Skip to main content

Search

Items tagged with: ReverseEngineering


#reverseengineering Lesson 103: ARM-32 Course 2 (Part 38 – Pre-Increment Operator) #assembler #c #cyber #cybersecurity #hack #hacking https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 100: ARM-32 Course 2 (Part 35 – SizeOf Operator) #assembler #c #cyber #cybersecurity #hack #hacking https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 71: ARM-32 Course 2 (Part 6 – Registers) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering


Blog post series on reversing, emulating and exploiting smartphones (Pixel 6) bootloaders

Part 1: https://eshard.com/posts/pixel6_bootloader

Part 2: https://eshard.com/posts/pixel6bootloader-2

Part 3: https://eshard.com/posts/pixel6_bootloader_3

#android #mobile #hacking #infosec #reverseengineering


#reverseengineering Lesson 62: ARM-32 Course 1 (Part 22 – Hacking ADC) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 61: ARM-32 Course 1 (Part 21 – Debugging ADC) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 59: ARM-32 Course 1 (Part 19 – Hacking ADDS) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 54: ARM-32 Course 1 (Part 14 - ADD) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 52: ARM-32 Course 1 (Part 12 - Von Neumann Architecture) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering#technology


#reverseengineering Lesson 48: ARM-32 Course 1 (Part 8 - CPSR) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 47: ARM-32 Course 1 (Part 7 - Program Counter) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 45: ARM-32 Course 1 (Part 5 - Word Lengths) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 44: ARM-32 Course 1 (Part 4 - Binary Subtraction) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 39: x86 Course (Part 39 - ASM Hacking 6 [CMOV Instructions]) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 37: x86 Course (Part 37 - ASM Program 6 [CMOV Instructions]) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 36: x86 Course (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers]) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


Happy weekend everyone! I'd like to share my friend and fellow CTF buddy elbee's work on the Defcon 30 badge!

Take a moment, have a glass of wine this fine weekend and enjoy!

https://faultpoint.com/2022/11/22/Cracking-the-Defcon-30-Badge-Firmware.html


#reverseengineering Lesson 31: x86 Course (Part 31 - ASM Program 4 [Moving Data Between Registers And Memory]) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 27: x86 Course (Part 27 - ASM Hacking 2 [Moving Data Between Registers]) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 26: x86 Course (Part 26 - ASM Debugging 2 [Moving Data Between Registers]) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering with my #go #hacking book we work our way to make our hack. Check it out. https://github.com/mytechnotalent/Go-Hacking


True to the hacking spirit, there exist an elite team of sorcerers, witches and wizards whose with their arcane magic skills have reverse engineered the Apple M1 GPU.

My most sincere respect to those few who dare to reverse engineer the most obscure pieces of hardware out there.

Read more here:

https://asahilinux.org/2022/12/gpu-drivers-now-in-asahi-linux/

#hacking #reverseengineering #magic #cyberpunk


#reverseengineering Lesson 22: x86 Course (Part 22 - ASM Program 1 [Moving Immediate Data]) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 21: x86 Course (Part 21 - How To Compile A Program) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


When we #go #hacking with #golang we first want to find the main_main function as our entry point in either #ida or #ghidra when we are #reverseengineering...


#reverseengineering Lesson 14: x86 Course Lesson 15: x86 Course (Part 15: Stack) #assembler #cyber #cybersecurity #hack #hacking https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 12: x86 Course (Part 12: Instruction Pointer Register) #assembler #cyber #cybersecurity #hack #hacking https://github.com/mytechnotalent/Reverse-Engineering


Your reminder that radare2 was forked because the devs were being skeevy. https://rizin.re and https://cutter.re are the new hotness. #InfoSec #CyberSecurity #Debugging #ReverseEngineering


#reverseengineering Here is an except from my FREE Go Hacking book where we target the bytes which read,, "hello distributed system world," where we hack the bytes to read, "hacky distributed system world".


#reverseengineering Lesson 10: x86 Course (Part 10: General-purpose Registers) #assembler #cyber #cybersecurity #hack #hacking https://github.com/mytechnotalent/Reverse-Engineering

Este sitio web utiliza cookies. Si continúa navegando por este sitio web, usted acepta el uso de las cookies.