Skip to main content

Explore our questions

1 vote
1 answer
353 views

How to pass an SVD file as an argument to IDA Pro in the command line (batch mode)?

6 votes
1 answer
468 views

Are there existing automated approaches to reverse engineering the data types in a binary data stream?

1 vote
1 answer
943 views

Extracting Userdata from Userdata.bin file backup of oneplus 7pro mobile

1 vote
1 answer
100 views

extract third party libraries names and versions used in BIN files

1 vote
1 answer
101 views

Static offsets Vs. Loaded Offsets

2 votes
1 answer
114 views

The Logic Of Incremental Data on Serial Communication Encoding

1 vote
1 answer
213 views

VxWorks flat binary file

1 vote
1 answer
846 views

Reverse Engineering Go obfuscated binaries

2 votes
1 answer
420 views

What is the format of this binary file?

0 votes
0 answers
75 views

Has anyone done a binary analysis on DeepSeek R1 Model on ollama? any obfuscate code or security concerns?

0 votes
2 answers
132 views

Find all calls of a given function with Ghidra

0 votes
0 answers
41 views

Can one binary use both lazy binding and non-lazy binding?

0 votes
0 answers
23 views

How to pass radare2 a specific payload, but only after "dc"?

0 votes
0 answers
43 views

SIM card firmware

Browse more Questions