PDA

View Full Version : General Reversing


  1. Info on TEB->TlsLinks?
  2. Windbg Syntax
  3. understanding opcodes hLep
  4. !addsym Windbg - IDA Symbol extension Redux
  5. Visual Basic 5_6 stuff
  6. Remote kernel mode debugging in non-VM environment
  7. our old friend LordPE
  8. XGETBV trickies
  9. BSOD error parameters
  10. Softice Discussions
  11. Windbg remote break command line process ($MFT related)
  12. DISM
  13. Efficient String searching
  14. Debugging Softice loading with VMWare
  15. C++ programming for reversing
  16. XP on modern systems
  17. Windbg HWND Extension x64
  18. Exploring CFG (Control Flow Guard)
  19. USB drivers for Win 7 on 8th generation Intel chipset
  20. Stuck for a keygen
  21. Flexnet
  22. Help Understanding WIBU-BoX internal encryption process
  23. How this perl code generated(plain code + compiled code) generated? And how to debug?
  24. Identify license system
  25. PerlCC decompiler
  26. aladdin hardlock emulation problem
  27. How to detected what packing format
  28. Safenet Sentinel Time DL & PRO P
  29. Keylok Emulator
  30. Arxan packer
  31. How to Reverse Engineer/Unpack a Protected Dll File
  32. unpack a safengine protected software
  33. Where to begin.
  34. Ckinfo
  35. Superpro Ultrapro Tables Extract - How to?
  36. FlexLm: Recracked the wheel
  37. Sparkey Dongle Emulator
  38. Making DLL with Hex byte code
  39. Export Table Tester
  40. Reversing TCL based applications
  41. time limit how to break
  42. How to add Function to Various System DLL.
  43. What does this command?
  44. EXEtender. Has anyone played with this thing?
  45. HASP3 Dongle emulation in DosBox
  46. Immunity dbg scripting - how to shift-F9 ?
  47. IDAPython simulating UI actions?
  48. Hello Team Any help for fix 2 error in compile emulator.
  49. Questions: Reverse Engineers of RCE
  50. Circumventing Memory Integrity Checks with Loader
  51. today's FB's 'mention'-attack
  52. undefined reference to `__imp_callui ' I can not my knowledge
  53. DNGuard 3.71
  54. String encrypted - decrypt?
  55. Cracking in a virtual machine (VM) possible?
  56. FlexLM 11.11.0 Protection for signature of Licence File
  57. "coded in base 10"
  58. assembly to C - tools
  59. Embedded Flex v6.0d - almost there
  60. [Tool] PackerAttacker
  61. iOS Application Reverse Engineering
  62. [ Mobile CTF ] Mobile Security Challenge
  63. Very basic noob question about DLL
  64. Program is checking Input after programs restart
  65. HASP4 LPT PARALLEL DONGLE USING MULTIKEY
  66. Reprise target
  67. How to unPack .... Please Help!!!
  68. Should I even bother?
  69. Memory Loader & Pacther
  70. How to pass arguments to the x64dbg debugger
  71. Newbie: Working on beating a program and can't figure out secondary level of protect
  72. AladdinHL emulator compatible to win 8.1 x64
  73. problem with ollybone
  74. unpacking_malware
  75. Fix DLL Dump
  76. SENTINEL (SDHK)
  77. Question about dwFlags and IDA (or any simple way to translate dwFlags)
  78. Guide me, wrote bunch of BASE conversions..
  79. Guide me, writing Big Num Math functions..
  80. Machine learning a instruction set by the effect the instruction has.
  81. Need some guide lines on how to get started!?
  82. Emulating a hardlock E-Y-E
  83. Question on Pipes & Threads
  84. DLL Deobfuscation
  85. Reversing a poorly written document to build a API.
  86. Ollydbg - Trace over Systems Calls
  87. VM Detection / REIL (source code links)
  88. Just a general question
  89. How to extract seeds from Vendorcode?
  90. Wannabe Universal Import Fixer (WannabeUIF) by SmilingWolf
  91. help
  92. matrix dongle emulator
  93. Editing stings in an executable file once its executed(memory).
  94. FB malware 20150301
  95. Could some kind soul please help a Newbie
  96. newbie stuck with target in OllyDbg
  97. SENTEMUL2007-windows7 problems
  98. Parsing Heap Segments from BackEnd Heap
  99. Why this settings at Flexlm SDK for VENDOR_STRING doesn't work?
  100. Finding Seeds of FlexLM when Jobs always zeroed?
  101. Open source alternative like IIDKing
  102. A sample malware I analyzed
  103. Removing Dinkey Dongle protection
  104. Removing Sentinel SuperPro from VFP application
  105. When use "vendor defined encryption routines", how to set daemon related part?
  106. Statically linked binaries
  107. Help Patching exe with keylok ii dongle
  108. Flexlm 11.12
  109. How to extract seeds for other daemons beside main daemon in Combined vendor daemon?
  110. i Need Help for Decrypting this swf
  111. ARTeam: armag3ddon 2.2 and also the full sources
  112. Need to identify hash
  113. everkey/rocky4 hacking someone experienced?
  114. HLP&chm Olly V2.xx
  115. Bluetooth, Android, and nothing more!
  116. Uncommon file format .SPR - Store sequencial sprites.
  117. Hi All I am new and have already a question
  118. Flexlm 11.9 in java target
  119. Solve seed from old Hardlock USB key
  120. Ask help on algorithm analysis for this function?
  121. HASP SRM OR NOT
  122. RMS Toolkit by Synkro
  123. Few noob questions in Hasp HL
  124. RE: A request to all.
  125. help Eutron dongle and expiring license file
  126. Help on checksum analysis
  127. Windows - Bios mapping to kernel address space
  128. Ollydbg hex dump
  129. Ollydbg & JNE
  130. No error codes to reference - noob question
  131. [ New Tool ] CryptoShark
  132. Skype Changes In The Protocol And Skypekit
  133. How to dig out 3 ecc public keys from generated lmcrypt?
  134. Help Flexlm 11.10 target (need lmcrypt for patched publickey)
  135. Quick Question
  136. Crypkey - ckinfo like
  137. Whether this is RSA algorithm? Long time on debug, but can't find public key even.
  138. Help and directions required.
  139. What's the algorithm for this codes?
  140. Mobile/Tablet tricks and other things....
  141. Any tool under Linux support set breakpoint at 'Memory, access' just like in ollydbg?
  142. Dotfuscator
  143. Android Koler trojan: C&C part
  144. [Help] FlexLM 11.10.1
  145. Android Koler trojan: analysis
  146. [ New Tool ] Frida
  147. HardLock FAST EYE LPT DONGLE
  148. "Super-secret" AMD-debug extensions...update !
  149. [New Tool] Portable Reverse Engineering Framework
  150. [ New Tool ] InnoExtractor v4.7.0.155 Final - Inno Setup unpacker
  151. the status of secure instant messaging things
  152. [ New Tool ] Capstone-Engine
  153. [ Hacking the D-Link DSP-W215 Smart Plug ]
  154. [ VM Escaping ]
  155. [ New Tool ] TitanHide
  156. Android Malware