|
You are here |
chrissanders.org | ||
| | | | |
malwaretech.com
|
|
| | | | | Today during RSA Conference, the National Security Agency release their much hyped Ghidra reverse engineering toolkit. Described as "A software reverse engineering (SRE) suite of tools", Ghidra sounded like some kind of disassembler framework.Prior to release, my expectation was something more than Binary Ninja, but lacking debugger integration. I figured the toolkit would be ideal for those interested in reversing, but who lack the funding for an IDA licence. | |
| | | | |
www.as-map.com
|
|
| | | | | Source: archidose.tumblr.com via Liga on Pinterest | |
| | | | |
reyammer.io
|
|
| | | | | [AI summary] The blog post discusses aoool, a C++ web server challenge created for DEFCON CTF Finals 2019, which features a custom JIT compiler for the OSL scripting language with intentional type confusion bugs and logic flaws for exploitation. | |
| | | | |
www.corellium.com
|
|
| | | iOS applications are distributed as compiled binaries and are not readable by default. Click the blog to learn what goes into iOS reverse engineering. | ||