Tag

Reverse Engineering

1 views collected around this technical thread.

Deepin Linux
Deepin Linux
Aug 19, 2024 · Fundamentals

Using GDB to Debug Executables Without Debug Information

This article provides a comprehensive guide on how to employ GDB for debugging programs that lack symbol information, covering basic commands, breakpoint techniques, core‑dump analysis, reverse debugging, and a practical example of integrating VSCode, GDB, and QEMU to debug an ARM64 Linux kernel.

GDBReverse Engineeringdebugging
0 likes · 33 min read
Using GDB to Debug Executables Without Debug Information
IT Services Circle
IT Services Circle
Jul 15, 2024 · Fundamentals

Understanding Stack Pointer Corruption When Mixing RSP and ESP in 64‑bit Windows: A Reverse‑Engineering Case Study

The article analyzes a crash that occurs on Windows 10 when a 64‑bit program mixes RSP and ESP instructions, explains how writing to the 32‑bit ESP register zero‑extends the upper 32 bits of RSP, and shows how this stack‑pointer mismatch leads to an access‑violation error that does not appear on Windows 7.

Reverse Engineeringassemblydebugging
0 likes · 6 min read
Understanding Stack Pointer Corruption When Mixing RSP and ESP in 64‑bit Windows: A Reverse‑Engineering Case Study
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jul 13, 2024 · Information Security

OpenCoreAnalysisKit: Open‑Source Offline Memory Core File Analysis Suite for Android

This article introduces the OpenCoreAnalysisKit project, an open‑source suite for offline analysis of Android Core memory files across multiple architectures, detailing its components, build requirements, usage guides for kernel‑ and user‑mode debugging, and various command‑line tools and code snippets for comprehensive reverse‑engineering and memory‑analysis workflows.

AndroidCore DumpReverse Engineering
0 likes · 20 min read
OpenCoreAnalysisKit: Open‑Source Offline Memory Core File Analysis Suite for Android
Python Programming Learning Circle
Python Programming Learning Circle
Jun 24, 2024 · Backend Development

Technical Overview of Ticket‑Grabbing: Selenium Automation and API Reverse Engineering

This article explains the ticket‑purchasing workflow, identifies critical timing points for successful ticket grabbing, and presents two common technical approaches—browser automation with Selenium and reverse‑engineering ticket‑booking APIs—to automate the process, while warning about limitations and legal considerations.

PythonReverse EngineeringSelenium
0 likes · 6 min read
Technical Overview of Ticket‑Grabbing: Selenium Automation and API Reverse Engineering
IT Services Circle
IT Services Circle
Jun 18, 2024 · Information Security

Removing WinRAR Advertisement Popup by Reverse Engineering and Binary Patching

This tutorial explains how to locate and eliminate the persistent WinRAR advertisement window by using Spy++, API Monitor, and IDA to identify the RarReminder class, find the CreateWindow call at offset 0xaa56d, and replace the call instruction with NOP bytes, effectively disabling the popup.

Ad RemovalReverse EngineeringWinRAR
0 likes · 5 min read
Removing WinRAR Advertisement Popup by Reverse Engineering and Binary Patching
Java Tech Enthusiast
Java Tech Enthusiast
Jun 9, 2024 · Information Security

Exploring Hidden x86 CPU Instructions and Their Security Implications

The article investigates undocumented x86 opcodes, describing a depth‑first search that uses page‑faults to locate hidden instruction boundaries, and reports finding dozens of executable but undocumented instructions on Intel and AMD CPUs, highlighting potential security risks and the need for vigilant hardware analysis.

Reverse Engineeringassemblycpu
0 likes · 9 min read
Exploring Hidden x86 CPU Instructions and Their Security Implications
Python Programming Learning Circle
Python Programming Learning Circle
Apr 23, 2024 · Fundamentals

How to Decompile a Python .exe Back to Python Source Code

This guide explains how to extract .pyc files from a Python‑generated executable, restore missing bytecode headers, and use tools such as pyinstxtractor, pyi‑archive_viewer, and uncompyle6 to decompile the bytecode back into readable Python scripts while highlighting common pitfalls and protection mechanisms.

