Tag: security

62 How can I analyze a potentially harmful binary safely? 2013-03-19T21:27:57.400

14 How to see what data is being transmitted when an application calls home? 2013-04-06T13:45:41.450

13 Are hardware dongles able to protect your software? 2013-03-23T08:39:25.617

10 Get code from protected PIC 2013-03-21T15:29:33.923

9 How to reverse engineer an ATM? 2013-05-08T13:31:05.560

8 What causes the need for NOP sleds? 2017-11-04T12:57:48.253

5 Turning Technologies RF receiver 2014-02-07T02:02:11.660

4 differences in ASLR on Linux and Windows 2013-11-24T04:26:29.807

3 LastPass Android javascript behaviour 2014-12-08T00:32:52.303

2 Why does an exe's import Table have two refrences to kernel32.dll (or any other dll)? 2015-04-23T09:11:13.087

2 Is MD5 hashing of files a valid method of creating an anti-virus program? 2016-02-09T13:01:43.450

1 How to store a string securely inside your app? 2015-05-09T19:09:39.207

1 Taking up reverse engineering as a research topic, need advice 2015-08-03T18:57:09.670

1 SysTracer by SysReveal.com clean? 2016-03-03T17:23:15.900

1 How to obfuscate x86 assembly code? 2016-04-22T15:09:24.477

1 DLink LIF firmware: Error reading block 1191378964 from file. (Success) 2017-03-12T09:05:06.827

1 Legal Reverse Engineering for Security Review in US for Korean Provided Module 2018-10-08T22:15:08.693

1 Has anyone reversed Wyze cameras? 2018-10-24T18:22:30.673

0 Is the security of this .net application flawed? 2015-05-03T17:50:22.737

0 How to find vulnerabilities in stripped binaries? 2016-10-20T14:18:18.333