Articles by Tag #reverseengineering

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Part 2 of the Practical Malware Analysis Labs Series Introduction In my previous article...

Learn More 0 0Jan 6

Cloning a 90s DOS Game with AI

Since I've been running a lot of AI-agent experiments lately, I wanted to see how far I could get...

Learn More 3 2Feb 8

Learning Reverse Engineering by Hex-Editing X-COM Save Files

"I wanted to cheat. That's how I learned." In 1994, if you wanted god-mode in X-COM, you couldn't...

Learn More 0 0Feb 9

ThermoPro Wireless Temperature Monitors

ThermoPro is a company selling digital thermometers and hygrometers. They're supposedly a Canadian...

Learn More 0 0Jan 3

Malware analysis - Hancitor Loader

Stage 1 In our case is very simple, so let's quickly run through it. From the import table, we can...

Learn More 0 0Nov 3 '25

Minimal Linux x86_64 Syscall Samples (pure assembly, no libc)

Hey everyone, I’ve been building a small collection of minimal Linux x86_64 assembly examples using...

Learn More 0 0Nov 27 '25

Frida를 이용한 Android 앱 분석과 리버스 엔지니어링

Frida를 이용한 Android 앱 분석 Frida는 동적 계측(Dynamic Instrumentation) 도구로, 실행 중인 앱의 동작을 분석하고 수정할 수...

Learn More 0 0Dec 31 '25

🔐 Decrypting Xiaomi MIUI .sa & .sav Files — Progress Update from The DevOps Rite

I’ve just uploaded a 12-second short video update on my YouTube channel The DevOps Rite, where I’m...

Learn More 1 0Dec 8 '25

1 little known secret of CompatTelRunner.exe

This analysis identifies a specific behavior within the CompatTelRunner.exe binary, a component of...

Learn More 0 0Feb 17

Reverse Engineering Teaches You What Software Actually Is

Most software development discussions focus on how software should be written. Reverse engineering...

Learn More 1 2Jan 26

A Practical Guide to Extracting and Analyzing IoT Firmware

Introduction The Internet of Things (IoT) has woven itself into the fabric of our daily...

Learn More 0 0Nov 11 '25

Why Your Competitive Intelligence Scrapers Fail: A Deep Dive into Browser Fingerprinting

You’ve built a scraper to track a competitor's pricing. You’re using high-quality residential...

Learn More 1 0Feb 4

Reverse Engineering Firmware at Scale with IDA Pro

Why reverse engineering matters If you’ve ever stared at a stripped firmware image and...

Learn More 0 0Jan 30

Decompiled Code Still Contains Design

Decompiled code looks hostile at first glance. Names are gone. Structure is distorted. Intent...

Learn More 1 0Jan 26

WannaCry Ransomware Malware Analysis

WannaCry Ransomware Malware Analysis The WannaCry sample used for this analysis was...

Learn More 2 0Feb 6

MachIDE: Building a Native macOS IDE for Mach-O Decompilation from Scratch

Introducing MachIDE: Native macOS IDE for Binary Analysis As developers and reverse...

Learn More 0 0Oct 11 '25

I Turned an EXE Into Music (and it actually tells you something)

Executable Animator: sonify “machine-code-ish” byte patterns into a WAV, generate a visual...

Learn More 0 0Feb 13

Every Codebase Eventually Becomes a Reverse Engineering Problem

No software stays young forever. Teams change. Context fades. Assumptions outlive their authors. At...

Learn More 2 0Jan 26

Reverse Engineering Changes How You Design Software

Once you start reverse engineering real systems, something subtle happens: You stop designing...

Learn More 1 0Jan 26

Reverse Engineering as a Debugging Mindset

Reverse engineering sounds like a specialized discipline. But if you strip the labels away, a large...

Learn More 1 0Jan 26

Modding Is Reverse Engineering Under Constraints

Modding is often described as “extending a game”. In reality, modding is something much closer to...

Learn More 1 0Jan 26

eDBG: eBPF-based Undetectable Debugger for Android Reverse Engineering

eDBG is a debugging tool based on eBPF technology, designed for Android native reverse engineering in...

Learn More 2 0Mar 27 '25

Dissecting Digital Viruses: My First Steps in Malware Analysis

Ever wondered what a virus actually does under the hood? Here is how I started reversing malware safely and what I've learned.

Learn More 0 0Jan 20

Reverse Engineering the Lego NXT: Dumping Firmware with Golang

The Lego Mindstorms NXT, a cornerstone of educational robotics since 2006, still holds untapped potential for hobbyists and engineers. By dumping its firmware u

Learn More 0 0Mar 8

Tauri Framework: Code-First Deep Dive : E1

Table of Contents Architecture Overview Tauri follows a multi-process architecture...

Learn More 2 3Jun 22 '25

Islands of Invariance

The article explores the concept of "islands of invariance" within the Crystal Palace...

Learn More 1 0Mar 6

Reverse Engineering Tutorial

A post by Kevin Thomas

Learn More 0 1Aug 11 '25

Reverse Engineering Third-Party Integrations — What API Docs Won’t Tell You

How I handled inconsistent third-party integrations with missing docs, different architectures, and unpredictable behaviors.

Learn More 0 0Mar 27 '25

Brainstorm - TryHackMe CTF Walkthrough

A nice and detailed walkthrough of THM's Brainstorm buffer overflow CTF showing the persistence needed for these exploits and common issues I encountered.

Learn More 0 0Aug 10 '25

Reverse Engineering Is a Core Developer Skill

Reverse engineering isn’t about “breaking” software or bypassing systems. It’s about understanding...

Learn More 1 0Jan 26