Advertisement · 728 × 90
#
Hashtag
#crackme
Advertisement · 728 × 90
Post image

Спасаем Бингус, и как я поправил ИИ помощника. Мануал для новичков Ещё одна очередная задачка! На этот раз на...

#реверс-инжиниринг #декодирование #reverse-engineering #reversing #ghidra #crackme #скриптинг #си

Origin | Interest | Match

0 0 0 0
Post image

Очередной CrackMe или Как я мучался с Ghidra. Мануал для новичков Думаю, новички в реверс-инжиниринге всегда хотел...

#Ghidra #Crackme #Static #Analysis #reverse-engineering #linux #decompilation #декомпиляция #реверс-инжиниринг #ассемблер #си

Origin | Interest | Match

0 0 0 0
Post image

Reverse Engineering для самых маленьких В этой статье мы разберём самую базу реверс‑инжиниринга на примере просто...

#reverse-engineering #assembler #crackme #hacking

Origin | Interest | Match

0 0 0 0
Preview
Solving Ph0wn Labs 01 Level 4 with r2ai Recorded by cryptax

For Ph0wn Labs, yesterday, we had a 4 level crackme to work on. Watch how easily r2ai solves level 4!

(well, don't watch it you don't want the spoil!)

asciinema.org/a/B8UalyH6I3...

#radare2 #r2ai #AI #crackme #ph0wn

2 1 0 0
Preview
Cracking my own CrackMe with r2ai Recently, I viewed the excellent “Cracking binaries with r2ai visual mode” by Daniel Nakov, at r2con 2024. In September 2024, I had tried…

r2ai solves my CrackMe in a few seconds. The solution is both elegant and educational.

cryptax.medium.com/cracking-my-...

+ recommended view: www.youtube.com/watch?v=UxE5...

#r2con #radare2 #ai #crackme #ctf

4 3 0 0

A rao_bash write-up by the fine folks at @RPISEC: http://blog.rpis.ec/2017/05/northsec-2017-raobash.html
#nsec17 #crackme

0 0 0 0