ExecutablePythonReverse Engineering
0 likes · 12 min read
How to Decompile a Python .exe Back to Python Source Code
Tencent Cloud Developer
Tencent Cloud Developer
Nov 2, 2023 · Artificial Intelligence

Reverse Engineering GitHub Copilot: Architecture and Implementation Analysis

The article reverse‑engineers GitHub Copilot’s VSCode extension, detailing how its webpack‑bundled JavaScript is unpacked, its registerGhostText entry point identified, and its prompt‑building, multi‑layer caching, debouncing, and Jaccard‑based similarity mechanisms operate, offering insights into AI‑assisted code completion design.

AI programming assistantGitHub CopilotJaccard similarity
0 likes · 31 min read
Reverse Engineering GitHub Copilot: Architecture and Implementation Analysis
37 Interactive Technology Team
37 Interactive Technology Team
May 8, 2023 · Information Security

Android Reverse Engineering: Process, Tools, and Code Examples

Android reverse engineering involves extracting an APK, decompiling it with tools like apktool, dex2jar, or JADX, analyzing and modifying Smali or Java code, recompiling and signing the package with jarsigner, and testing the changes, while using adb commands to retrieve the original file and emphasizing deeper analysis for robust security.

APKAPKToolAndroid
0 likes · 10 min read
Android Reverse Engineering: Process, Tools, and Code Examples
360 Tech Engineering
360 Tech Engineering
Apr 21, 2023 · Information Security

FirmAE: Automated Firmware Emulation and Vulnerability Analysis – Installation, Usage, and Zyxel Router Case Study

This article introduces FirmAE, an automated framework for firmware emulation and vulnerability analysis, details its installation and usage steps on Ubuntu, and presents a comprehensive reverse‑engineering case study of a Zyxel router firmware to illustrate troubleshooting and manual analysis techniques.

AutomationEmulationFirmAE
0 likes · 8 min read
FirmAE: Automated Firmware Emulation and Vulnerability Analysis – Installation, Usage, and Zyxel Router Case Study
37 Interactive Technology Team
37 Interactive Technology Team
Nov 7, 2022 · Mobile Development

iOS App Unpacking Tutorial Using dumpdecrypted and frida‑ios‑dump

This tutorial walks through jailbreaking an iPhone, configuring Cydia and Frida, then using either dumpdecrypted or frida‑ios‑dump to strip the App Store protection shell, rebuild the IPA with a decrypted binary, and extract class headers, while addressing typical connection and compatibility problems.

FridaMobile SecurityReverse Engineering
0 likes · 10 min read
iOS App Unpacking Tutorial Using dumpdecrypted and frida‑ios‑dump
HomeTech
HomeTech
Aug 11, 2022 · Fundamentals

Mach-O File Format: Dynamic and Static Library Attribution and API Scanning Solutions

This article introduces the Mach-O executable format, explains how its structure can be leveraged to attribute dynamic and static libraries at runtime and during build, and presents two practical projects—library attribution and fast API scanning—complete with implementation details and code snippets.

API scanningBinary AnalysisMach-O
0 likes · 15 min read
Mach-O File Format: Dynamic and Static Library Attribution and API Scanning Solutions
IT Services Circle
IT Services Circle
Apr 15, 2022 · Information Security

Exploring Hidden x86 CPU Instructions and Their Security Implications

The article investigates whether modern x86 CPUs contain undocumented or hidden instructions, explains how to search the instruction space using a depth‑first algorithm that leverages page‑fault side‑effects to determine instruction length, and presents the results of uncovering such hidden opcodes on Intel and AMD processors, highlighting the potential security risks.

