PDA

View Full Version : General Reversing


  1. Efficient String searching
  2. Debugging Softice loading with VMWare
  3. C++ programming for reversing
  4. XP on modern systems
  5. Windbg HWND Extension x64
  6. Exploring CFG (Control Flow Guard)
  7. USB drivers for Win 7 on 8th generation Intel chipset
  8. Stuck for a keygen
  9. Flexnet
  10. Help Understanding WIBU-BoX internal encryption process
  11. How this perl code generated(plain code + compiled code) generated? And how to debug?
  12. Identify license system
  13. PerlCC decompiler
  14. aladdin hardlock emulation problem
  15. How to detected what packing format
  16. Safenet Sentinel Time DL & PRO P
  17. Keylok Emulator
  18. Arxan packer
  19. How to Reverse Engineer/Unpack a Protected Dll File
  20. unpack a safengine protected software
  21. Where to begin.
  22. Ckinfo
  23. Superpro Ultrapro Tables Extract - How to?
  24. FlexLm: Recracked the wheel
  25. Sparkey Dongle Emulator
  26. Making DLL with Hex byte code
  27. Export Table Tester
  28. Reversing TCL based applications
  29. time limit how to break
  30. How to add Function to Various System DLL.
  31. What does this command?
  32. EXEtender. Has anyone played with this thing?
  33. HASP3 Dongle emulation in DosBox
  34. Immunity dbg scripting - how to shift-F9 ?
  35. IDAPython simulating UI actions?
  36. Hello Team Any help for fix 2 error in compile emulator.
  37. Questions: Reverse Engineers of RCE
  38. Circumventing Memory Integrity Checks with Loader
  39. today's FB's 'mention'-attack
  40. undefined reference to `__imp_callui ' I can not my knowledge
  41. DNGuard 3.71
  42. String encrypted - decrypt?
  43. Cracking in a virtual machine (VM) possible?
  44. FlexLM 11.11.0 Protection for signature of Licence File
  45. "coded in base 10"
  46. assembly to C - tools
  47. Embedded Flex v6.0d - almost there
  48. [Tool] PackerAttacker
  49. iOS Application Reverse Engineering
  50. [ Mobile CTF ] Mobile Security Challenge
  51. Very basic noob question about DLL
  52. Program is checking Input after programs restart
  53. HASP4 LPT PARALLEL DONGLE USING MULTIKEY
  54. Reprise target
  55. How to unPack .... Please Help!!!
  56. Should I even bother?
  57. Memory Loader & Pacther
  58. How to pass arguments to the x64dbg debugger
  59. Newbie: Working on beating a program and can't figure out secondary level of protect
  60. AladdinHL emulator compatible to win 8.1 x64
  61. problem with ollybone
  62. unpacking_malware
  63. Fix DLL Dump
  64. SENTINEL (SDHK)
  65. Question about dwFlags and IDA (or any simple way to translate dwFlags)
  66. Guide me, wrote bunch of BASE conversions..
  67. Guide me, writing Big Num Math functions..
  68. Machine learning a instruction set by the effect the instruction has.
  69. Need some guide lines on how to get started!?
  70. Emulating a hardlock E-Y-E
  71. Question on Pipes & Threads
  72. DLL Deobfuscation
  73. Reversing a poorly written document to build a API.
  74. Ollydbg - Trace over Systems Calls
  75. VM Detection / REIL (source code links)
  76. Just a general question
  77. How to extract seeds from Vendorcode?
  78. Wannabe Universal Import Fixer (WannabeUIF) by SmilingWolf
  79. help
  80. matrix dongle emulator
  81. Editing stings in an executable file once its executed(memory).
  82. FB malware 20150301
  83. Could some kind soul please help a Newbie
  84. newbie stuck with target in OllyDbg
  85. SENTEMUL2007-windows7 problems
  86. Parsing Heap Segments from BackEnd Heap
  87. Why this settings at Flexlm SDK for VENDOR_STRING doesn't work?
  88. Finding Seeds of FlexLM when Jobs always zeroed?
  89. Open source alternative like IIDKing
  90. A sample malware I analyzed
  91. Removing Dinkey Dongle protection
  92. Removing Sentinel SuperPro from VFP application
  93. When use "vendor defined encryption routines", how to set daemon related part?
  94. Statically linked binaries
  95. Help Patching exe with keylok ii dongle
  96. Flexlm 11.12
  97. How to extract seeds for other daemons beside main daemon in Combined vendor daemon?
  98. i Need Help for Decrypting this swf
  99. ARTeam: armag3ddon 2.2 and also the full sources
  100. Need to identify hash
  101. everkey/rocky4 hacking someone experienced?
  102. HLP&chm Olly V2.xx
  103. possible malicious redirect from fake FB message
  104. Bluetooth, Android, and nothing more!
  105. Uncommon file format .SPR - Store sequencial sprites.
  106. Hi All I am new and have already a question
  107. Flexlm 11.9 in java target
  108. Solve seed from old Hardlock USB key
  109. Ask help on algorithm analysis for this function?
  110. HASP SRM OR NOT
  111. RMS Toolkit by Synkro
  112. Few noob questions in Hasp HL
  113. RE: A request to all.
  114. help Eutron dongle and expiring license file
  115. Help on checksum analysis
  116. Windows - Bios mapping to kernel address space
  117. Ollydbg hex dump
  118. Ollydbg & JNE
  119. No error codes to reference - noob question
  120. [ New Tool ] CryptoShark
  121. Skype Changes In The Protocol And Skypekit
  122. How to dig out 3 ecc public keys from generated lmcrypt?
  123. Help Flexlm 11.10 target (need lmcrypt for patched publickey)
  124. Quick Question
  125. Crypkey - ckinfo like
  126. Whether this is RSA algorithm? Long time on debug, but can't find public key even.
  127. Help and directions required.
  128. What's the algorithm for this codes?
  129. Mobile/Tablet tricks and other things....
  130. Any tool under Linux support set breakpoint at 'Memory, access' just like in ollydbg?
  131. Dotfuscator
  132. Android Koler trojan: C&C part
  133. [Help] FlexLM 11.10.1
  134. Android Koler trojan: analysis
  135. [ New Tool ] Frida
  136. HardLock FAST EYE LPT DONGLE
  137. "Super-secret" AMD-debug extensions...update !
  138. [New Tool] Portable Reverse Engineering Framework
  139. [ New Tool ] InnoExtractor v4.7.0.155 Final - Inno Setup unpacker
  140. the status of secure instant messaging things
  141. [ New Tool ] Capstone-Engine
  142. [ Hacking the D-Link DSP-W215 Smart Plug ]
  143. [ VM Escaping ]
  144. [ New Tool ] TitanHide
  145. Android Malware