Search results
  1. 20 Nov 2014
  2. 20 Jan 2019

    Easy way to install on Android with

  3. 9 Oct 2017
  4. 13 Jun 2017
    Replying to

    They are being completely ridiculous. The built-in assistant practically reverses everything for you.

  5. Pwning for the PwnDebian challenge. Found a command injection hidden in a crafted binary. Fixed in master as of yesterday

    Show this thread
  6. 14 Oct 2017
  7. 2 Feb 2018
  8. 17 Dec 2019

    WU for challenges "secure flag storage" : With some tips for debugging OP-TEE with

  9. 27 Mar 2017

    Finally published the first part in a series of articles: A journey into radare2. Check it out @

  10. 6 Sep 2019

    I can use decompiler at command line with . Thanks everyone for making it possible.

  11. 7 Mar 2017
  12. cutter - A Qt and C++ GUI for reverse engineering framework by

  13. 7 Mar 2017
  14. 27 Dec 2016
  15. 13 Mar 2018

    It took awhile but it's finally here – Reversing a Self-Modifying Binary with the almighty radare2! Check it out @

  16. 9 Jul 2019

    Researching obscure architectures sounds challenging to you? We thought so too, so we developed a disassembly and analysis plugin for to make things easier! Read on to learn how we did it.

  17. How to find a symbol in a binary using radare2?

  18. This is a great CTF writeup of "Inst Prof", including detailed commands. Perfect to learn about :

  19. 9 Nov 2017

    Releasing APK-Anal, a simple python script for quick apk analysis based on (), and more:

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.