Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Reverse Engineering Articles

Share an interesting blog, news page or other RE related site...

  1. Encrypto
    Started by Encrypto,

    Hi everyone, This challenge has been running the past couple of days and I think many of you here will find this of interest. Its open till the 18th of July so it would be advisable to not give out any solutions until that date has passed. http://cybersecuritychallenge.org.uk/competitors/competitions-overview/ Have fun! Its seriously interesting and challenging.

    • 4 replies
    • 9k views
  2. jallvar
    Started by jallvar,

    How to determine the method of obfuscation?

      • Like
    • 9 replies
    • 7.8k views
  3. flamshlo
    Started by flamshlo,

    snd-reversingwithlena-tutorial03.tutorial. i think there is an error in the tutorial, where nops are added starting at address 401039. it is obvious (to me) that the nops start at one previous instruction at 401034. these tutorials are fabulous. i would like to point out that to move the explanations along there is no need to keep pressing the mouse in the right corner. there is a step key at the bottom of each tutorial for moving in BOTH directions without having to exit the tutorial. i am using chrome and have enabled the SWF file to run without using the htm format. if someone has pointed out the error please ignore this essay.

    • 1 reply
    • 5.7k views
  4. Teddy Rogers
    Started by Teddy Rogers,

    Ios App Reverse Engineering Sample: https://www.dropbox.com/s/on5f1yy9cq0wuvd/iOSAppReverseEngineering_Sample.pdf http://iosre.com/t/ios-app-reverse-engineering-the-worlds-1st-book-of-very-detailed-ios-app-reverse-engineering-skills/1117 Ted.

    • 1 reply
    • 6.1k views
  5. real-wife
    Started by real-wife,

    Hello, I did use Net reflector and 9RAYS spices decompiler but delegates methods are problematic.. Any help? Kisses

    • 3 replies
    • 8.5k views
  6. Levis
    Started by Levis,

    Original Post: crackme2015.zip

    • 9 replies
    • 12.6k views
  7. chessgod101
    Started by chessgod101,

    Here is my new tutorial for unpacking the DRM management solution called ClickLocker. This tutorial is intended to expose the author's large exaggerations of ClickLocker's security. Tutorial: http://reverseengineeringtips.blogspot.com/2015/02/the-exagerated-promises-of-clicklocker.html

      • Like
    • 3 replies
    • 6.4k views
  8. chessgod101
    Started by chessgod101,

    Here is a short article I created about some of the useful functions and tricks for manipulating data for keygenning purposes in delphi. It is intended for beginners, but shows some tricks for overcoming some of the limitations in delphi. I will expand this from time to time to shed some light on some of the tricks that you can use to accomplish difficult tasks in delphi. I hope you enjoy: http://reverseengineeringtips.blogspot.com/2014/12/keygenning-with-delphi-useful-delphi.html

      • Like
    • 5 replies
    • 7.5k views
  9. Diver
    Started by Diver,

    A large lesson on creating skins for the dUP2 Manufacture of skins for the dUP2, starting with Photoshop - finishing with dUP2. Parts: Part 1 - Photoshop. Steps: Change the main window Create buttons Create mask for RGNerator Create index of Main Window Create a window "About" Part 2 - RGNerator. Part 3 - ResHacker. Part 4 - DUP2. ==================================== Tools: 1 Photoshop. 2 RGNerator. 3 ResHacker. 4 dUP 2.21. ==================================== ==================================== Info: Format: SWF Time: 42 min. Size: 52 mb. Download Video-tut Tools - contains Adobe Photo…

  10. chessgod101

    Here is my new tutorial for unpacking Jar2Exe. It demonstrates how to recover a jar file at all 3 protection settings. I hope you enjoy. http://reverseengineeringtips.blogspot.com/2014/12/unpacking-jar2exe-21-extracting-jar.html

    • 5 replies
    • 9.9k views
  11. chessgod101
    Started by chessgod101,

    I just published my first tutorial/article on my new blog for unpacking/extracting the original Jar archive/executable from a Java application that is wrapped in Launch4j. I also included the steps to recover command line arguments that launch4j passes to the java runtime. I hope that you enjoy and learn a few things. Link: http://reverseengineeringtips.blogspot.com/2014/12/unpacking-launch4j-35-extracting-jar.html'>>http://reverseengineeringtips.blogspot.com/2014/12/unpacking-launch4j-35-extracting-jar.html

    • 1 reply
    • 7.6k views
  12. Teddy Rogers
    Started by Teddy Rogers,

    Code obFU(N)scation Mixing 32 and 64 bit Mode Instructions http://scrammed.blogspot.com.au/2014/10/code-obfunscation-mixing-32-and-64-bit.html Ted.

