|
You are here |
blog.xilokar.info | ||
| | | | |
comsecuris.com
|
|
| | | | | ||
| | | | |
harrisonsand.com
|
|
| | | | | This blog post walks through the efforts of reverse engineering the Zaptec Pro, an electric vehicle charger found in many parking lots and apartment buildings around Norway. | |
| | | | |
sergioprado.blog
|
|
| | | | | JTAG is a physical hardware interface that makes it possible, among other things, to extract the firmware image from electronic devices. | |
| | | | |
goggleheadedhacker.com
|
|
| | | Learn how to reverse engineer golang malware using Radare2. This article will explain how the gopclntab works and how we can use it to extract function names. This process is explained using the Robbinhood Ransomware that attacked Baltimore. | ||