Skip to main content

Explore our questions

3 votes
2 answers
780 views

Getting the algorithm used inside this .so file

0 votes
1 answer
159 views

C# reverse engineering bypass obfuscation

1 vote
2 answers
281 views

Is DOS Assembly Hexadecimal Different To Modern Hex Editor Hexadecimal?

0 votes
0 answers
35 views

How could a CRC-15 CAN be transformed into 8 bytes in an embedded system?

0 votes
1 answer
147 views

Cracking cryptographic function with radare2

0 votes
0 answers
58 views

Analyze assembly code in detail

0 votes
0 answers
27 views

Optimize VAX instruction with IDA microcode

2 votes
1 answer
494 views

Best way to protect source code of exe that being loaded by Assembly.Load method

16 votes
5 answers
36k views

Purpose of test eax,eax after a strcmp

0 votes
0 answers
99 views

Is it okay to reverse engineer a game?

9 votes
1 answer
11k views

Reverse Engineering of a packet encryption function of a game

0 votes
1 answer
129 views

Searching for a byte pattern and then hooking all instances of it using frida on iOS

1 vote
2 answers
104 views

What is CARRY2 in Ghidra?

3 votes
1 answer
928 views

Why do we need to know the address of shellcode?

Browse more Questions