-
Updated
Oct 4, 2020
Reverse Engineering
The process of analyzing a subject system to identify the system's components and their interrelationships and to create representations of the system in another form or at a higher level of abstraction.
Here are 2,153 public repositories matching this topic...
-
Updated
Nov 12, 2020 - C++
-
Updated
Nov 15, 2020 - Java
-
Updated
Nov 11, 2020
Is your feature request related to a problem? Please describe.
It'll be nice to have a hotkey (like H
in IDA) to toggle the integer base between HEX and DEC. Since it may not work in Decompiler without backend support, having it in Disassembly/Graph will still be nice.
Describe the solution you'd like
So when I press the hotkey (maybe H
if it's available), it should work like
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ
-
Updated
May 14, 2019 - Objective-C
-
Updated
Sep 30, 2020 - JavaScript
-
Updated
Nov 15, 2020 - C
-
Updated
Apr 23, 2019 - Python
-
Updated
Oct 1, 2020 - Java
-
Updated
Oct 29, 2020 - Objective-C
-
Updated
Nov 8, 2020
-
Updated
Nov 14, 2020 - Python
-
Updated
Nov 14, 2020 - Python
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions
-
Updated
May 16, 2020 - Python
-
Updated
Oct 23, 2020 - Java
-
Updated
Nov 15, 2020 - Assembly
-
Updated
Jul 10, 2020 - Python
-
Updated
Sep 3, 2020 - PowerShell
-
Updated
Nov 2, 2020 - Python
-
Updated
Mar 28, 2020
-
Updated
Dec 31, 2019
-
Updated
Nov 6, 2020 - Shell
On my rpi4 (Linux liumeo-rpi4 5.4.72-v7l+ #1356 SMP Thu Oct 22 13:57:51 BST 2020 armv7l GNU/Linux), there are 107XXs. And it seems there's an endless loop in the last 2 cases (don't know which case yet).