You are here |
insinuator.net | ||
| | | |
yasoob.me
|
|
| | | | Hi everyone! ?? If you have been following my blog then you might have already read the article on reverse engineering an Android app by writing custom smali code. I am still very much a reverse engineering beginner so after that article, I got to learn about Frida. I was told that Frida is much faster and a lot easier for scenarios where I want to snoop on functions. Well, I am glad to report that all the suggestions were absolutely correct. | |
| | | |
gpfault.net
|
|
| | | | ||
| | | |
sergioprado.blog
|
|
| | | | A few days ago I decided to reverse engineer my routers firmware image with binwalk. | |
| | | |
www.foonathan.net
|
|
| | Let me share a useful insight with you: constexpr is a platform. Just like you write code that targets Windows or a microcontroller, you write code that targets compile-time execution. In both cases you restrict yourself to the subset of C++ that works on your target platform, use conditional compilation if your code needs to be portable, and execute it on the desired target platform. You can thus view constexpr as another platform you can target; it just so happens to be run by your compiler. This insig... |