Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

RULECOMPILE - Undocumented Ghidra decompiler rule language

I ruined my vacation by reverse engineering WSC

Malware Attack and Counterattack

Frida 17.0.0 Released

Reverse-engineering Fujitsu M7MU RELC hardware compression

Reverse engineering the 386 processor's prefetch queue circuitry

The complicated circuitry for the 386 processor's registers

Yes, the Apple II MouseCard IRQ is synced to the VBL

So we finished decompiling LEGO Island

Reverse engineering the obfuscated TikTok VM

Attacking My Landlord's Boiler

Binary Ninja - 5.0 Gallifrey

Emulating an iPhone in QEMU

Bootstrapping Understanding: An Introduction to Reverse Engineering

Reversing the fossilization of computer science conferences

"Verified" "Compilation" of "Python" with Knuckledragger, GCC, and Ghidra

Extracting content from an LCP “protected” ePub

Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit

The Colonel’s Bequest – Case Cracked

A 6502 emulator written in busybox ash

tmp.0ut Volume 4

Grease: An Open-Source Tool for Uncovering Hidden Vulnerabilities in Binary Code

Zen and the Art of Microcode Hacking

Hacking the Xbox 360 Hypervisor Part 1: System Overview

A long evening with iOS and macOS Sandbox (2018)

Reversing Samsung's H-Arx Hypervisor Framework (Part 1)

League of Legends data scraping the hard and tedious way for fun

Diablo hackers uncovered a speedrun scandal

Accessing region-locked iOS features, such as EU app stores

Bad Smart Watch Authentication

More →