Tag: binary-analysis

64 What is PLT/GOT? 2013-05-03T08:39:11.810

51 How do I reverse engineer .so files found in android APKs? 2014-06-17T07:09:58.757

46 how can I diff two x86 binaries at assembly code level? 2013-04-21T13:57:12.093

41 How to know in which language/technology program (.exe) is written? 2014-01-05T07:02:16.673

20 Tool or data for analysis of binary code to detect CPU architecture 2013-10-08T11:41:41.500

18 What is "overlapping instructions" obfuscation? 2013-04-03T08:11:29.310

16 Parsing/Rescuing corrupted IDA database 2014-01-13T17:11:10.477

15 Decoding an unknown image format with "DREK" signature (*.drk) 2016-08-06T23:08:29.917

14 Why are GOT and PLT still present in Linux static stripped binaries? 2013-06-02T13:57:45.490

13 How do you store your data about a binary while performing analysis? 2013-04-27T09:29:13.530

12 Extract SquashFS filesystem with shsq magic number 2013-06-07T16:16:25.070

12 Code Coverage - Fuzzing 2014-06-23T16:35:11.500

11 Reverse engineer an old DOS QBasic executable 2013-04-02T16:48:42.167

11 Totally unknown file analysis approaches 2013-09-01T11:06:17.497

10 What are the main features of radare2? 2013-04-18T09:34:49.823

10 Static analysis data combined with dynamic analysis knowledge 2014-01-23T10:56:31.777

10 Finding the actual Thumb code in firmware 2014-07-27T19:00:28.643

10 Extract non-extractable private key from OS X Keychain 2014-08-08T22:30:21.763

10 How to generate the call graph of a binary file? 2017-08-13T02:58:47.633

9 What are the differences between BitBlaze and BAP? 2013-04-08T12:03:57.463

9 Binary instrumentation with Python 2013-07-22T21:45:31.163

9 Why I can not directly get the content of `.bss` section? 2014-05-01T21:50:42.797

9 What Linux software can I use to explore entropy of a file? 2014-07-23T10:24:35.413

9 How do you can you disassemble and dump an entire binary? 2015-03-26T23:05:18.340

9 Protect data stored in binary 2015-05-02T18:53:15.877

9 Approach to extract useful information from binary file 2017-03-24T18:56:39.223

8 Decoding an ancient format 2013-11-20T10:39:45.540

8 Byte frequencies in different architectures' binaries? 2016-03-03T20:27:20.640

8 Control flow graph reconstruction projects 2016-09-02T06:46:08.380

7 Is there any tool to quantitatively evaluate the difference of binary? 2014-01-21T16:31:55.710

7 What is the "standard" approach to find loop in binary code? 2016-02-26T01:15:25.097

7 Extracting a NAND flash dump with OOB data 2017-03-22T16:22:14.680

7 Radare2 Find command line arguments and location in stack 2018-04-25T00:00:47.430

7 Analyzing a Revit project file 2018-07-22T16:06:56.963

6 unpack Clear spot .bin firmware update 2013-09-16T22:56:28.647

6 I need quick correction on this x86 opcode conundrum 2014-02-12T21:26:09.797

6 Reverse engineering Perl-compatible regular-expressions 2014-05-09T17:24:09.643

6 Reverse-engineering a tough-to-crack video game save-file checksum 2014-09-19T10:34:53.663

6 Reversing simple message + checksum pairs (32 bytes) 2014-12-30T12:01:57.770

6 Extract files from a bin firmware 2015-01-20T15:17:12.570

6 Which python library for parsing Linux ELF files? 2015-05-06T11:14:58.777

6 Reverse engineering Earthsiege 2 3D model format 2015-12-09T20:11:24.230

6 Difference between Win7 and Win8 PE loader? 2015-12-18T12:36:52.517

6 Unpack IpCam firmware - Binwalk extraction issue 2016-01-19T00:24:06.677

6 Zte Reverse engineering config.bin file problem 2016-08-29T10:39:29.763

6 Running a binary identified as an ARM excutable by binwalk --disasm 2017-05-07T13:50:20.847

6 Reverse engineering Windows Defender's signature for Metasploit Framework's metsrv.dll 2018-10-24T19:47:56.500

5 What is the scalability of state of the art static binary analysis techniques? 2013-03-27T19:05:46.343

5 Is BinNavi available? If not, can I get the source from anywhere? 2013-05-19T18:45:53.677

5 Is there any tool for decompiling raw binary files to C code for the Motorola 68000 processor series? 2013-05-23T09:17:42.460

