Hyper-V debugging for beginners 2nd edition
https://hvinternals.blogspot.com/2021/01/hyper-v-debugging-for-beginners-2nd.html
@reverseengine
https://hvinternals.blogspot.com/2021/01/hyper-v-debugging-for-beginners-2nd.html
@reverseengine
Blogspot
Hyper-V debugging for beginners. 2nd edition.
hyper-v internals
❤1
Hyper-V memory internals. EXO partition memory access
https://hvinternals.blogspot.com/2020/06/hyper-v-memory-internals-exo-partition.html
@reverseengine
https://hvinternals.blogspot.com/2020/06/hyper-v-memory-internals-exo-partition.html
@reverseengine
Blogspot
Hyper-V memory internals. EXO partition memory access
hyper-v internals
❤1
Multi-disassemblers collaboration framework for reverse engineering
https://github.com/Martyx00/CollaRE
@reverseengine
https://github.com/Martyx00/CollaRE
@reverseengine
GitHub
GitHub - Martyx00/CollaRE: Multi-tool reverse engineering collaboration solution.
Multi-tool reverse engineering collaboration solution. - Martyx00/CollaRE
❤1
How To Reverse Engineer RC4 Crypto For Malware Analysis
https://www.youtube.com/watch?v=-EQKiIbOLEc
@reverseengine
https://www.youtube.com/watch?v=-EQKiIbOLEc
@reverseengine
YouTube
How To Reverse Engineer RC4 Crypto For Malware Analysis
View our malware analysis training: https://AGDCservices.com/training/
Follow me on Twitter for RE tips and resources: https://twitter.com/AGDCservices
View our malware analysis products to aid in your RE efforts (Ghidra / python noscripts, tools, and individual…
Follow me on Twitter for RE tips and resources: https://twitter.com/AGDCservices
View our malware analysis products to aid in your RE efforts (Ghidra / python noscripts, tools, and individual…
❤1
Reverse Engineering iMessage: Leveraging the Hardware to Protect the Software
https://www.nowsecure.com/blog/2021/01/27/reverse-engineering-imessage-leveraging-the-hardware-to-protect-the-software
@reverseengine
https://www.nowsecure.com/blog/2021/01/27/reverse-engineering-imessage-leveraging-the-hardware-to-protect-the-software
@reverseengine
Nowsecure
Reverse Engineering iMessage to Help Improve Security | NowSecure
Our researcher reverse engineered Apple iMessage to explore extending it the secure messaging app to other systems. See how he fared.
❤1
ReCopilot: A Reverse Engineering Copilot for Boosting Binary Analysis with Decompiler
https://github.com/XingTuLab/recopilot
@reverseengine
https://github.com/XingTuLab/recopilot
@reverseengine
GitHub
GitHub - XingTuLab/recopilot: ReCopilot: Reverse Engineering Copilot in Binary Analysis
ReCopilot: Reverse Engineering Copilot in Binary Analysis - XingTuLab/recopilot
❤1
[Reverse Engineering Tips] — Binary Diffing
https://medium.com/malware-buddy/reverse-engineering-tips-binary-diffing-17760bd89f39
@reverseengine
https://medium.com/malware-buddy/reverse-engineering-tips-binary-diffing-17760bd89f39
@reverseengine
Medium
[Reverse Engineering Tips] — Binary Diffing
Binary diffing is a great way to visualize and spot differences in multiple samples. As a malware researcher, this is useful for…
❤1
Introduction to Ghidra Scripting for Embedded ELFs and UPX
https://www.archcloudlabs.com/projects/ghidra_noscripting_01
@reverseengine
https://www.archcloudlabs.com/projects/ghidra_noscripting_01
@reverseengine
Arch Cloud Labs
Introduction to Ghidra Scripting for Embedded ELFs and UPX
About the Project The more Cryptominer malware I look at (or anything targeting Linux), the more trends I’ve identified that are common regardless of the underlying intent. Everyone loves to use UPX.
And why wouldn’t they? It’s a free Open Source packer that…
And why wouldn’t they? It’s a free Open Source packer that…
❤1
Hacking in an epistolary way: implementing kerberoast in pure VBA
https://adepts.of0x.cc/kerberoast-vba-macro
@reverseengine
https://adepts.of0x.cc/kerberoast-vba-macro
@reverseengine
Hacking in an epistolary way: implementing kerberoast in pure VBA |
Hacking in an epistolary way: implementing kerberoast in pure VBA | AdeptsOf0xCC
Creating a macro for Excel in VBA to perform kerberoast attacks
❤1
How to use Ghidra to Reverse Engineer Mobile Application
https://medium.com/bugbountywriteup/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa
@reverseengine
https://medium.com/bugbountywriteup/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa
@reverseengine
Medium
How to use Ghidra to Reverse Engineer Mobile Application
Unveil the
❤1
IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature
https://www.youtube.com/watch?v=plaRysF1cxk
@reverseengine
https://www.youtube.com/watch?v=plaRysF1cxk
@reverseengine
YouTube
IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature
IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature by Hexorcist
In this video, we are going to see that we can get decrypted code very fast in our IDB without bothering to write IDA Python noscripts. In those examples, I am using simple XOR, but…
In this video, we are going to see that we can get decrypted code very fast in our IDB without bothering to write IDA Python noscripts. In those examples, I am using simple XOR, but…
❤1