Rezultati pretraživanja
  1. 9. ožu 2019.
  2. 29. sij

    Hiring several Reverse Engineers in Annapolis Junction, MD. Candidates please DM or reach out on LinkedIn: Victoria Heck.

  3. 29. sij

    discovery of the day: you can apply structure offsets to a selection of code 🤯 select code range, press T, select your structure, be amazed

  4. 27. sij
    Prikaži ovu nit
  5. 27. sij

    📺 New Tutorial Video 📺 Learn how to automaticaly decrypt strings with and python 🐍 The 4th part in our reverse engineering deep-dive series. 👾🔍

  6. 15. sij
  7. 1. pro 2019.

    📺 New Tutorial Video 📺 Intro to scripting with Python and 🐍 Learn how to automate resolving the dynamic API calls ⚙️

  8. 22. stu 2019.

    Just published my scripts to reconstruct Microsoft COM-Code. Tested on v7.4 and Python v2+3 => Happy reversing!

  9. Auto Re - IDA PRO Auto-Renaming Plugin With Tagging Support

  10. 14. lis 2019.

    IDA Pro 7.4 has been released. Now with Python 3 support, new processor modules, structure editor, decompiler improvements and much more.

  11. 23. ruj 2019.
  12. 25. lip 2019.

    Hexext - A plugin for extending Hexrays 7.0 via microcode. It makes code prettier. It does a bunch of transformations at different phases of decompilation to clean it up, remove gotos, replace bitops, change bitwise lookup tables into comparisons.

  13. 15. lip 2019.

    If you have switched to from , and still want to fix missing labels in , use my new ghidra2x64dbg tool: It will extract symbols from an exported Symbol Table and generate an database.

    Prikaži ovu nit
  14. 14. lip 2019.

    IDA 7.3 released! With undo/redo after all these years. Also -> PowerPC x64 decompiler! I wish i had it half a year ago when i reversed a bunch of AIX PPC binaries. Complete list of features ->

  15. I wanted to learn about writing scriptable plugins for instead of just scripts. Here's the simplest plugin I could write that shows a single plugin with multiple actions (in case you've been wanting to learn the same):

    Prikaži ovu nit
  16. 9. ožu 2019.
    Prikaži ovu nit
  17. 28. velj 2019.

    Check out my blog post: "Recovering Stackstrings Using Emulation with ironstrings". The script is powered by flare-emu which combines and .

  18. 20. velj 2019.

    UPDATE: Just finished working on main function recognition feature. Try it. and plugins are ready. idenLib - Library Function Identification

  19. 7. velj 2019.

    Library Function Identification - idenLib also and plugins

  20. 9. stu 2018.

    📺 New Tutorial Video 📺 Reverse Engineering / malware (Part 2) An advanced RE tutorial, we cover: - Dumping () and importing () multiple injected code sections - Labeling APIs with - Analyzing custom code injector

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.