5 Find level data in binaries? 2013-06-01T13:33:26.727

5 IDA Pro for MIPS image 2013-11-21T09:57:34.370

5 Is learning assembly enough to become a malware analyst? 2013-12-22T16:17:18.743

5 Why is true emulation not possible? 2014-02-13T08:52:06.807

5 Find the C++ STL functions in a binary 2014-03-17T16:36:44.183

5 How to identify functions in a stripped binary on x86 32bit? 2014-07-10T17:44:34.873

5 Decrypting firmware: Is there a true "format" to it, and how does it differ from decryping other files? 2014-12-09T18:40:38.007

5 Understanding the loop disassembly 2015-06-05T07:59:52.107

5 How to read these UV coordinates? 2015-12-03T13:28:02.203

5 Challenging variable-length integer encoding 2016-01-12T10:07:07.583

5 Reverse engineer 4-bit checksum (?) in Sanyo air conditioning IR packet 2016-01-19T07:17:27.283

5 How to make radare2 work for a large binary? 2017-08-16T17:37:25.363

5 OLLYdbg is stopping on 7000000 addresses on the ntdll and not the entry point of the application 2017-09-26T16:28:16.647

5 Changing a windows name by patching create window function call 2017-12-15T10:09:56.637

5 Flare-ON#3: Problem understanding some parts in the program 2017-12-31T04:49:52.417

5 How to find if a given library function is used in a binary? 2018-04-08T09:06:44.483

4 On SPARC, what happens when a branch is placed in the branch-delay slot of another branch? 2013-04-29T17:49:06.700

4 Find file signatures inside an unknown file 2013-06-01T14:33:48.113

4 How to reverse command line arguments? 2013-06-20T04:16:38.990

4 Reverse engineering in pairs - is it possible? 2013-12-12T08:11:28.007

4 Tools to show the registers and memory locations in use during execution? 2014-04-29T20:42:00.310

4 How can a format string vulnerability be used to write a specific string into memory? 2014-05-30T15:31:43.500

4 Modifying a binary save-data file for a video game with a CRC/Checksum check 2014-07-10T03:47:40.887

4 Why are PUSHF and POPF so slow? 2015-07-14T18:22:16.527

4 Automatically decode PUSH+RET call into JMP 2015-09-20T09:43:04.433

4 Locating Memory Allocation Functions from Static Analysis 2015-10-21T04:35:57.800

4 Difference between objdump -r and -R switches 2016-12-20T04:19:46.870

4 Problem with converting hex values to decimal 2017-04-06T09:19:01.473

4 Reverse Engineering Windows PowerBuilder Binaries 2017-11-28T12:51:53.050

4 Is this Bignum multiplication of 2048 RSA number a Montgomery multiplication? 2018-06-07T19:11:24.280

4 Are some special chars(<>) in function names not supported by windbg/cdb? 2018-09-03T05:52:39.803

4 Heap Chunk Structure Does Not Contain Previous Section Info 2018-09-08T16:18:35.843

4 How do I perform concolic execution with Angr and collect constraints on input? 2018-09-13T13:01:23.210

4 Reverse Engineering bios of ATM Machine 2018-11-14T07:32:30.160

3 Recreating 2D aspects of Cantor.dust 2013-08-06T18:11:27.853

3 Difference Between Binary Exploitation and Reverse Engineering? 2014-01-25T11:34:23.220

3 Trouble analyzing a ransomware 2014-02-28T20:27:26.593

3 Finding end of file 2014-05-02T18:05:36.500

3 Automated Assembly/Disassemble library 2014-06-21T13:11:37.690

3 Date and time data extraction from a hex dump 2014-06-24T17:19:24.880

3 in / out instructions - how should I treat this? 2014-07-22T13:19:08.853

3 Search remote malware zoo for homologous samples 2014-08-21T18:03:29.283

3 OllyDbg: Keep comments & labels in rebased DLL 2014-10-04T12:31:02.597

3 Check if binary was compiled with security checks (/GS) 2014-11-24T18:14:42.857

3 Reverse engineering a proprietary GPU device driver? 2015-03-25T02:34:06.377

3 Patching a Mach-O Binary Header to remove a LC_SEGMENT 2015-05-08T22:07:14.320

3 Computing subtracted stack space for a function manually 2015-06-07T12:15:59.243

3 Reverse engineer 4-bit CRC in LG IR packet 2015-07-21T22:40:34.010

3 One-pass streaming algorithm for detecting bytecode/opcode? 2015-07-31T23:58:37.717