Reverse Engineeringcpuhidden instructions
0 likes · 11 min read
Exploring Hidden x86 CPU Instructions and Their Security Implications
Python Programming Learning Circle
Python Programming Learning Circle
Mar 15, 2022 · Artificial Intelligence

Reverse Engineering NetEase Cloud Music API to Scrape Comments and Perform Sentiment Analysis

This article demonstrates how to reverse‑engineer the NetEase Cloud Music web API to extract encrypted parameters, use Python to fetch song comments, and apply SnowNLP for sentiment analysis and word‑cloud visualization, providing a step‑by‑step guide with code examples.

APINetEase MusicPython
0 likes · 20 min read
Reverse Engineering NetEase Cloud Music API to Scrape Comments and Perform Sentiment Analysis
High Availability Architecture
High Availability Architecture
Mar 11, 2022 · Information Security

Technical Analysis of Y‑BotManager Anti‑Spam Mechanism and SensorData Reverse Engineering

This article presents a detailed technical analysis of the Y‑BotManager anti‑spam system, describing its architecture, the reverse‑engineering process of its SensorData generation, the device and user‑interaction features used for bot detection, and the practical attempts to bypass the protection.

Reverse Engineeringanti-spambot detection
0 likes · 12 min read
Technical Analysis of Y‑BotManager Anti‑Spam Mechanism and SensorData Reverse Engineering
IT Services Circle
IT Services Circle
Feb 22, 2022 · Backend Development

Understanding RPC and Its Use in Web Reverse Engineering with Sekiro

This article explains the concept of Remote Procedure Call (RPC), demonstrates how to apply RPC for web reverse engineering by injecting JavaScript through WebSocket communication, and introduces the Sekiro framework and related tools for automating encryption parameter retrieval in browser environments.

AutomationJavaScriptRPC
0 likes · 15 min read
Understanding RPC and Its Use in Web Reverse Engineering with Sekiro
Python Programming Learning Circle
Python Programming Learning Circle
Nov 24, 2021 · Information Security

How to Decompile a PyInstaller‑Packed Executable Using pyinstxtractor and uncompyle6

This guide explains how to unpack a PyInstaller‑packed executable, restore the stripped .pyc header using a binary editor, and decompile the resulting file with uncompyle6, providing a step‑by‑step workflow for Python reverse‑engineering.

010editorReverse Engineeringdecompilation
0 likes · 3 min read
How to Decompile a PyInstaller‑Packed Executable Using pyinstxtractor and uncompyle6
Sohu Tech Products
Sohu Tech Products
Oct 20, 2021 · Information Security

Overview of Android App Hardening and Unpacking Techniques Across Generations

This article provides a comprehensive overview of Android app hardening methods, detailing the evolution from first‑generation dex and so protection to advanced code virtualization, and outlines various unpacking (脱壳) techniques—including memory dump, dynamic debugging, hook‑based and custom ROM approaches—used to bypass these protections.

AndroidDexFrida
0 likes · 11 min read
Overview of Android App Hardening and Unpacking Techniques Across Generations
Python Programming Learning Circle
Python Programming Learning Circle
Oct 19, 2021 · Backend Development

Reverse Engineering and Automating Danmu Submission on Laifeng Live Platform with Python

This tutorial explains how to analyze the Laifeng live‑stream chat API, extract the required timestamp and signature parameters from JavaScript, and implement a Python script that logs in, generates the encrypted sign, and sends custom danmu messages to a specified room.

APIHTTPPython
0 likes · 14 min read
Reverse Engineering and Automating Danmu Submission on Laifeng Live Platform with Python
Python Programming Learning Circle
Python Programming Learning Circle
Sep 25, 2021 · Information Security

Step-by-Step Guide to Extract and Decrypt PC WeChat Database Using OllyDbg and C++

This tutorial explains how to retrieve the 32‑byte encryption key of the PC version of WeChat by attaching OllyDbg to the WeChat process, locating the password in memory, and then using a custom C++ program built with OpenSSL to decrypt the WeChat SQLite database files.

C++Database DecryptionOllyDbg
0 likes · 11 min read
Step-by-Step Guide to Extract and Decrypt PC WeChat Database Using OllyDbg and C++