|
You are here |
st4rk.net | ||
| | | | |
blog.nuculabs.de
|
|
| | | | | It's been some time since I've done some Reverse Engineering and today I've completed a simple challenge on . The filename of the challenge is crackme_wtf and here are some hints to get you started: Determine type of FILEs. Don't be afraid to patch and use a debugger. Try to eliminate the randomness. Maybe some functions that have to do with time, random numbers or the current process's id. If the last hint doesn't yield any results... Is the required password really needed to get to the flag? Thanks for reading and good luck! | |
| | | | |
maddiestone.github.io
|
|
| | | | | Learn to reverse engineer Android applications! | |
| | | | |
sean.heelan.io
|
|
| | | | | A few months back I started Persistence Labs with the goal of developing better tools for bug discovery, reverse engineering and exploit development. I've also moved my blog over to that domain and the new RSS feed is here. Anyway, that's about it really =) I'll be making any future blog posts over there, starting... | |
| | | | |
www.huntress.com
|
|
| | | These are the top cybersecurity threats in healthcare, according to Huntress's 2025 survey of IT pros. Read the full report and learn how to avoid them. | ||