unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Reverse engineering a proprietary USB control driver for a mechanical keyboard and building an open source equivalent
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-27 16:25:27 | 阅读: 15 |
收藏
|
www.reddit.com
is9wvo
commentlog
yetbe
Programmatically calling into the Android runtime from ADB shell commands
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-26 00:26:22 | 阅读: 21 |
收藏
|
www.reddit.com
comments100
commentlog
upview
Part 3 in my Lua De-virtualization journey, breaking Luraph!
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-25 04:59:4 | 阅读: 28 |
收藏
|
www.reddit.com
upfound
comments100
policymod
The Bvp47 - a Top-tier Backdoor of US NSA Equation Group
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-24 23:55:41 | 阅读: 84 |
收藏
|
www.reddit.com
commentlog
Reverse Engineering the Surface Book 2's proprietary IOCTL commands
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-24 04:55:49 | 阅读: 16 |
收藏
|
www.reddit.com
coinsreddit
policymod
by22
Finding MySQL CLuster Bugs by Using Clang Checkers and CodeQL Queries to Detect Untrusted Pointer Derefs and Tainted Loop Conditions
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-24 01:55:0 | 阅读: 23 |
收藏
|
www.reddit.com
voteposted
upvotedlog
upfound
Reversing Games with... Hashcat???
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-24 01:37:10 | 阅读: 21 |
收藏
|
www.reddit.com
by18
wuffs
yetbe
reverse
Reverse Engineering Community on Twitter
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-24 00:37:21 | 阅读: 26 |
收藏
|
www.reddit.com
upno
yetbe
coinsreddit
A C++17 library for reading Microsoft Program Debug Database PDB files
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-23 06:2:28 | 阅读: 9 |
收藏
|
www.reddit.com
library
yetbe
coinsreddit
agoa
commentlog
Ethereum/EVM Smart Contract Reverse Engineering & Disassembly
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-22 22:37:19 | 阅读: 19 |
收藏
|
www.reddit.com
reverse
A RISC-V JIT for rv32i written in Rust with an x86_64 backend (Gamozo Labs)
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-22 18:1:34 | 阅读: 21 |
收藏
|
www.reddit.com
voteposted
Scaling Dumb Fuzzing with Kubernetes
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-22 07:23:21 | 阅读: 18 |
收藏
|
www.reddit.com
yetbe
Automated Localisation of a Mixed Boolean Arithmetic Obfuscation Window in a Program Binary [PDF, Ph.D. thesis]
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-22 04:26:32 | 阅读: 27 |
收藏
|
www.reddit.com
comments100
reverse
coinsreddit
CodeCat is an open-source tool to help you find/track user input sinks and bugs using static code analysis. These points follow regex rules.
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-21 20:53:27 | 阅读: 23 |
收藏
|
www.reddit.com
cooler
policymod
upfound
/r/ReverseEngineering's Weekly Questions Thread
VotePosted by7 minutes ago To reduce the amount of noise from questions, we have disable...
2022-2-21 16:0:19 | 阅读: 10 |
收藏
|
www.reddit.com
reverse
unified
comments100
noise
Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-21 03:12:13 | 阅读: 47 |
收藏
|
www.reddit.com
jonath
commentlog
communityno
reverse
PDBRipper 2.02 is an utility for extract an information from PDB-files.
read file error: open notes: too many open files...
2022-2-20 03:53:6 | 阅读: 18 |
收藏
|
www.reddit.com
horsic
upview
yetbe
policymod
Toy store wifi credentials into esp32 external flash.
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-19 01:31:45 | 阅读: 20 |
收藏
|
www.reddit.com
toy1r
coinsreddit
5ffeme
Intel is hosting a free training on Intel SGX hacking
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-18 01:42:46 | 阅读: 14 |
收藏
|
www.reddit.com
comments50
upvotedlog
commentlog
upfound
voteposted
Practical Calling Conventions For Reverse Engineers (OALABS Tutorial)
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-18 00:52:52 | 阅读: 18 |
收藏
|
www.reddit.com
yetbe
voteposted
youtu
9lzw0i
Previous
96
97
98
99
100
101
102
103
Next