unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Obfvious - a CLang (v 12) based compiler that allows for Windows binaries obfuscation [WiP]
Vote VotePosted by1 hour ago github.com/nimrod...0 comments100% UpvotedLog i...
2021-02-21 02:21:15 | 阅读: 169 |
收藏
|
www.reddit.com
voteposted
byno
yetbe
coinsreddit
policymod
Reverse engineering the SARS-CoV-2 vaccine source code [Animated with permission from OP]
Vote VotePosted by33 minutes ago youtube.com/watch?...0 comments100% Upvoted...
2021-02-20 19:37:41 | 阅读: 179 |
收藏
|
www.reddit.com
policymod
commentlog
upsort
discussions
Unknown (and unemulated) internal ROM inside SEGA's SVP chip [i.e. enhancement chip in Virtua Racing Sega Genesis 3D game cart]
Vote VotePosted by1 hour ago reddit.com/r/retr...0 comments60% UpvotedLog in...
2021-02-20 14:37:05 | 阅读: 180 |
收藏
|
www.reddit.com
by1
reddit
retr
upvotedlog
BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-Program Path Sampling and Per-Path Abstract Interpretation [PDF]
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsLog InSi...
2021-02-20 11:19:25 | 阅读: 171 |
收藏
|
www.reddit.com
upvote
Reversing a third-party closed-source application to add additional security features.
level 1Original Poster53 minutes agoHeya, I tried to make this blogpost as educative...
2021-02-20 06:24:40 | 阅读: 179 |
收藏
|
www.reddit.com
blogpost
educative
sandwiched
guys
1original
Fun reverse engineering on the MSX to trigger easter eggs in a game
Vote VotePosted byjust now youtube.com/watch?...0 comments100% UpvotedLog in...
2021-02-20 03:09:09 | 阅读: 194 |
收藏
|
www.reddit.com
appreddit
coinsreddit
yetbe
ImHex 1.7.0 : Light mode, Node data processor, custom encodings and more
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsLog InSi...
2021-02-19 04:09:38 | 阅读: 164 |
收藏
|
www.reddit.com
github
discussions
Getting Information Disclosure in Adobe Reader Through the ID Tag
Vote VotePosted by1 hour ago zerodayinitiative.com/blog/2...0 comments100% U...
2021-02-19 04:09:38 | 阅读: 144 |
收藏
|
www.reddit.com
appreddit
coinsreddit
voteposted
When you go fighting malware don´t forget your VT plugins - Register For Free!
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsLog InSi...
2021-02-19 00:55:15 | 阅读: 150 |
收藏
|
www.reddit.com
comments100
discussions
reverse
Siliconpr0n
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsLog InSi...
2021-02-18 19:56:34 | 阅读: 157 |
收藏
|
www.reddit.com
policymod
by29
Embedded World-in-a-Box idea: good or bad?
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsLog InSi...
2021-02-18 08:28:32 | 阅读: 159 |
收藏
|
www.reddit.com
policymod
agolooks
How Malware Can Resolve APIs By Hash
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsLog InSi...
2021-02-18 05:12:43 | 阅读: 185 |
收藏
|
www.reddit.com
comments100
commentlog
upvote
voteposted
q8of74
Dump o01 string files on flip phones
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsLog InSi...
2021-02-18 01:54:48 | 阅读: 152 |
收藏
|
www.reddit.com
upvote
github
userse
comments100
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary [PDF]
Vote VotePosted by16 minutes ago cs.purdue.edu/homes/...0 comments100% Upvot...
2021-02-17 22:33:39 | 阅读: 271 |
收藏
|
www.reddit.com
byno
voteposted
comments100
JEB Community Edition
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsLog InSi...
2021-02-17 20:53:09 | 阅读: 157 |
收藏
|
www.reddit.com
policymod
jeb
Using eBPF to uncover in-memory loading
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsLog InSi...
2021-02-17 20:53:09 | 阅读: 165 |
收藏
|
www.reddit.com
by1
appreddit
comments0
New sister subreddit: /r/AskReverseEngineering
The short version of this post is that anyone who wants to moderate r/AskReverseEngineering should r...
2021-02-17 09:15:50 | 阅读: 216 |
收藏
|
www.reddit.com
subreddit
reverse
weekly
Fuzzing combined with symbolic execution: a demonstration on SymCC and AFL
Vote VotePosted by1 hour ago youtube.com/watch?...0 comments50% UpvotedLog i...
2021-02-17 09:15:50 | 阅读: 233 |
收藏
|
www.reddit.com
reverse
coinsreddit
voteposted
Manually fixing opaque predicates and using X-Rays for decryption [Malware Reverse Engineering video]
Vote VotePosted by31 minutes ago youtu.be/bEsQ8U...0 comments67% UpvotedLog...
2021-02-17 04:21:35 | 阅读: 206 |
收藏
|
www.reddit.com
reverse
voteposted
youtu
commentlog
Fuzzing Python library using Google Atheris Fuzzer (video tutorial)
Vote VotePosted by1 hour ago youtu.be/JfFD7-...0 comments50% UpvotedLog in o...
2021-02-16 21:46:37 | 阅读: 172 |
收藏
|
www.reddit.com
youtu
jffd7
byview
appreddit
coinsreddit
Previous
137
138
139
140
141
142
143
144
Next