Explore >> Select a destination


You are here

blog.deobfuscate.io
| | reverse.put.as
3.5 parsecs away

Travel
| | I was bored this weekend and decided to take some rust out of my reversing skills before they disappear for good. I have spent the past two years or so mostly writing C code (secure C is more like an asymptote but that is why it is a fun challenge) and barely doing any serious reverse engineering and security research. So I decided to revisit some unfinished business with qwertyoruiop's crackme. I had a look when he originally sent it but got distracted with something else at the time and never finished it. I couldn't find any public write-up about it so I decided to write one. It is mostly targeted to newcomers to reverse engineering and macOS. You can click the pictures to see the full size version.
| | www.willsroot.io
4.7 parsecs away

Travel
| | Vulnerability Research on Low-Level Systems
| | 0x44.cc
3.8 parsecs away

Travel
| | [AI summary] The article provides an in-depth explanation of reverse engineering concepts, including CPU operations, memory representation, data structures, and disassembly techniques. It guides readers through understanding machine code, endianness, signed integers, and how to analyze C code using tools like Visual Studio and disassemblers.
| | www.jamieonkeys.dev
25.1 parsecs away

Travel
| I finally had a go at creating a machine code program and running it on a Speccy.