unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
APKTool: A tool for reverse engineering Android APK files
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-17 12:21:36 | 阅读: 21 |
收藏
|
www.reddit.com
upview
Automatic Exploit Generation : Rop Chains
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-16 03:51:16 | 阅读: 21 |
收藏
|
www.reddit.com
breaki
comments100
upvotedlog
commentlog
Cool New Stuff in GDB 9, GDB 10, and GDB 11 - Greg Law - CppCon 2021
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-16 00:2:23 | 阅读: 12 |
收藏
|
www.reddit.com
voteposted
policymod
Resources related to executable packing (contributions welcome)
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-15 18:18:56 | 阅读: 10 |
收藏
|
www.reddit.com
upvotedlog
yetbe
A Deep Dive into The Grief Ransomware’s Capabilities
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-15 04:13:27 | 阅读: 21 |
收藏
|
www.reddit.com
knowle
discussions
yetbe
3DO M2 Giant SDK Source Code Dump! The Cancelled 3DO M2 Laid Bare with Files, Details and More!
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-14 21:46:44 | 阅读: 18 |
收藏
|
www.reddit.com
reverse
youtu
fruitful
by55
Fantastic Symbols and Where to Find Them - Part 1
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-14 21:30:40 | 阅读: 16 |
收藏
|
www.reddit.com
discussions
reverse
FirmWire/FirmWire: FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband firmwares
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-14 16:32:54 | 阅读: 24 |
收藏
|
www.reddit.com
firmwi
upno
coinsreddit
policymod
XELFViewer 0.04 ELF file viewer/editor for Windows, Linux and MacOS.
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-14 09:43:42 | 阅读: 28 |
收藏
|
www.reddit.com
upfound
upview
upvotedlog
discussions
Dumping Firmware With a 555
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-13 04:39:27 | 阅读: 11 |
收藏
|
www.reddit.com
policymod
comments67
yetbe
Exploit Kits vs. Google Chrome
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-13 01:8:22 | 阅读: 15 |
收藏
|
www.reddit.com
upfound
by20
upvotedlog
discussions
communityno
New advisory: how a vulnerability in multiple Uniview devices allow remote unauthenticated attackers to trigger a remote code execution vulnerability in the products the company offers.
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-12 19:0:34 | 阅读: 14 |
收藏
|
www.reddit.com
coinsreddit
by27
yetbe
[CFP] Call for Papers for Hardwear.io Security Conference USA 2022 is OPEN!
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-12 18:6:9 | 阅读: 13 |
收藏
|
www.reddit.com
upfound
upvotedlog
coinsreddit
Generating & Analyzing Shellcode with Radare2
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-11 10:46:2 | 阅读: 13 |
收藏
|
www.reddit.com
upfound
upvotedlog
commentlog
Blumentals Program Protector v4.x protection bypass - cphookLoader64
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-11 04:26:5 | 阅读: 15 |
收藏
|
www.reddit.com
by50
Reverse engineering of a resin 3d printer, the Anycubic Mono 4k
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-11 02:34:52 | 阅读: 15 |
收藏
|
www.reddit.com
voteposted
by22
nvienn
reverse
Igor’s tip of the week #71: Decompile as call - when the code (asm) use non-standard instructions or use them in non-standard ways
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-10 23:18:45 | 阅读: 14 |
收藏
|
www.reddit.com
by2
comments100
yetbe
reverse
coinsreddit
/r/ReverseEngineering's Weekly Questions Thread
VotePosted by5 minutes ago To reduce the amount of noise from questions, we have disable...
2022-1-10 16:0:16 | 阅读: 12 |
收藏
|
www.reddit.com
reverse
noise
upvotedlog
yetbe
voteposted
Breaking Zynq's secure boot (the tedious way)
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-9 18:31:11 | 阅读: 18 |
收藏
|
www.reddit.com
voteposted
commentlog
Breaking the Nespresso Vertuo Barcodes
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-1-9 15:51:24 | 阅读: 26 |
收藏
|
www.reddit.com
policymod
upfound
nesp
Previous
101
102
103
104
105
106
107
108
Next