reverse-engineering   1749

« earlier    

cpplinks/ at master · MattPD/cpplinks · GitHub

++ links: executable and object file formats (ELF, Mach-O, PE); debugging data formats (DWARF, PDB): articles, documentation, software, and talks
19 days ago by dannyow
libsai - Library for interfacing with SYSTEMAX's Easy Paint Tool Sai.
crack  reverse-engineering 
25 days ago by lenciel
Fairly un-documented static analysis / emulation / symbolik analysis framework for PE/Elf/Mach-O/Blob binary formats on various architectures.
binary  analysis  reverse-engineering  python  security  exploit  research 
5 weeks ago by plaxx
GitHub - camthesaxman/zeldasource: Disassembly of Legend of Zelda
"This is a work in progress disassembly of The Legend of Zelda for the Nintendo Entertainment System."
video  games  retro  reverse-engineering  programming  nintendo  nes  zelda 
7 weeks ago by ddribin
IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger that offers so many features it is hard to describe them all.
disassembler  debugging  reverse-engineering  tools  software 
7 weeks ago by rtsk
Bytecode Viewer
A Java 8 Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
android  java  decompiler  reverse-engineering  bytecode  apk  jar 
8 weeks ago by tp78
Cryptic Crossword: Amateur Crypto and Reverse Engineering
Reverse engineering is a special subgenre of computer programming. It's about the closest that I as a programmer get to being a scientist. Gather data, formulate a hypothesis, test, refine, repeat: reverse engineering is basically applying the scientific method to a very, very small knowledge domain. If you've never tried to reverse-engineer a program before, you may be wondering how one goes about such a task. The following essay retraces one of the more colorful reverse-engineering problems that I've pursued.
cryptanalysis  programming  reverse-engineering  puzzles 
9 weeks ago by jchris

« earlier    

related tags

analysis  android  anti  api  apk  app  apple  architecture  arm  asm  assembly  barcode  binary  bitcoin  blog  bytecode  c++  c  cars  certificatepinning  charlesproxy  clojure  code  collaboration  compiler  core-location  course  crack  cracking  cryptanalysis  ctf  debug  debugger  debugging  decompilation  decompiler  dev  development  diesel  disassembler  disassembly  driving  dynamic  edge  electronic  electronics  elf  embedded  emissions  encryption  engineering  escape  executable  explanation  exploit  extension  file  fileformat  filetype  fingerprinting  firmware  format  framework  fun  games  gcc  geo-location  gui  guide  hack  hacking  hakin9  hardware  heap  https  ida  idb  immunity  infosec  ios  iot  jar  java  javascript  jeb  kernel  keygen  law  library  linux  low-level  mac  machine  macho  macos  malware  microsoft  mips  mitm  mitmproxy  mov  multi-platform  nes  netsec  network  networking  ninja  nintendo  opensource  osx  overflow  paid  parser  parsing  pcap  pe  peda  plugin  programming  protobuffers  puzzles  python  qt  quebec  r2  radare  radare2  rar  raytracer  recon  refactoring  reference  regulation  research  restaurant  retro  reverse  reverseengineering  rf  science  security  shellcode  software  ssl  starbucks  synchronize  syscall  tax  team  tool  tools  training  trial  tutorial  type  type:course  uefi  unicorn  video  virtual  vm  volkswagen  walkthrough  windbg  windows  zelda 

Copy this bookmark: