Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Reverse Engineering Articles

Share an interesting blog, news page or other RE related site...

  1. Loki
    Started by Loki,

    The fourth annual Flare-On Challenge – the FireEye Labs Advanced Reverse Engineering (FLARE) team’s yearly reverse engineering contest – is scheduled to kick off on Sept. 1, 2017, at 8pm ET. This is a CTF-style challenge for all active and aspiring reverse engineers, malware analysts, and security professionals. Dust off your disassembler, put a new coat of oil on your old debugger, and get your favorite chat client ready to futilely beg your friends for help. As always, this contest is designed for individuals, not teams, and there is only one track of challenges. The contest runs for six full weeks and ends on Oct. 13, 2017, at 8pm ET. This year’s contest is the la…

    • 0 replies
    • 7.6k views
  2. secursig

    interesting research showing methods used to develop jailbreaks and dump apple watch kernel https://speakerdeck.com/mbazaliy/jailbreaking-apple-watch code posted to decrypt/dump the OS that handles all the secure stuff in your iphone. very cool. http://www.iclarified.com/62025/hacker-decrypts-apples-secure-enclave-processor-sep-firmware code: https://github.com/xerub/img4lib massive contribution by xerub

    • 0 replies
    • 6.1k views
  3. crystalboy
    Started by crystalboy,

    Official site: http://labyrenth.com/Announcement: https://researchcenter.paloaltonetworks.com/2017/04/unit42-labyrenth-ctf-2017/

      • Like
    • 92 replies
    • 39.2k views
  4. Loki
    Started by Loki,

    Following the publication of a paper which proves that using 'mov' is turing complete (http://www.cl.cam.ac.uk/~sd601/papers/mov.pdf) someone has written a mov only compiler.

      • Like
    • 13 replies
    • 15.5k views
  5. whoknows
    Started by whoknows,

    https://nationalsecurityagency.github.io/ src - https://nakedsecurity.sophos.com/2017/06/21/news-in-brief-wannacry-knocks-out-honda-plant-skype-hit-by-global-outage-nsa-shares-tools-on-github/

    • 0 replies
    • 6.3k views
  6. whoknows
    Started by whoknows,

    http://www.hexblog.com/?p=1096

    • 1 reply
    • 6k views
  7. Techlord
    Started by Techlord,

    Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping : Get it HERE . Targeting Infeasibility Questions on Obfuscated Codes : Get it HERE .

      • Like
    • 1 reply
    • 6.1k views
    XenocodeRCE
  8. Techlord

    Scary new malware can take over your Android phone and you won’t even know it

      • Like
    • 1 reply
    • 5.8k views
  9. Techlord

    Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution

    • 0 replies
    • 5.2k views
  10. yashka

    Hi Guys. Course is done, there are currently 59 chapters. https://www.youtube.com/playlist?list=PL59fvn5FIiQG0CrnALLgXzdpDTOk0hrz2

      • Like
    • 5 replies
    • 7.7k views
  11. imaqt
    Started by imaqt,

    Hello everyone, the "shabak" (israel security office have posted 3 challenges on their website. iv managed to solve the first 2 and now im hard stuck on this last one. they gave a huge hint there but im still unable to solve this. Im really curious how the 3rd one works and ill ne glad if someone will be able to teach me. Have fun!, ill add the other 2 executables just for the sport. Password: Challenge Airplane_1_the_best_researcher.rar Airplane_2_should_work.rar Airplane_3_with_the_best.rar

    • 2 replies
    • 8.2k views
  12. Teddy Rogers
    Started by Teddy Rogers,

    Android Applications Reversing 101 https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/ Ted.

