This project is an introduction to reverse engineering.
-
Updated
Dec 17, 2023 - C
The process of analyzing a subject system to identify the system's components and their interrelationships and to create representations of the system in another form or at a higher level of abstraction.
This project is an introduction to reverse engineering.
Memory analysis functions for scanning patterns within process memory, aiding reverse engineering and malware analysis using technical terms like 'signature,' 'offset,' and 'memory read'.
A commandline tool for finding strings in binary files and the assembler code that access it. Can be used for reverse engineering binary applications.
Playground & notes for learning more about mobile stuff
A trainer written in C++ for No Man's Sky
Test project used in the following blog post: https://dennisbabkin.com/blog/?i=AAA11C00
LiveSplit autosplitter for Lycanthorn II - Rain of Beasts
Dump hex bytes of code section in EXE & DLL
Generates typed paramdefs for AC6 by instrumenting the game
Informations found during the hacking of the murder of sonic the hedgehog
Happy little reverse engineering simulation challenge for the HKUST Firebird 2023 Internal CTF.
Training material for reverse engineering and software exploitation.
Process Hooking Implementation with Frida-Tools in Python
AlphaCTF 2k23 is an Algerian national event that Alphabit club offers as an opportunity to all hackers and cybersecurity enthusiasts to introduce them into cybersecurity field by organizing beginner friendly and promising workshops in different cybersecurity categories accompanied with CTF challenges to practice on.
Hooks the WriteProcessMemory function in x86 (32-bit) Windows processes and saves the lpBuffer parameter.
BBIS (Binary-Based Instruction Substitution) is a novel technique to hide data in executables. This is achieved by changing assembly instructions to equivalent instructions in the executable's code according to binary string of the data to hide.