Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Reverse Engineering Articles

Share an interesting blog, news page or other RE related site...

  1. Teddy Rogers
    Started by Teddy Rogers,

    An interesting read up on SSD forensics... />http://resources.infosecinstitute.com/ssd-forensics/ Ted.

    • 0 replies
    • 6.8k views
  2. waliedassar
    Started by waliedassar,

    It is similar to, but different from the one i disclosed in the previous post. The previous one occurs when OllyDbg tries to grab .sym files, but this one occurs when OllyDbg tries to grab .udd files. Similar to .sym files, .udd files are grabbed for all loaded modules, including dynamically loaded ones, which gives us the chance to use this buffer overflow as an anti-debug method. To exploit this buffer overflow, all you have to do is create a .dll with length of 0x102 bytes and then LoadLibrary it. N.B. ollydbg.exe must reside in a directory with length of 0x29 bytes or more, e.g. "D:\Documents and Settings\Administrator\Desktop\odbg110". Further details: http://…

    • 0 replies
    • 6k views
  3. waliedassar
    Started by waliedassar,

    It is a buffer overflow in ollydbg v1.10. It occurs when olly tries to find the .sym file for the being-loaded module. POC: />http://ollytlscatch.googlecode.com/files/trick.exe />https://docs.google.com/document/d/1T5LPY3qDkxmR1XVgxnsKW42lggS5iSjtQwFXOtNfqMM/edit Further details: />http://waleedassar.blogspot.com/2011/12/new-ollydbg-anti-debug-trick.html />http://www.virustotal.com/file-scan/report.html?id=97f2c22d3fde1db56aaef4e555e32927d0a0087e7e92d369093ac5ac749e83d9-1324964958

    • 0 replies
    • 5.5k views
  4. Teddy Rogers
    Started by Teddy Rogers,

    This makes for interesting reading... Exploring new lands on Intel CPUs (SINIT code execution hijacking) />http://www.invisiblethingslab.com/resources/2011/Attacking_Intel_TXT_via_SINIT_hijacking.pdf/>http://theinvisiblethings.blogspot.com/2011/12/exploring-new-lands-on-intel-cpus-sinit.html Ted.

    • 0 replies
    • 6.6k views
  5. xsk
    Started by xsk,

    If you're someone who already has a reasonable grasp of reverse engineering and malware analysis, I need your help. I need you to help train more people like yourself. More likely than not you're "self-taught". Except, when you were teaching yourself you were probably actually relying in large part on the help of others. They freely posted zines, articles, and blog entries. They and answered questions in forums, email lists, and in person. Eventually, once you were confident enough to believe you would be right more often than wrong, you might have tried to pay it forward and share your knowledge back to others. If so, you're the type of person who is needed. We need peop…

    • 0 replies
    • 10.8k views
  6. abhijit mohanta
    Started by abhijit mohanta,

    http://dreamofareverseengineer.blogspot.com/2011/10/unpacking-custom-packers.html

    • 5 replies
    • 8.7k views
  7. sirp
    Started by sirp,

    /----------------------------\ | * UIC Reversing FTP v3.0 * | | | | -=[ Zero_G ]=- | \----------------------------/ ** Welcome to the UIC Reversing FTP v2.0! ** Here you will find everything you need for your reversing pleasure! :-) If you want to share something with the community, feel free to put it in the "_UPLOAD_" folder (write permission enabled) ... I will reorganize data every week! -=[Zero_G]=- zerorev.net

    • 4 replies
    • 6.1k views
  8. Teddy Rogers
    Started by Teddy Rogers,

    XBox 360 Reset Glitch Hack >http://www.youtube.com/watch?v=JyYdL4L6vwE&feature=player_embedded Download Links: http://www.libxenon....h_hack_v1.0.rar http://libxenon.org/...146.0;attach=61 Ted.

    • 4 replies
    • 7.1k views
  9. HellRaider
    Started by HellRaider,

    Well after the disappointing take down of Crackmes.de I took it upon myself to mirror the crackmes (thanks for the inspiration @darelgrif) as well as the solutions that were on that site. Please find the following linked zip that contains almost 1000 crackme’s for all levels. Please enjoy and mirror/spread. Author : Malware Ninja Author website : http://crackmes.de/ Download : http://tuts4you.com/request.php?3152

    • 5 replies
    • 10.9k views
  10. deepzero
    Started by deepzero,

    to be found here: http://shell-storm.org/papers/index.php?lg=englishVery interesting papers, focusing mainly on application security / exploitation.

