Reverse Engineering – Telegram
Reverse Engineering
4.75K subscribers
106 photos
1 video
18 files
458 links
Everything is open-source.

The official community group: @reverseengineeringz
Download Telegram
API Monitor is a free software that lets you monitor and control API calls made by applications and services. Its a powerful tool for seeing how applications and services work or for tracking down pro
Decompiling and running flash programs using SWF file player + FFdec
EXPLORING THE PE FILE FORMAT VIA IMPORTS

DLL Name RVA: A pointer (address) to the name of the imported DLL.

Import Address Table (IAT) RVA is populated by the loader when the executable and its imported DLLs are mapped into memory, and it is a table of pointers to the imported functions. Each entry in the table is called a “thunk” and the table is referred to as a “thunk table.” With that in mind, the RVA in this field points to the address of the imported function within the IAT

https://malwology.com/2018/10/05/exploring-the-pe-file-format-via-imports/
Radare2 Emulation commands

initialize emulation: aei

deinitialize emulation: aed

emulate a whole function: aef

single-step: aes
https://youtu.be/1RNcZpBLZHs

Manual unpacking using dnspy and class constructor ( .cctor )

Note. No need actually for using ilspy you can modify the entry point by editing module settings:

Right click on it in modules tree
Edit module
Choose mananged
Choose the main method
Save module