|
You are here |
blog.deobfuscate.io | ||
| | | | |
blog.nuculabs.de
|
|
| | | | | It's been some time since I've done some Reverse Engineering and today I've completed a simple challenge on . The filename of the challenge is crackme_wtf and here are some hints to get you started: Determine type of FILEs. Don't be afraid to patch and use a debugger. Try to eliminate the randomness. Maybe some functions that have to do with time, random numbers or the current process's id. If the last hint doesn't yield any results... Is the required password really needed to get to the flag? Thanks for reading and good luck! | |
| | | | |
maddiestone.github.io
|
|
| | | | | Learn to reverse engineer Android applications! | |
| | | | |
sf2platinum.wordpress.com
|
|
| | | | | I've had a bit of contact through the blog lately, and have been helping someone who's starting out on reverse engineering another game but doesn't have much reveng experience, so I'm going to compile my communications with him into a series on how to get started on a project like this. Most of it will... | |
| | | | |
blog.cavelab.dev
|
|
| | | I'm making my own alarm system with Home Assistant, Zigbee, and some wired stuff. Sounds interesting? Follow along at #RPiSecuritySystem on Mastodon. | ||