You are here |
reverse.put.as | ||
| | | |
blog.nuculabs.de
|
|
| | | | It's been some time since I've done some Reverse Engineering and today I've completed a simple challenge on . The filename of the challenge is crackme_wtf and here are some hints to get you started: Determine type of FILEs. Don't be afraid to patch and use a debugger. Try to eliminate the randomness. Maybe some functions that have to do with time, random numbers or the current process's id. If the last hint doesn't yield any results... Is the required password really needed to get to the flag? Thanks for reading and good luck! | |
| | | |
www.kirsle.net
|
|
| | | | ||
| | | |
blog.jak-linux.org
|
|
| | | | I'm currently working on a rewrite of debian-cd in Python. Although there is already deb-imgs-gen, I decided to start from scratch, because deb-imgs-gen is more than 1 year old. debimg's main features are Speed debimg should be able to build netinst disks in less than 20 seconds Free Software This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. | |
| | | |
blog.arcjet.com
|
|
| | Building and compiling a Rust FFI library so it can be executed from Go. |