PDA

View Full Version : General Reversing


  1. our old friend LordPE
  2. XGETBV trickies
  3. BSOD error parameters
  4. Softice Discussions
  5. Windbg remote break command line process ($MFT related)
  6. DISM
  7. Efficient String searching
  8. Debugging Softice loading with VMWare
  9. C++ programming for reversing
  10. XP on modern systems
  11. Windbg HWND Extension x64
  12. Exploring CFG (Control Flow Guard)
  13. USB drivers for Win 7 on 8th generation Intel chipset
  14. Stuck for a keygen
  15. Flexnet
  16. Help Understanding WIBU-BoX internal encryption process
  17. How this perl code generated(plain code + compiled code) generated? And how to debug?
  18. Identify license system
  19. PerlCC decompiler
  20. aladdin hardlock emulation problem
  21. How to detected what packing format
  22. Safenet Sentinel Time DL & PRO P
  23. Keylok Emulator
  24. Arxan packer
  25. How to Reverse Engineer/Unpack a Protected Dll File
  26. unpack a safengine protected software
  27. Where to begin.
  28. Ckinfo
  29. Superpro Ultrapro Tables Extract - How to?
  30. FlexLm: Recracked the wheel
  31. Sparkey Dongle Emulator
  32. Making DLL with Hex byte code
  33. Export Table Tester
  34. Reversing TCL based applications
  35. time limit how to break
  36. How to add Function to Various System DLL.
  37. What does this command?
  38. EXEtender. Has anyone played with this thing?
  39. HASP3 Dongle emulation in DosBox
  40. Immunity dbg scripting - how to shift-F9 ?
  41. IDAPython simulating UI actions?
  42. Hello Team Any help for fix 2 error in compile emulator.
  43. Questions: Reverse Engineers of RCE
  44. Circumventing Memory Integrity Checks with Loader
  45. today's FB's 'mention'-attack
  46. undefined reference to `__imp_callui ' I can not my knowledge
  47. DNGuard 3.71
  48. String encrypted - decrypt?
  49. Cracking in a virtual machine (VM) possible?
  50. FlexLM 11.11.0 Protection for signature of Licence File
  51. "coded in base 10"
  52. assembly to C - tools
  53. Embedded Flex v6.0d - almost there
  54. [Tool] PackerAttacker
  55. iOS Application Reverse Engineering
  56. [ Mobile CTF ] Mobile Security Challenge
  57. Very basic noob question about DLL
  58. Program is checking Input after programs restart
  59. HASP4 LPT PARALLEL DONGLE USING MULTIKEY
  60. Reprise target
  61. How to unPack .... Please Help!!!
  62. Should I even bother?
  63. Memory Loader & Pacther
  64. How to pass arguments to the x64dbg debugger
  65. Newbie: Working on beating a program and can't figure out secondary level of protect
  66. AladdinHL emulator compatible to win 8.1 x64
  67. problem with ollybone
  68. unpacking_malware
  69. Fix DLL Dump
  70. SENTINEL (SDHK)
  71. Question about dwFlags and IDA (or any simple way to translate dwFlags)
  72. Guide me, wrote bunch of BASE conversions..
  73. Guide me, writing Big Num Math functions..
  74. Machine learning a instruction set by the effect the instruction has.
  75. Need some guide lines on how to get started!?
  76. Emulating a hardlock E-Y-E
  77. Question on Pipes & Threads
  78. DLL Deobfuscation
  79. Reversing a poorly written document to build a API.
  80. Ollydbg - Trace over Systems Calls
  81. VM Detection / REIL (source code links)
  82. Just a general question
  83. How to extract seeds from Vendorcode?
  84. Wannabe Universal Import Fixer (WannabeUIF) by SmilingWolf
  85. help
  86. matrix dongle emulator
  87. Editing stings in an executable file once its executed(memory).
  88. FB malware 20150301
  89. Could some kind soul please help a Newbie
  90. newbie stuck with target in OllyDbg
  91. SENTEMUL2007-windows7 problems
  92. Parsing Heap Segments from BackEnd Heap
  93. Why this settings at Flexlm SDK for VENDOR_STRING doesn't work?
  94. Finding Seeds of FlexLM when Jobs always zeroed?
  95. Open source alternative like IIDKing
  96. A sample malware I analyzed
  97. Removing Dinkey Dongle protection
  98. Removing Sentinel SuperPro from VFP application
  99. When use "vendor defined encryption routines", how to set daemon related part?
  100. Statically linked binaries
  101. Help Patching exe with keylok ii dongle
  102. Flexlm 11.12
  103. How to extract seeds for other daemons beside main daemon in Combined vendor daemon?
  104. i Need Help for Decrypting this swf
  105. ARTeam: armag3ddon 2.2 and also the full sources
  106. Need to identify hash
  107. everkey/rocky4 hacking someone experienced?
  108. HLP&chm Olly V2.xx
  109. Bluetooth, Android, and nothing more!
  110. Uncommon file format .SPR - Store sequencial sprites.
  111. Hi All I am new and have already a question
  112. Flexlm 11.9 in java target
  113. Solve seed from old Hardlock USB key
  114. Ask help on algorithm analysis for this function?
  115. HASP SRM OR NOT
  116. RMS Toolkit by Synkro
  117. Few noob questions in Hasp HL
  118. RE: A request to all.
  119. help Eutron dongle and expiring license file
  120. Help on checksum analysis
  121. Windows - Bios mapping to kernel address space
  122. Ollydbg hex dump
  123. Ollydbg & JNE
  124. No error codes to reference - noob question
  125. [ New Tool ] CryptoShark
  126. Skype Changes In The Protocol And Skypekit
  127. How to dig out 3 ecc public keys from generated lmcrypt?
  128. Help Flexlm 11.10 target (need lmcrypt for patched publickey)
  129. Quick Question
  130. Crypkey - ckinfo like
  131. Whether this is RSA algorithm? Long time on debug, but can't find public key even.
  132. Help and directions required.
  133. What's the algorithm for this codes?
  134. Mobile/Tablet tricks and other things....
  135. Any tool under Linux support set breakpoint at 'Memory, access' just like in ollydbg?
  136. Dotfuscator
  137. Android Koler trojan: C&C part
  138. [Help] FlexLM 11.10.1
  139. Android Koler trojan: analysis
  140. [ New Tool ] Frida
  141. HardLock FAST EYE LPT DONGLE
  142. "Super-secret" AMD-debug extensions...update !
  143. [New Tool] Portable Reverse Engineering Framework
  144. [ New Tool ] InnoExtractor v4.7.0.155 Final - Inno Setup unpacker
  145. the status of secure instant messaging things
  146. [ New Tool ] Capstone-Engine
  147. [ Hacking the D-Link DSP-W215 Smart Plug ]
  148. [ VM Escaping ]
  149. [ New Tool ] TitanHide
  150. Android Malware