    • 0 replies
    • 5.9k views
  13. whoknows
    Started by whoknows,

    NSA-leaking Shadow Brokers just dumped its most damaging release yet (15/April) https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/ Analyzing the doublepulsar kernel dll injection technique https://countercept.com/our-thinking/analyzing-the-doublepulsar-kernel-dll-injection-technique/ DoublePulsar Initial SMB Backdoor Ring 0 Shellcode Analysis https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html

    • 0 replies
    • 6.2k views
  14. Techlord
    Started by Techlord,

    NSA Exploit Kit (Decrypted Files) - Confirmed by Snowden Himself on TWITTER to be the REAL DEAL : As can be seen from this news article from August last year : Hackers Steal NSA Exploit Kit and Put it up for Auction , there were TWO sets of archives that contained the "Spying Tools" of the NSA. The FREE version was made available last year itself. The OTHER one (nicknamed the "Auction Version") was been sold for huge sums of money (Around 100 bitcoins). Yesterday, the decrypted files from the AUCTION version were also released. Link to Decrypted Version of the AUCTION FILES ARCHIVE files : Code: https://github.com/x0rz/EQGRP The Decryp…

    • 0 replies
    • 6.8k views
  15. whoknows

    https://blog.flanker017.me/cve-2017-2416-gif-remote-exec/

    • 0 replies
    • 5k views
  16. whoknows

    https://blog.fortinet.com/2017/04/05/how-to-repair-a-dex-file-in-which-some-key-methods-are-erased-with-nops

    • 0 replies
    • 5.1k views
  17. Teddy Rogers
    Started by Teddy Rogers,

    Explained: Packer, Crypter, and Protector https://blog.malwarebytes.com/cybercrime/malware/2017/03/explained-packer-crypter-and-protector/ Ted.

    • 0 replies
    • 6k views
  18. Teddy Rogers
    Started by Teddy Rogers,

    What are exploits? (And why you should care) https://blog.malwarebytes.com/101/2017/03/what-are-exploits-and-why-you-should-care/ Ted.

    • 0 replies
    • 5.1k views
  19. Teddy Rogers
    Started by Teddy Rogers,

    The AnC Attack https://www.vusec.net/projects/anc/ Ted.

    • 1 reply
    • 12.5k views
  20. Teddy Rogers
    Started by Teddy Rogers,

    Practical Android Debugging via KGDB http://blog.trendmicro.com/trendlabs-security-intelligence/practical-android-debugging-via-kgdb/ Ted.

    • 0 replies
    • 6.9k views
  21. Teddy Rogers
    Started by Teddy Rogers,

    Technical developments in Cryptography: 2016 in Review https://www.eff.org/deeplinks/2016/12/what-happened-crypto-2016 Ted.

    • 0 replies
    • 6.2k views
  22. SkyProud
    Started by SkyProud,

    This blog post talks about some tips of using the Reflexil plugin. http://dotnetthoughts.net/how-to-reverse-engineer-net-applications-a-quick-guide/

    • 0 replies
    • 7.1k views
  23. HellRaider
    Started by HellRaider,

    These are some really nice tutorial that i found on Crypto... http://resources.infosecinstitute.com/breaking-software-protection-rsa/ http://resources.infosecinstitute.com/breaking-software-protection-elgamal-signature-scheme/ http://resources.infosecinstitute.com/breaking-software-protection-dsadss/ Thanks

    • 2 replies
    • 7.3k views
  24. Sniper.ps
    Started by Sniper.ps,

    Hello Guys am ask about the Paul Mason All his great Tutrials because his blog removed before a time the tutrials talk about many thing in .net reverse engineering ,but some links and pictures did not works this is the blog from web archive https://web.archive.org/web/20101204034644/http://blog.paul-mason.co.nz/ Thank of all

    • 0 replies
    • 5.5k views
  25. Bartosz Wójcik
    Started by Bartosz Wójcik,

    With the growing popularity of CTF (capture the flag) competitions, and the excellent performance of Polish teams like Dragon Sector in this area, I thought it would be interesting to demonstrate the construction of a simple CrackMe, using some creative techniques which make it difficult to crack and analyse. If you have ever been curious about reverse engineering, entered a CTF competition, or wanted to create your own CrackMe and drive other contestants crazy, this article is for you. https://www.pelock.com/articles/how-to-write-a-crackme-for-a-ctf-competition Sources at GitHub with english comments https://github.com/PELock/CrackMeZ3S-CTF-Crac…

    • 0 replies
    • 6.3k views
    Bartosz Wójcik

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.