DEV Community

# reverseengineering

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Return Oriented Programming on ARM (32-bit)

Return Oriented Programming on ARM (32-bit)

31
Comments
5 min read
Top 10 Reverse Engineering Tools

Top 10 Reverse Engineering Tools

29
Comments
3 min read
How to Extract an API Key from a Mobile App by Static Binary Analysis

How to Extract an API Key from a Mobile App by Static Binary Analysis

13
Comments 2
8 min read
Deciphering MalwareTech's Static Analysis Challenges [shellcode1]

Deciphering MalwareTech's Static Analysis Challenges [shellcode1]

12
Comments 2
4 min read
Windows Game Hack with Javascript | Part 1

Windows Game Hack with Javascript | Part 1

10
Comments 2
4 min read
Practical Binary Analysis – CTF Walkthrough – Level 3, 4

Practical Binary Analysis – CTF Walkthrough – Level 3, 4

9
Comments
3 min read
Ghidra Scripting: Annotating Linux system calls

Ghidra Scripting: Annotating Linux system calls

8
Comments
3 min read
How to extract C# Code from Unity APK

How to extract C# Code from Unity APK

8
Comments
3 min read
Root-Me - Xor Madness - Walkthrough

Root-Me - Xor Madness - Walkthrough

7
Comments
3 min read
Would CTF tutorial interest you?

Would CTF tutorial interest you?

7
Comments 4
1 min read
IAANSEC | WannaCry Analysis Report

IAANSEC | WannaCry Analysis Report

6
Comments
7 min read
Introduction to Angr

Introduction to Angr

6
Comments
4 min read
Root-Me: GB - Basic GameBoy crackme walkthrough

Root-Me: GB - Basic GameBoy crackme walkthrough

6
Comments
2 min read
ZeroMessenger: Improving Facebook Zero's messaging functionality

ZeroMessenger: Improving Facebook Zero's messaging functionality

6
Comments
10 min read
How does the followers suggestion work?

How does the followers suggestion work?

6
Comments
2 min read
GoLang Reverse Engineering & Hacking

GoLang Reverse Engineering & Hacking

5
Comments
2 min read
Interesting Malware Analysis Writeups

Interesting Malware Analysis Writeups

5
Comments 1
2 min read
Easy Crack

Easy Crack

4
Comments 1
4 min read
Creating Fastmail Masked Emails without 1Password anytime and everywhere

Creating Fastmail Masked Emails without 1Password anytime and everywhere

4
Comments
2 min read
Malware Analysis For Newbies

Malware Analysis For Newbies

3
Comments
3 min read
PSA: Avoid shady Android launcher apps

PSA: Avoid shady Android launcher apps

3
Comments
3 min read
Reverse Engineering Poocoin API (Part 1)

Reverse Engineering Poocoin API (Part 1)

3
Comments
2 min read
Jordan Reverse Engineers, Part 1

Jordan Reverse Engineers, Part 1

2
Comments
3 min read
Reverse engineering an IL2CPP NSO binary: Case study of Mojipittan Encore

Reverse engineering an IL2CPP NSO binary: Case study of Mojipittan Encore

2
Comments
15 min read
New Malware Analysis Tutorials

New Malware Analysis Tutorials

2
Comments
4 min read
Virtual Memory Address Translation FAQ

Virtual Memory Address Translation FAQ

1
Comments
4 min read
CSC CTF 2020 Write Up

CSC CTF 2020 Write Up

1
Comments
7 min read
How to Learn Game Hacking

How to Learn Game Hacking

1
Comments
2 min read
An Exploratory Account of Software Reverse Engineering in a Security Context

An Exploratory Account of Software Reverse Engineering in a Security Context

1
Comments
17 min read
Reverse Engineering Netflix Falcor API

Reverse Engineering Netflix Falcor API

1
Comments
9 min read
TryHackMe - REloaded Writeup

TryHackMe - REloaded Writeup

1
Comments
7 min read
How to Hack & Protect Flutter Apps (Pt. 2/3)

How to Hack & Protect Flutter Apps (Pt. 2/3)

1
Comments
1 min read
Enter the World of Game Hacking

Enter the World of Game Hacking

1
Comments
5 min read
Are Anticheats Effective?

Are Anticheats Effective?

1
Comments
4 min read
Reverse engineering CryptoPanic REST API

Reverse engineering CryptoPanic REST API

1
Comments
3 min read
Analyzing Malware C2 Panels

Analyzing Malware C2 Panels

1
Comments
3 min read
Malware Analysis Careers

Malware Analysis Careers

1
Comments
2 min read
AntiDebug Tricks

AntiDebug Tricks

1
Comments
3 min read
Careers in Exploit Development

Careers in Exploit Development

1
Comments
2 min read
Living Off the Land: Reverse Engineering Methodology + Tips & Tricks (Cmdl32 Case Study)

Living Off the Land: Reverse Engineering Methodology + Tips & Tricks (Cmdl32 Case Study)

1
Comments
20 min read
Calling Conventions

Calling Conventions

1
Comments
2 min read
[01/52] - Introduction and Media Production Pipeline

[01/52] - Introduction and Media Production Pipeline

Comments
4 min read
Who needs a Sensibo anyway?

Who needs a Sensibo anyway?

Comments
12 min read
Reverse Engineering Pokemon's SBIN File Format

Reverse Engineering Pokemon's SBIN File Format

Comments
2 min read
Reverse Engineering: NgModuleFactoryLoader in Angular

Reverse Engineering: NgModuleFactoryLoader in Angular

Comments
6 min read
Virtual Machines for Malware Analysis

Virtual Machines for Malware Analysis

Comments
3 min read
Common Game Hacking Questions

Common Game Hacking Questions

Comments
2 min read
Stealer Malware

Stealer Malware

Comments 1
4 min read
Unity Game Hacking

Unity Game Hacking

Comments
2 min read
ManEater Cheats

ManEater Cheats

Comments
4 min read
Most Popular DLL Injectors

Most Popular DLL Injectors

Comments
3 min read
HWID Spoofers

HWID Spoofers

Comments
2 min read
ASLR Bypass - Exploit Development

ASLR Bypass - Exploit Development

Comments
3 min read
Unreal Engine Dumping

Unreal Engine Dumping

Comments
2 min read
Bypassing Anti-Debug Techniques

Bypassing Anti-Debug Techniques

Comments
2 min read
Unreal Engine Modding Tools

Unreal Engine Modding Tools

Comments
3 min read
Challenge RE # 5

Challenge RE # 5

Comments
6 min read
Challenge RE #7

Challenge RE #7

Comments
3 min read
Challenge #10

Challenge #10

Comments
1 min read
Challenge RE #22

Challenge RE #22

Comments
4 min read
loading...