Sam Russellwww.lodsb.com·Oct 30, 2023Binary Ninja Workflows: Fixing branch obfuscationIf you've been reversing x86/x64 for a while then you will have definitely come across functions that end like this: We know two things here: The RET/RETN opcode in x86/x64 pops the stack and jumps to that address The PUSH before the return here i...1.2K readsreverse engineering
Dhanush Ndhanushnehru.hashnode.dev·Oct 6, 2023Javascript DeobfuscationIntroduction: Code deobfuscation is an important skill to learn if we want to be skilled in code analysis and reverse engineering. Obfuscation is a technique used to make a script more difficult to read by humans but allows it to function the same fr...23 likes·103 readsdeobfuscation
Sam Russellwww.lodsb.com·Aug 3, 2023Removing Control Flow Flattening with Binary NinjaIf you've been reversing for a while then eventually you'll come up against a control flow graph that looks like this: This is a simple toy app hosted at https://github.com/samrussell/cff_playground if you feel like following along at home. The plug...10 likes·2.1K readsreverse engineering
med saidmedsaid.hashnode.dev·May 22, 2023JavaScript Deobfuscation: Unveiling Hidden CodeIntroduction JavaScript is a widely used programming language for web development. It offers flexibility and interactivity, enabling developers to create dynamic web applications. However, some developers intentionally obfuscate their JavaScript code...JavaScript