. Course is done, there are currently 59 chapters. https://www.youtube.com/playlist?list=PL59fvn5FIiQG0CrnALLgXzdpDTOk0hrz2
-
CrackMe - Anti-Debug
by imaqt- 2 replies
- 7.6k views
Hello everyone, the "shabak" (israel security office have posted 3 challenges on their website. iv managed to solve the first 2 and now im hard stuck on this last one. they gave a huge hint there but im still unable to solve this. Im really curious how the 3rd one works and ill ne glad if someone will be able to teach me. Have fun!, ill add the other 2 executables just for the sport. Password: Challenge Airplane_1_the_best_researcher.rar Airplane_2_should_work.rar Airplane_3_with_the_best.rar
-
Android Applications Reversing 101
by Teddy Rogers- 0 replies
- 5.3k views
Android Applications Reversing 101 https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/ Ted.
-
- 0 replies
- 5.7k views
NSA-leaking Shadow Brokers just dumped its most damaging release yet (15/April) https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/ Analyzing the doublepulsar kernel dll injection technique https://countercept.com/our-thinking/analyzing-the-doublepulsar-kernel-dll-injection-technique/ DoublePulsar Initial SMB Backdoor Ring 0 Shellcode Analysis https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html
-
NSA Exploit Kit (Decrypted Files)
by Techlord- 0 replies
- 6.3k views
NSA Exploit Kit (Decrypted Files) - Confirmed by Snowden Himself on TWITTER to be the REAL DEAL : As can be seen from this news article from August last year : Hackers Steal NSA Exploit Kit and Put it up for Auction , there were TWO sets of archives that contained the "Spying Tools" of the NSA. The FREE version was made available last year itself. The OTHER one (nicknamed the "Auction Version") was been sold for huge sums of money (Around 100 bitcoins). Yesterday, the decrypted files from the AUCTION version were also released. Link to Decrypted Version of the AUCTION FILES ARCHIVE files : Code: https://github.com/x0rz/EQGRP The Decryp…
-
Remote code execution triggered by malformed GIF in ImageIO framework, affecting most iOS/macOS apps
by whoknows- 0 replies
- 4.4k views
https://blog.flanker017.me/cve-2017-2416-gif-remote-exec/
-
- 0 replies
- 4.6k views
https://blog.fortinet.com/2017/04/05/how-to-repair-a-dex-file-in-which-some-key-methods-are-erased-with-nops
-
Explained: Packer, Crypter, and Protector
by Teddy Rogers- 0 replies
- 5.5k views
Explained: Packer, Crypter, and Protector https://blog.malwarebytes.com/cybercrime/malware/2017/03/explained-packer-crypter-and-protector/ Ted.
-
What are exploits? (And why you should care)
by Teddy Rogers- 0 replies
- 4.5k views
What are exploits? (And why you should care) https://blog.malwarebytes.com/101/2017/03/what-are-exploits-and-why-you-should-care/ Ted.
-
The AnC Attack...
by Teddy Rogers- 1 reply
- 11.9k views
The AnC Attack https://www.vusec.net/projects/anc/ Ted.
-
Practical Android Debugging via KGDB...
by Teddy Rogers- 0 replies
- 6.3k views
Practical Android Debugging via KGDB http://blog.trendmicro.com/trendlabs-security-intelligence/practical-android-debugging-via-kgdb/ Ted.
-
Technical developments in Cryptography: 2016 in Review
by Teddy Rogers- 0 replies
- 5.7k views
Technical developments in Cryptography: 2016 in Review https://www.eff.org/deeplinks/2016/12/what-happened-crypto-2016 Ted.
-
- 0 replies
- 6.5k views
This blog post talks about some tips of using the Reflexil plugin. http://dotnetthoughts.net/how-to-reverse-engineer-net-applications-a-quick-guide/
-
Breaking Software Protection - Cryptosystem
by HellRaider- 2 replies
- 6.6k views
These are some really nice tutorial that i found on Crypto... http://resources.infosecinstitute.com/breaking-software-protection-rsa/ http://resources.infosecinstitute.com/breaking-software-protection-elgamal-signature-scheme/ http://resources.infosecinstitute.com/breaking-software-protection-dsadss/ Thanks
-
Paul Mason Tutrials
by Sniper.ps- 0 replies
- 4.8k views
Hello Guys am ask about the Paul Mason All his great Tutrials because his blog removed before a time the tutrials talk about many thing in .net reverse engineering ,but some links and pictures did not works this is the blog from web archive https://web.archive.org/web/20101204034644/http://blog.paul-mason.co.nz/ Thank of all
-
How to write a CrackMe for a CTF competition
by Bartosz Wójcik- 0 replies
- 5.6k views
With the growing popularity of CTF (capture the flag) competitions, and the excellent performance of Polish teams like Dragon Sector in this area, I thought it would be interesting to demonstrate the construction of a simple CrackMe, using some creative techniques which make it difficult to crack and analyse. If you have ever been curious about reverse engineering, entered a CTF competition, or wanted to create your own CrackMe and drive other contestants crazy, this article is for you. https://www.pelock.com/articles/how-to-write-a-crackme-for-a-ctf-competition Sources at GitHub with english comments https://github.com/PELock/CrackMeZ3S-CTF-Crac…
-
- 0 replies
- 7.9k views
https://www.reverzor.com/ Universal Cloud Decompiler The first cloud based tool that decompiles almost everything! Decompile files on the fly, from everywhere, and on every device. PHP Encoded Reverzor can decompile most PHP encoded files. Examples are ionCube, Zend Guard, bCompiler bz2, TrueBug, Nu-Coder, MMCache, eAccelerator and more! .NET Binaries Reverzor can decompile all the latest C# and VB compiled related files, including EXE and DLLs. You are able to recover the full SLN project file for Visual Studio. Android APK Reverzor can decompile up to the latest Android apps, recovering almost all compiled binaries in to source files. Inc…
-
- 0 replies
- 9.9k views
By default PowerShell is configured to prevent the execution of PowerShell scripts on Windows systems. This can be a hurdle for penetration testers, sysadmins, and developers, but it doesn't have to be. In this blog I'll cover 15 ways to bypass the PowerShell execution policy without having local administrator rights on the system. I'm sure there are many techniques that I've missed (or simply don't know about), but hopefully this cheat sheet will offer a good start for those who need it. What is the PowerShell Execution Policy? The PowerShell execution policy is the setting that determines which type of PowerShell scripts (if any) can be run on the system. By de…