Victor Uzoagbavictoru.hashnode.dev·Sep 9, 2024How to Reverse Engineer Mobile Applications for Security AnalysisReverse engineering of mobile applications is one of the key practices that help in understanding how an app works internally, find bugs, or assess security risks. As attackers are targeting more and more mobile devices in today's environment, it's t...DiscussMobile ecosystem
Joshua Colecolej.net·Sep 8, 2024How to Reverse Engineer Stripped Binaries Easily Using GDBDuring in the process of reverse engineering binaries, a common problem arises. How do I reverse engineer stripped binaries? There are no symbols to break on, offsets change, scripts don't work, and you ask yourself why am I doing this? Luckily there...Discussgdb
Neverquestblog.neverquest.green·Sep 3, 2024How to cheat in your exercises or Why you should encrypt your stuffHello guys, Since i was bored by my networking exams, i thought "what if i could cheat a little bit" let's see what i did Getting started The first step is to acquire a cisco packet tracer exercise, and understand how packet tracer understands the fi...Discussreverse engineering
Keqingsmellgoodkeqingsmellgood.hashnode.dev·Aug 5, 2024[SEC Playground: Half Year CTF 2024] - LoaderIntroduction to the Challenge The challenge was a zip file containing a testdll.exe binary and loader.dll. When executed, it ask for the key. And showed this message after incorrect key input. Can you unpack this?. Format: re{flag} Password for unz...Discuss·37 readsSEC Playground: Half Year CTF 2024x64dbg
Keqingsmellgoodkeqingsmellgood.hashnode.dev·Jul 31, 2024[SEC Playground: Half Year CTF 2024] - CrackmeIntroduction to the Challenge The challenge was a zip file containing a crackme.exe binary. When executed, it showed this message. Do something with the program and the flag will show. Format: re{flag} Password for unzip: secplayground Anti-Debuggi...Discuss·36 readsSEC Playground: Half Year CTF 2024ILSpy
Ngô Thành VănforBlueCyber's blogbluecyber.hashnode.dev·Jul 31, 2024DEADSEC CTF 2024 : JavaCPScriptThis challenge provides us with 4 files In package.json file, it shows us the way to run the program Using the command in release, we can try to run and see what the program does It run for a while and tell us our flag is wrong, but we didn't prov...Discuss·28 readsreverse engineering
Keqingsmellgoodkeqingsmellgood.hashnode.dev·Jul 30, 2024[SEC Playground: Half Year CTF 2024] - Meaware 1-5Introduction to Challenge The challenge was a Meaware.zip archive. Inside, it contained a happymeow.exe binary. The goal to achieve the flag was to thoroughly analyze the provided malware sample. The malware itself has detection evasion logic. It wil...Discuss·97 readsSEC Playground: Half Year CTF 2024CTF Writeup
Anshuman Sinhaanshumansinha.hashnode.dev·Jun 6, 2024Reverse EngineeringReverse engineering (RE) is a systematic process employed to deconstruct and analyze a product or system to understand its design, architecture, and functionality. This practice, integral to various industries, bridges gaps in technical knowledge, su...Discussreverse engineering
Pragadeesh Nehruexcelsior.hashnode.dev·Mar 18, 2024How Neural Networks Can Learn Almost Anything?In the vast landscape of artificial intelligence, one technology stands out as a beacon of innovation and possibility: neural networks. These remarkable computational models have revolutionized the way we approach complex problems, unlocking the pote...Discuss·20 likesAI
ChrisProchris.tech·Feb 26, 2024An Introduction Into Modding Unity GamesHello, today we will be exploring how to make mods for Unity based video games, particularly in this blog post we will focus on Unity games utilizing Unity's IL2CPP scripting interface. We will be looking at modding the game Last Epoch, while this ga...Discuss·670 readsReverse Engineeringunity