PDA

View Full Version : General Reversing


  1. Keylok Emulator
  2. Arxan packer
  3. How to Reverse Engineer/Unpack a Protected Dll File
  4. unpack a safengine protected software
  5. Where to begin.
  6. Ckinfo
  7. Superpro Ultrapro Tables Extract - How to?
  8. FlexLm: Recracked the wheel
  9. Sparkey Dongle Emulator
  10. Making DLL with Hex byte code
  11. Export Table Tester
  12. Reversing TCL based applications
  13. time limit how to break
  14. How to add Function to Various System DLL.
  15. What does this command?
  16. EXEtender. Has anyone played with this thing?
  17. HASP3 Dongle emulation in DosBox
  18. Immunity dbg scripting - how to shift-F9 ?
  19. IDAPython simulating UI actions?
  20. Hello Team Any help for fix 2 error in compile emulator.
  21. Questions: Reverse Engineers of RCE
  22. Circumventing Memory Integrity Checks with Loader
  23. today's FB's 'mention'-attack
  24. undefined reference to `__imp_callui ' I can not my knowledge
  25. DNGuard 3.71
  26. String encrypted - decrypt?
  27. Cracking in a virtual machine (VM) possible?
  28. FlexLM 11.11.0 Protection for signature of Licence File
  29. "coded in base 10"
  30. assembly to C - tools
  31. Embedded Flex v6.0d - almost there
  32. [Tool] PackerAttacker
  33. iOS Application Reverse Engineering
  34. [ Mobile CTF ] Mobile Security Challenge
  35. Very basic noob question about DLL
  36. Program is checking Input after programs restart
  37. HASP4 LPT PARALLEL DONGLE USING MULTIKEY
  38. Reprise target
  39. How to unPack .... Please Help!!!
  40. Should I even bother?
  41. Memory Loader & Pacther
  42. How to pass arguments to the x64dbg debugger
  43. Newbie: Working on beating a program and can't figure out secondary level of protect
  44. AladdinHL emulator compatible to win 8.1 x64
  45. problem with ollybone
  46. unpacking_malware
  47. Fix DLL Dump
  48. SENTINEL (SDHK)
  49. Question about dwFlags and IDA (or any simple way to translate dwFlags)
  50. Guide me, wrote bunch of BASE conversions..
  51. Guide me, writing Big Num Math functions..
  52. Machine learning a instruction set by the effect the instruction has.
  53. Need some guide lines on how to get started!?
  54. Emulating a hardlock E-Y-E
  55. Question on Pipes & Threads
  56. DLL Deobfuscation
  57. Reversing a poorly written document to build a API.
  58. Ollydbg - Trace over Systems Calls
  59. VM Detection / REIL (source code links)
  60. Just a general question
  61. How to extract seeds from Vendorcode?
  62. Wannabe Universal Import Fixer (WannabeUIF) by SmilingWolf
  63. help
  64. matrix dongle emulator
  65. Editing stings in an executable file once its executed(memory).
  66. FB malware 20150301
  67. Could some kind soul please help a Newbie
  68. newbie stuck with target in OllyDbg
  69. SENTEMUL2007-windows7 problems
  70. Parsing Heap Segments from BackEnd Heap
  71. Why this settings at Flexlm SDK for VENDOR_STRING doesn't work?
  72. Finding Seeds of FlexLM when Jobs always zeroed?
  73. Open source alternative like IIDKing
  74. A sample malware I analyzed
  75. Removing Dinkey Dongle protection
  76. Removing Sentinel SuperPro from VFP application
  77. When use "vendor defined encryption routines", how to set daemon related part?
  78. Statically linked binaries
  79. Help Patching exe with keylok ii dongle
  80. Flexlm 11.12
  81. How to extract seeds for other daemons beside main daemon in Combined vendor daemon?
  82. i Need Help for Decrypting this swf
  83. ARTeam: armag3ddon 2.2 and also the full sources
  84. Need to identify hash
  85. everkey/rocky4 hacking someone experienced?
  86. HLP&chm Olly V2.xx
  87. possible malicious redirect from fake FB message
  88. Bluetooth, Android, and nothing more!
  89. Uncommon file format .SPR - Store sequencial sprites.
  90. Hi All I am new and have already a question
  91. Flexlm 11.9 in java target
  92. Solve seed from old Hardlock USB key
  93. Ask help on algorithm analysis for this function?
  94. HASP SRM OR NOT
  95. RMS Toolkit by Synkro
  96. Few noob questions in Hasp HL
  97. RE: A request to all.
  98. help Eutron dongle and expiring license file
  99. Help on checksum analysis
  100. Windows - Bios mapping to kernel address space
  101. Ollydbg hex dump
  102. Ollydbg & JNE
  103. No error codes to reference - noob question
  104. [ New Tool ] CryptoShark
  105. Skype Changes In The Protocol And Skypekit
  106. How to dig out 3 ecc public keys from generated lmcrypt?
  107. Help Flexlm 11.10 target (need lmcrypt for patched publickey)
  108. Quick Question
  109. Crypkey - ckinfo like
  110. Whether this is RSA algorithm? Long time on debug, but can't find public key even.
  111. Help and directions required.
  112. What's the algorithm for this codes?
  113. Mobile/Tablet tricks and other things....
  114. Any tool under Linux support set breakpoint at 'Memory, access' just like in ollydbg?
  115. Dotfuscator
  116. Android Koler trojan: C&C part
  117. [Help] FlexLM 11.10.1
  118. Android Koler trojan: analysis
  119. [ New Tool ] Frida
  120. HardLock FAST EYE LPT DONGLE
  121. "Super-secret" AMD-debug extensions...update !
  122. [New Tool] Portable Reverse Engineering Framework
  123. [ New Tool ] InnoExtractor v4.7.0.155 Final - Inno Setup unpacker
  124. the status of secure instant messaging things
  125. [ New Tool ] Capstone-Engine
  126. [ Hacking the D-Link DSP-W215 Smart Plug ]
  127. [ VM Escaping ]
  128. [ New Tool ] TitanHide
  129. Android Malware