|
You are here |
blog.deobfuscate.io | ||
| | | | |
fluxsec.red
|
|
| | | | | Learn how to reverse engineer Windows 11 kernel internals, uncover undocumented features, and enhance EDR telemetry using Rust. | |
| | | | |
goggleheadedhacker.com
|
|
| | | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | | |
reverse.put.as
|
|
| | | | | I was bored this weekend and decided to take some rust out of my reversing skills before they disappear for good. I have spent the past two years or so mostly writing C code (secure C is more like an asymptote but that is why it is a fun challenge) and barely doing any serious reverse engineering and security research. So I decided to revisit some unfinished business with qwertyoruiop's crackme. I had a look when he originally sent it but got distracted with something else at the time and never finished it. I couldn't find any public write-up about it so I decided to write one. It is mostly targeted to newcomers to reverse engineering and macOS. You can click the pictures to see the full size version. | |
| | | | |
cocomelonc.github.io
|
|
| | | |||