Reverse Engineering Articles
Share an interesting blog, news page or other RE related site...
346 topics in this forum
-
unpacking custom packers
by abhijit mohanta- 5 replies
- 6.4k views
http://dreamofareverseengineer.blogspot.com/2011/10/unpacking-custom-packers.html
-
UIC Reversing FTP v3.0
by sirp- 4 replies
- 5.4k views
/----------------------------\ | * UIC Reversing FTP v3.0 * | | | | -=[ Zero_G ]=- | \----------------------------/ ** Welcome to the UIC Reversing FTP v2.0! ** Here you will find everything you need for your reversing pleasure! :-) If you want to share something with the community, feel free to put it in the "_UPLOAD_" folder (write permission enabled) ... I will reorganize data every week! -=[Zero_G]=- zerorev.net
-
XBox 360 Reset Glitch Hack...
by Teddy Rogers- 4 replies
- 6.3k views
XBox 360 Reset Glitch Hack >http://www.youtube.com/watch?v=JyYdL4L6vwE&feature=player_embedded Download Links: http://www.libxenon....h_hack_v1.0.rar http://libxenon.org/...146.0;attach=61 Ted.
-
[crackme] Crackmes.de Collection 2011
by HellRaider- 5 replies
- 9.8k views
Well after the disappointing take down of Crackmes.de I took it upon myself to mirror the crackmes (thanks for the inspiration @darelgrif) as well as the solutions that were on that site. Please find the following linked zip that contains almost 1000 crackme’s for all levels. Please enjoy and mirror/spread. Author : Malware Ninja Author website : http://crackmes.de/ Download : http://tuts4you.com/request.php?3152
-
- 1 reply
- 4k views
to be found here: http://shell-storm.org/papers/index.php?lg=englishVery interesting papers, focusing mainly on application security / exploitation.
-
- 0 replies
- 5k views
It's a bit of a tacky title but the talk is very nice. Starts with a pretty good intro to how handles work inside the windows subsystem and how sessions and desktops come into all of this. />http://www.archive.org/details/Shattering_the_Windows_Message_Passing_Architecture_and_Security_Model
-
CloudCrack...
by Teddy Rogers- 2 replies
- 5.5k views
GoVirtual® CloudCrack />http://www.govirtual.tv/CloudCrack.php Ted.
-
- 0 replies
- 4.2k views
SERSC is an international center for supporting distinguished scholars and students who are researching various areas of Science and Technology. SERSC wishes to provide good chances for academic and industry professionals to discuss recent progress in various areas of Science and Technology. SERSC organizes many international conferences, symposia and workshops every year, and provides sponsor or technical support to researchers who wish to organize their own conferences and workshops. SERSC also publishes high quality academic international journals in various areas of Science and Technology. Journal Aims Our Journal provides a chance for academic and industry profession…
-
Public Key Infrastructure (PKI)
by CodeExplorer- 1 reply
- 4.3k views
Public Key Infrastructure (PKI) />http://softwarekishorekoney.blogspot.com/2010/05/public-key-infrastructure-pki.html
-
- 1 reply
- 3.7k views
ʻpyREticʼ – In memory reverse engineering for obfuscated Python bytecode />http://www.defcon.org/images/defcon-18/dc-18-presentations/RSmith/DEFCON-18-RSmith-pyREtic.pdf
-
4x5: Reverse Engineering Automation with Phyton
by CodeExplorer- 0 replies
- 5.3k views
4x5: Reverse Engineering Automation with Phyton: />https://www.blackhat.com/presentations/bh-usa-07/Carrera/Presentation/bh-usa-07-carrera.pdf
-
Python Reverse Engineering - PyHooks
by CodeExplorer- 0 replies
- 4.3k views
Python Reverse Engineering - PyHooks: />http://www.manaware.net/reverse-engineering/pyhooks.html
-
Python: Python Programming for Hackers and Reverse Engineers
by CodeExplorer- 0 replies
- 4.1k views
Gray Hat Python: Python Programming for Hackers and Reverse Engineers />http://avaxhome.ws/ebooks/eLearning_book/information_technologies/1593271921.html
-
Hacking the Pirates of the Caribbean Online MMORPG
by CodeExplorer- 0 replies
- 4.3k views
Hacking the Pirates of the Caribbean Online MMORPG />http://dvlabs.tippingpoint.com/blog/2008/06/23/hacking-the-pirates-of-the-caribbean-online-mmorpg
-
Google Fuzzing at Scale Adobe Flash...
by Teddy Rogers- 0 replies
- 6.6k views
Google Fuzzing at Scale Adobe Flash />http://googleonlinesecurity.blogspot.com/2011/08/fuzzing-at-scale.html Ted.
-
NTRUEncrypt Public Key Cryptosystem...
by Teddy Rogers- 2 replies
- 4.4k views
NTRUEncrypt Public Key Cryptosystem />http://en.wikipedia.org/wiki/NTRUEncrypt/>http://sourceforge.net/projects/ntru/files/ Ted.
-
IDA Pro Book, 2nd Edition...
by Teddy Rogers- 0 replies
- 5.3k views
IDA Pro Book, 2nd Edition />http://nostarch.com/idapro2.htm/>http://www.nostarch.com/download/idapro2_ch24.pdf Ted.
-
Thue Tuxen
by CodeExplorer- 0 replies
- 3.7k views
Thue Tuxen />http://ttuxen.wordpress.com/2010/03/15/crackme-introduction-2/ RE blog
-
Reading Deep Freeze Passwords
by euverve- 2 replies
- 6.6k views
Hello all, this is a video showing how to hack deep freeze password by reading it. I created a simple tool to aid or help me reading the valid string character. Screenshot: Download Video: http://www.mediafire.com/?1hq2c3k0hijg2ar
-
portuogral.no - portuogral re blog
by CodeExplorer- 2 replies
- 3.8k views
portuogral.no - portugral re blog: />http://portuogral.no.sapo.pt/
-
Top 25 Most Dangerous Software Errors 2011...
by Teddy Rogers- 0 replies
- 4.9k views
Top 25 Most Dangerous Software Errors 2011 />http://cwe.mitre.org/top25//>http://cwe.mitre.org/top25/archive/2011/2011_cwe_sans_top25.pdf Ted.
-
Password cracking, mining, and GPUs...
by Teddy Rogers- 4 replies
- 4.4k views
Password cracking, mining, and GPUs />http://erratasec.blogspot.com/2011/06/password-cracking-mining-and-gpus.html Ted.
-
Locu's Stuff
by CodeExplorer- 1 reply
- 9.1k views
Locu's Stuff (RE blog) />http://xlocux.wordpress.com/
-
FBI Needs Help Solving Encrypted Murder Mystery...
by Teddy Rogers- 0 replies
- 3.7k views
FBI Needs Help Solving Encrypted Murder Mystery />http://www.fbi.gov/news/stories/2011/march/cryptanalysis_032911 Ted.
-
ElcomSoft Enables Forensic Access to Encrypted iPhones...
by Teddy Rogers- 0 replies
- 3.8k views
ElcomSoft Enables Forensic Access to Encrypted iPhones />http://www.elcomsoft.com/PR/eppb_110524_en.pdf Ted.