New posts in reverse-engineering

Google's Imageless Buttons

How can I find the data structure that represents mine layout of Minesweeper in memory?

Binary Bomb - Phase 4

What's the purpose of this [1] at the end of struct declaration?

Stopping at the first machine code instruction in GDB

Sniffing/logging your own Android Bluetooth traffic

Is it really impossible to protect Android apps from reverse engineering?

Bomb lab phase 5 - 6 char string, movzbl load, and $0xf, %ecx, and index an array with that?

How can I protect MySQL username and password from decompiling?

How do you determine what technology a website is built on? [closed]

Is there a C++ decompiler? [closed]

Difference of the value, prototype and property

Generate UML Class Diagram from Java Project [closed]

How do I decompile a .NET EXE into readable C# source code?

What is the iBeacon Bluetooth Profile

List of all index & index columns in SQL Server DB

How to generate UML diagrams (especially sequence diagrams) from Java code?

Protect .NET code from reverse engineering?

Best practice for storing and protecting private API keys in applications [closed]

decompiling DEX into Java sourcecode