unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Finding MySQL CLuster Bugs by Using Clang Checkers and CodeQL Queries to Detect Untrusted Pointer Derefs and Tainted Loop Conditions
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-24 01:55:0 | 阅读: 23 |
收藏
|
www.reddit.com
voteposted
upvotedlog
upfound
Reversing Games with... Hashcat???
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-24 01:37:10 | 阅读: 21 |
收藏
|
www.reddit.com
by18
wuffs
yetbe
reverse
Reverse Engineering Community on Twitter
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-24 00:37:21 | 阅读: 26 |
收藏
|
www.reddit.com
upno
yetbe
coinsreddit
A C++17 library for reading Microsoft Program Debug Database PDB files
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-23 06:2:28 | 阅读: 9 |
收藏
|
www.reddit.com
library
yetbe
coinsreddit
agoa
commentlog
Ethereum/EVM Smart Contract Reverse Engineering & Disassembly
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-22 22:37:19 | 阅读: 19 |
收藏
|
www.reddit.com
reverse
A RISC-V JIT for rv32i written in Rust with an x86_64 backend (Gamozo Labs)
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-22 18:1:34 | 阅读: 21 |
收藏
|
www.reddit.com
voteposted
Scaling Dumb Fuzzing with Kubernetes
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-22 07:23:21 | 阅读: 18 |
收藏
|
www.reddit.com
yetbe
Automated Localisation of a Mixed Boolean Arithmetic Obfuscation Window in a Program Binary [PDF, Ph.D. thesis]
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-22 04:26:32 | 阅读: 27 |
收藏
|
www.reddit.com
comments100
reverse
coinsreddit
CodeCat is an open-source tool to help you find/track user input sinks and bugs using static code analysis. These points follow regex rules.
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-21 20:53:27 | 阅读: 23 |
收藏
|
www.reddit.com
cooler
policymod
upfound
/r/ReverseEngineering's Weekly Questions Thread
VotePosted by7 minutes ago To reduce the amount of noise from questions, we have disable...
2022-2-21 16:0:19 | 阅读: 10 |
收藏
|
www.reddit.com
reverse
unified
comments100
noise
Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-21 03:12:13 | 阅读: 47 |
收藏
|
www.reddit.com
jonath
commentlog
communityno
reverse
PDBRipper 2.02 is an utility for extract an information from PDB-files.
read file error: open notes: too many open files...
2022-2-20 03:53:6 | 阅读: 18 |
收藏
|
www.reddit.com
horsic
upview
yetbe
policymod
Toy store wifi credentials into esp32 external flash.
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-19 01:31:45 | 阅读: 20 |
收藏
|
www.reddit.com
toy1r
coinsreddit
5ffeme
Intel is hosting a free training on Intel SGX hacking
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-18 01:42:46 | 阅读: 14 |
收藏
|
www.reddit.com
comments50
upvotedlog
commentlog
upfound
voteposted
Practical Calling Conventions For Reverse Engineers (OALABS Tutorial)
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-18 00:52:52 | 阅读: 18 |
收藏
|
www.reddit.com
yetbe
voteposted
youtu
9lzw0i
Move, edit, and recover your Wordle stats and streaks
read file error: open notes: too many open files...
2022-2-17 23:9:49 | 阅读: 20 |
收藏
|
www.reddit.com
by1
yetbe
SEH-Helper | A Binary Ninja plugin for exploring Structured Exception Handlers in PEs
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-17 01:45:12 | 阅读: 17 |
收藏
|
www.reddit.com
upvotedlog
coinsreddit
Running Java code directly on Android (without creating an APK)
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-16 23:28:26 | 阅读: 18 |
收藏
|
www.reddit.com
coinsreddit
by1
commentlog
yetbe
reverse
Cracking the C0dez: Reversing C++, Structs & Stack Frames with Ghidra - Full CrackMe Walkthrough
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-16 02:21:42 | 阅读: 24 |
收藏
|
www.reddit.com
policymod
by46
upvotedlog
Static Taint Analysis using Binary Ninja: A Case Study of MySQL Cluster Vulnerabilities
Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcutsSearch w...
2022-2-16 01:6:13 | 阅读: 19 |
收藏
|
www.reddit.com
reverse
commentlog
Previous
96
97
98
99
100
101
102
103
Next