|
You are here |
insinuator.net | ||
| | | | |
goggleheadedhacker.com
|
|
| | | | | Learn how to reverse engineer golang malware using Radare2. This article will explain how the gopclntab works and how we can use it to extract function names. This process is explained using the Robbinhood Ransomware that attacked Baltimore. | |
| | | | |
calebfenton.github.io
|
|
| | | | | When analyzing malware or penetration testing an app which uses a native library, it's helpful to isolate and execute the library's functions. This opens the door for debugging and using the malware's | |
| | | | |
yasoob.me
|
|
| | | | | Hi everyone! ?? If you have been following my blog then you might have already read the article on reverse engineering an Android app by writing custom smali code. I am still very much a reverse engineering beginner so after that article, I got to learn about Frida. I was told that Frida is much faster and a lot easier for scenarios where I want to snoop on functions. Well, I am glad to report that all the suggestions were absolutely correct. | |
| | | | |
faultlore.com
|
|
| | | |||