Reverse Eng SE
@StackReverseEng
A Q&A site for researchers and developers who explore the principles of a system through analysis of its structure, function, and operation
You might like
Windows 11: Interact with IDA pro when running in session 0 reverseengineering.stackexchange.com/q/31518?atw=1 #ida
How to unpack Armadillo protected software using x64dbg? reverseengineering.stackexchange.com/q/29269?atw=1 #windows
IDA plugin with visual studio c++ 2019 reverseengineering.stackexchange.com/q/26512?atw=1 #idaplugin
Decrypting Lua files encrypt from apk game reverseengineering.stackexchange.com/q/30780?atw=1 #android
How about finally enabling syntax highlighting for RE.SE? …rseengineering.meta.stackexchange.com/q/432?atw=1
Can you answer this? Check if libc.so use tcache reverseengineering.stackexchange.com/q/31480?atw=1 #c
Reverse-engineering a 90s CNC machine (FORTH like) firmware reverseengineering.stackexchange.com/q/30937?atw=1 #decompilation
Can you answer this? Compression algorithm from very old tape backup? reverseengineering.stackexchange.com/q/31478?atw=1 #fileformat
Can you answer this? Guidelines for dealing with obfuscated code reverseengineering.stackexchange.com/q/25002?atw=1 #ida
How to use dnSpyEx or some other .NET debugger to attach to a .NET process started with a process... reverseengineering.stackexchange.com/q/31472?atw=1 #debugging
StackOverflow states: "Temporary policy: ChatGPT is banned" -- What should be our policy? Same or not? …rseengineering.meta.stackexchange.com/q/429?atw=1
Is there a way to edit structure field value in memory during debug reverseengineering.stackexchange.com/q/22668?atw=1 #ida
What are these LOAD segments in an assembly ELF64? reverseengineering.stackexchange.com/q/18883?atw=1 #ida
Reverse Engineering CTF help reverseengineering.stackexchange.com/q/31397?atw=1 #assembly
How to select sequence bytes in IDA Pro Hex View? reverseengineering.stackexchange.com/q/31414?atw=1 #ida
Can you answer this? Plugin directory in IDA? reverseengineering.stackexchange.com/q/13271?atw=1 #ida
find cheat engine pointers in ghidra reverseengineering.stackexchange.com/q/25984?atw=1 #memory
How to disassemble SPC572L assembler code? reverseengineering.stackexchange.com/q/31288?atw=1 #assembler
United States Trends
- 1. Northern Lights 45.7K posts
- 2. #Aurora 9,691 posts
- 3. #DWTS 53.2K posts
- 4. Carmilla 2,277 posts
- 5. #chaggie 3,892 posts
- 6. MIND-BLOWING 36.9K posts
- 7. #huskerdust 7,521 posts
- 8. #RHOSLC 7,270 posts
- 9. AI-driven Web3 1,016 posts
- 10. H-1B 35.8K posts
- 11. Justin Edwards 2,497 posts
- 12. Sabonis 6,256 posts
- 13. Louisville 18.2K posts
- 14. SPECTACULAR 25.7K posts
- 15. Creighton 2,332 posts
- 16. Eubanks N/A
- 17. Andy 60.8K posts
- 18. Gonzaga 3,026 posts
- 19. Cleto 2,610 posts
- 20. H1-B 4,176 posts
You might like
-
REhints
@REhints -
REcon
@reconmtl -
Vector 35
@vector35 -
Karsten Hahn
@struppigel -
herrcore
@herrcore -
Hex-Rays SA
@HexRaysSA -
Corkami
@corkami -
Jonathan Salwan
@JonathanSalwan -
Qiling Framework
@qiling_io -
Jeremy Fetiveau
@__x86 -
The Triton library
@qb_triton -
Alex Matrosov
@matrosov -
Sinaei
@Intel80x86 -
Phạm Hồng Phi 🇻🇳
@4nhdaden -
KITCTF
@KITCTF
Something went wrong.
Something went wrong.