Skip to main content

Explore our questions

0 votes
1 answer
263 views

cracking SHA256 if you think you know its original value but don't know which is it

0 votes
1 answer
460 views

arm branch calculator

0 votes
1 answer
2k views

Dynamic Analysis on ELF using IDA

0 votes
1 answer
2k views

How do you effectively use gdb and IDA together?

0 votes
1 answer
221 views

decomplied apk with bad parameters

0 votes
0 answers
30 views

Reverse Engineering S/EX RE-MAN BOARD INTERFACE SR2 SL (MRD-45-2276)

0 votes
2 answers
67 views

How is this adversarial process crashing Wireshark?

0 votes
1 answer
180 views

idat.exe -S, path with spaces

0 votes
1 answer
62 views
+50

How can I compare different execution traces of the same exe, but ran with different parameters?

0 votes
0 answers
10 views

Cuckoo instalation with windows10

0 votes
0 answers
17 views

How do I find the decryption key of an android app using Frida?

2 votes
1 answer
441 views

$$Lambda$(number) when decompiled Java bytecode

5 votes
1 answer
445 views

Are there existing automated approaches to reverse engineering the data types in a binary data stream?

1 vote
1 answer
923 views

Extracting Userdata from Userdata.bin file backup of oneplus 7pro mobile

Browse more Questions