DEV Community

# reverseengineering

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Malware Analysis: Discord-Delivered Infostealer (Lapresse)

Malware Analysis: Discord-Delivered Infostealer (Lapresse)

Comments
4 min read
Porting Test Drive II from SNES to PC, Part 40: Narrowing the Post-02:9016 Divergence Window

Porting Test Drive II from SNES to PC, Part 40: Narrowing the Post-02:9016 Divergence Window

Comments
2 min read
Porting Test Drive II from SNES to PC, Part 38: Closing Callback-Relative Fourth-Slot Selection

Porting Test Drive II from SNES to PC, Part 38: Closing Callback-Relative Fourth-Slot Selection

Comments
2 min read
Porting Test Drive II from SNES to PC, Part 35: closing the Select Opponent handoff split

Porting Test Drive II from SNES to PC, Part 35: closing the Select Opponent handoff split

Comments
1 min read
Porting Test Drive II from SNES to PC, Part 39: Closing the No-Opponent Handoff Into 02:9016

Porting Test Drive II from SNES to PC, Part 39: Closing the No-Opponent Handoff Into 02:9016

1
Comments
2 min read
#showdev: CAN Playground — a local-first CAN bus analysis tool

#showdev: CAN Playground — a local-first CAN bus analysis tool

1
Comments
4 min read
Definiendo la necesidad (dĂ­a 1)

Definiendo la necesidad (dĂ­a 1)

Comments
3 min read
Reverse Engineering the Lego NXT: Dumping Firmware with Golang

Reverse Engineering the Lego NXT: Dumping Firmware with Golang

Comments
3 min read
Islands of Invariance

Islands of Invariance

1
Comments
1 min read
1 little known secret of CompatTelRunner.exe

1 little known secret of CompatTelRunner.exe

Comments
1 min read
Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims

Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims

5
Comments
7 min read
Learning Reverse Engineering by Hex-Editing X-COM Save Files

Learning Reverse Engineering by Hex-Editing X-COM Save Files

Comments
2 min read
WannaCry Ransomware Malware Analysis

WannaCry Ransomware Malware Analysis

2
Comments
4 min read
Why Your Competitive Intelligence Scrapers Fail: A Deep Dive into Browser Fingerprinting

Why Your Competitive Intelligence Scrapers Fail: A Deep Dive into Browser Fingerprinting

1
Comments
6 min read
Reverse Engineering Firmware at Scale with IDA Pro

Reverse Engineering Firmware at Scale with IDA Pro

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.