Debugging Java Dynamically - The Power of JDB
So I was reversing a Java binary on weekend and suddenly a thought crossed my mind: Is there a way to do dynamic analysis on Java binaries ? Reversing Java binaries is not very difficult nowadays...
So I was reversing a Java binary on weekend and suddenly a thought crossed my mind: Is there a way to do dynamic analysis on Java binaries ? Reversing Java binaries is not very difficult nowadays...
Reversing LuckyPatcher(11.6.7) apk Most of the people should already be familiar with LuckyPatcher application. Still just to give an introduction, LuckyPatcher application is a master tool that ...
Scene Android security is a vast industy with a lot of oppurtunities. During my learning and studying period of Android Security I have realised that the best way to learn about the android intern...
AutoBot Today we are going to reverse and analyze a malware executable based for Windows OS and try to understand the basic techniques adopted by modern malwares and what malicious thing it does a...
Dynamic Memory Allocation We did find the address of available gold stored with the user, but is it the same address everytime?? The answer is NO due to DMA (Dynamic Memory Allocation) . This is ...
Game Reversing Series CH-1: Game Hacking Setup Hey there, Welcome to My first blog of the series of Game Reversing . Here you not only understand the fundamentals of the various games like CS:GO,...
IDAPRO This is a collection of some features of IDA Pro and its important plugins referenced from the book The IDA Pro Book by Chris Eagle: How does a disassembler works? identifying the entry...
OPERATING SYSTEM Moores Law: Every decade the number of digital devices will double themselves. Kernel is the core component of the OS system and it is used for system calls and other utility...
ChildBoT Analysis Analysis MD5:30705266725F9BAD60EA12821ACF740A SHA256: D60BB69DA27799D822608902C59373611C18920C77887DE7489D289EBF2BD53E Virus Total At VirusTotal.com, 40 out of 69 engines f...
THE UNKNOWN Now we have a file named ‘unknown’ and we will check if it is malicious or not . First of all we will check it at VirusTotal.com database using the Hashes of the malware exe file. Ha...