Tags » Reverse Engineering

String Hashing: Reverse Engineering an Anti-Analysis Control

String hashing is a method employed by malware authors to disguise strings that are critical to its (stealthy) execution such as library, function and/or process names. 3,145 more words

Malware

Type & Photography Reverse Engineering

Type and Photography Intro

Article found at http://www.topdesignmag.com/20-magazine-design-layouts-for-your-inspiration/

Analysis

Type

The two different typefaces are a decorative san-sarif in the title, and a plain simple san-sarif for the body. 151 more words

Design

Reverse Engineering A Bitcoin Miner

If you’re brave enough to have dipped your toes into the Wild West that is cryptocurrency, you probably know that people have long since abandoned trying to mine on their desktop computers. 77 more words

Hardware

Reverse Engineering A Bitcoin Miner

If you’re brave enough to have dipped your toes into the Wild West that is cryptocurrency, you probably know that people have long since abandoned trying to mine on their desktop computers. 346 more words

Hardware

Type & Photography Reverse Engineer

Introduction

This magazine cover is the January 2015 issue of the Ensign created by The Church of Jesus Christ of Latter-day Saints. The original publication is found… 310 more words

Blog

Reverse Engineer Post Social Media Brand

The Brand I chose to analyze is Barefoot Blonde Hair Extensions. Here is a link to their instagram:

https://www.instagram.com/barefootblondehair/

This brand was created by Amber Fillerup, a blogger and influencer on Instagram. 176 more words

Reverse Engineering using z3 [GKSK CTF Serial Killer 300pts]

Description : 

I want to divide by 0 in this simple calculator but it won’t let me! Please HALP!!!! :(((((

Challenge kali ini saya menggunakan python library… 338 more words

Reverse Engineering