    • 0 replies
    • 5.7k views
  13. bofstoff
    Started by bofstoff,

    x86obf will feature regular KeyGenMe contests with prize money for the first person/team to solve the task before the deadline.The first x86obf KeyGenMe contest has been released (prize is $100). The binary, rules and other information is in a .zip archive - download link is on the left side of this page. More info here: http://x86obf.com/contest.php

    • 2 replies
    • 10k views
  14. Aguila
    Started by Aguila,

    I thought that it is nice to have an own blog... so here it is. Bookmark it https://ntquery.wordpress.com

      • Like
    • 9 replies
    • 8.7k views
  15. Teddy Rogers
    Started by Teddy Rogers,

    Bitcoin vs. The NSA’s Quantum Computer This turned out to be a really interesting read. Whether your into Bitcoin or not I recommend you take a look... http://www.bitcoinnotbombs.com/bitcoin-vs-the-nsas-quantum-computer/ Ted.

    • 3 replies
    • 9.9k views
  16. DrkMND
    Started by DrkMND,

    I'm hoping someone can lend me a hand. I'm working on trying to figure out a reverse engineering challenge and I'm stuck. There is no monetary reward or anything of the sort for the challenge. I'm simply interested in figuring out what I'm doing wrong so I can learn from it. The challenge for anyone that is interested is hosted at http://www.flare-on.com/ by FireEye Labs. This particular challenge give you an html file that is supposedly attacked and they ask what the attackers changed in the site. Upon review there is obfuscated php code appended to the end of the png file on the site and an include statement added to the html. The challenge is to find an email ad…

      • Like
    • 2 replies
    • 683 views
  17. Teddy Rogers
    Started by Teddy Rogers,

    Good forensic/detective work by the FBI from photographs taken with Apple's iPhone and EXIF... http://www.voiceofgr...cker-after.html Ted.

      • Like
    • 13 replies
    • 11.8k views
  18. Teddy Rogers
    Started by Teddy Rogers,

    A Letter From US Security Researchers http://blog.cryptographyengineering.com/2014/01/a-letter-from-us-security-researchers.html Ted.

    • 0 replies
    • 6k views
  19. Teddy Rogers
    Started by Teddy Rogers,

    Disassembler Mechanized Disassembler Mechanized: Part 1 – Coding of Disassembler Disassembler Mechanized: Part 2 – Generating C# and MSIL code Ted.

    • 2 replies
    • 6k views
  20. Teddy Rogers
    Started by Teddy Rogers,

    Evaluation of Consumer Windows OS Security Architecture http://www.invisiblethingslab.com/resources/2014/A%20crack%20on%20the%20glass.pdf Ted.

    • 0 replies
    • 5.4k views
  21. Teddy Rogers
    Started by Teddy Rogers,

    TrueCrypt Master Key Extraction And Volume Identification http://volatility-labs.blogspot.fr/2014/01/truecrypt-master-key-extraction-and.html Ted.

    • 2 replies
    • 6.3k views
  22. Teddy Rogers
    Started by Teddy Rogers,

    Hack in the Box 6 has been published... />http://magazine.hackinthebox.org/issues/HITB-Ezine-Issue-006.pdf Ted.

      • Like
    • 4 replies
    • 15.2k views
  23. Teddy Rogers
    Started by Teddy Rogers,

    An article from the FBI... http://www.fbi.gov/news/stories/2013/january/piecing-together-digital-evidence/piecing-together-digital-evidence Ted.

    • 2 replies
    • 6k views
  24. Teddy Rogers
    Started by Teddy Rogers,

    Anti-Reverse Engineering (Assembly Obfuscation) http://resources.infosecinstitute.com/anti-reverse-engineering-assembly-obfuscation/ Ted.

  25. Teddy Rogers

    A (relatively easy to understand) primer on elliptic curve cryptography... http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/ Ted.

    • 0 replies
    • 6.6k views

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.