|
You are here |
blog.deobfuscate.io | ||
| | | | |
reverse.put.as
|
|
| | | | | I was bored this weekend and decided to take some rust out of my reversing skills before they disappear for good. I have spent the past two years or so mostly writing C code (secure C is more like an asymptote but that is why it is a fun challenge) and barely doing any serious reverse engineering and security research. So I decided to revisit some unfinished business with qwertyoruiop's crackme. I had a look when he originally sent it but got distracted with something else at the time and never finished it. I couldn't find any public write-up about it so I decided to write one. It is mostly targeted to newcomers to reverse engineering and macOS. You can click the pictures to see the full size version. | |
| | | | |
www.willsroot.io
|
|
| | | | | Vulnerability Research on Low-Level Systems | |
| | | | |
0x44.cc
|
|
| | | | | [AI summary] The article provides an in-depth explanation of reverse engineering concepts, including CPU operations, memory representation, data structures, and disassembly techniques. It guides readers through understanding machine code, endianness, signed integers, and how to analyze C code using tools like Visual Studio and disassemblers. | |
| | | | |
www.jamieonkeys.dev
|
|
| | | I finally had a go at creating a machine code program and running it on a Speccy. | ||