carlosadrianosj's profile picture. I just like to reverse things 🤓

Carlos Adriano

@carlosadrianosj

I just like to reverse things 🤓

I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context. reverselabs.dev/blog/ida-type-… #ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

carlosadrianosj's tweet image. I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context.
 reverselabs.dev/blog/ida-type-…
#ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

I explain how Windows implements ASLR, how it affects reverse engineering and exploitation, and practical ways to analyze or bypass it when needed. reverselabs.dev/blog/aslr-addr… #WindowsSecurity #ReverseEngineering #ExploitDevelopment #MemoryProtection

carlosadrianosj's tweet image. I explain how Windows implements ASLR, how it affects reverse engineering and exploitation, and practical ways to analyze or bypass it when needed.
reverselabs.dev/blog/aslr-addr…

#WindowsSecurity #ReverseEngineering #ExploitDevelopment #MemoryProtection

Glad to be featured on the Wall of Fame for @cynychwr Android RE CTF: OneList. A great challenge exploring static and dynamic analysis, DCL, and native code. Write-up: reverselabs.dev/blog/onelist-c… Wall: github.com/cywr/android-r… #ReverseEngineering #AndroidSecurity #CTF

carlosadrianosj's tweet image. Glad to be featured on the Wall of Fame for @cynychwr Android RE CTF: OneList.
A great challenge exploring static and dynamic analysis, DCL, and native code.
Write-up: reverselabs.dev/blog/onelist-c…
Wall: github.com/cywr/android-r…
#ReverseEngineering #AndroidSecurity #CTF

Dynamic code loading shows up everywhere in Android, useful for devs and painful for analysts. I wrote about how it works, why it is abused, and how to spot it in the wild. reverselabs.dev/blog/dynamic-c… #ReverseEngineering #AndroidSecurity #MalwareAnalysis #ThreatDetection

carlosadrianosj's tweet image. Dynamic code loading shows up everywhere in Android, useful for devs and painful for analysts.
I wrote about how it works, why it is abused, and how to spot it in the wild.
reverselabs.dev/blog/dynamic-c…

#ReverseEngineering #AndroidSecurity #MalwareAnalysis #ThreatDetection

Last week I decided to get back into Mobile Reverse Engineering CTFs and share the process publicly. I dedicated time to documenting each step and publishing both the journey and the scripts (Frida/Python/Rust scripts). 01 reverselabs.dev/blog/onelist-c… 02 reverselabs.dev/blog/onelist-c…

carlosadrianosj's tweet image. Last week I decided to get back into Mobile Reverse Engineering CTFs and share the process publicly. I dedicated time to documenting each step and publishing both the journey and the scripts (Frida/Python/Rust scripts).

01
reverselabs.dev/blog/onelist-c…

02
reverselabs.dev/blog/onelist-c…

Loading...

Something went wrong.


Something went wrong.