    • 1 reply
    • 4.7k views
  11. Killboy

    It's a bit of a tacky title but the talk is very nice. Starts with a pretty good intro to how handles work inside the windows subsystem and how sessions and desktops come into all of this. />http://www.archive.org/details/Shattering_the_Windows_Message_Passing_Architecture_and_Security_Model

    • 0 replies
    • 5.7k views
  12. Teddy Rogers
    Started by Teddy Rogers,

    GoVirtual® CloudCrack />http://www.govirtual.tv/CloudCrack.php Ted.

    • 2 replies
    • 6.5k views
  13. sirp
    Started by sirp,

    SERSC is an international center for supporting distinguished scholars and students who are researching various areas of Science and Technology. SERSC wishes to provide good chances for academic and industry professionals to discuss recent progress in various areas of Science and Technology. SERSC organizes many international conferences, symposia and workshops every year, and provides sponsor or technical support to researchers who wish to organize their own conferences and workshops. SERSC also publishes high quality academic international journals in various areas of Science and Technology. Journal Aims Our Journal provides a chance for academic and industry profession…

    • 0 replies
    • 4.9k views
  14. CodeExplorer
    Started by CodeExplorer,

    Public Key Infrastructure (PKI) />http://softwarekishorekoney.blogspot.com/2010/05/public-key-infrastructure-pki.html

    • 1 reply
    • 5.1k views
  15. CodeExplorer
    Started by CodeExplorer,

    ʻpyREticʼ – In memory reverse engineering for obfuscated Python bytecode />http://www.defcon.org/images/defcon-18/dc-18-presentations/RSmith/DEFCON-18-RSmith-pyREtic.pdf

    • 1 reply
    • 4.5k views
  16. CodeExplorer
    Started by CodeExplorer,

    4x5: Reverse Engineering Automation with Phyton: />https://www.blackhat.com/presentations/bh-usa-07/Carrera/Presentation/bh-usa-07-carrera.pdf

    • 0 replies
    • 6.1k views
  17. CodeExplorer
    Started by CodeExplorer,

    Python Reverse Engineering - PyHooks: />http://www.manaware.net/reverse-engineering/pyhooks.html

    • 0 replies
    • 5.1k views
  18. CodeExplorer
    Started by CodeExplorer,

    Gray Hat Python: Python Programming for Hackers and Reverse Engineers />http://avaxhome.ws/ebooks/eLearning_book/information_technologies/1593271921.html

    • 0 replies
    • 4.8k views
  19. CodeExplorer
    Started by CodeExplorer,

    Hacking the Pirates of the Caribbean Online MMORPG />http://dvlabs.tippingpoint.com/blog/2008/06/23/hacking-the-pirates-of-the-caribbean-online-mmorpg

    • 0 replies
    • 5k views
  20. Teddy Rogers
    Started by Teddy Rogers,

    Google Fuzzing at Scale Adobe Flash />http://googleonlinesecurity.blogspot.com/2011/08/fuzzing-at-scale.html Ted.

    • 0 replies
    • 7.3k views
  21. Teddy Rogers
    Started by Teddy Rogers,

    NTRUEncrypt Public Key Cryptosystem />http://en.wikipedia.org/wiki/NTRUEncrypt/>http://sourceforge.net/projects/ntru/files/ Ted.

    • 2 replies
    • 5.3k views
  22. Teddy Rogers
    Started by Teddy Rogers,

    IDA Pro Book, 2nd Edition />http://nostarch.com/idapro2.htm/>http://www.nostarch.com/download/idapro2_ch24.pdf Ted.

    • 0 replies
    • 6.5k views
  23. CodeExplorer
    Started by CodeExplorer,

    Thue Tuxen />http://ttuxen.wordpress.com/2010/03/15/crackme-introduction-2/ RE blog

    • 0 replies
    • 6k views
  24. euverve
    Started by euverve,

    Hello all, this is a video showing how to hack deep freeze password by reading it. I created a simple tool to aid or help me reading the valid string character. Screenshot: Download Video: http://www.mediafire.com/?1hq2c3k0hijg2ar

      • Like
    • 2 replies
    • 7.4k views
  25. CodeExplorer
    Started by CodeExplorer,

    portuogral.no - portugral re blog: />http://portuogral.no.sapo.pt/

    • 2 replies
    • 4.4k views

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.