Section
6 pages
Reverse Engineerings
Inside Mamba: A Technical Exploration into Ransomware
Breaking Flawed Elliptic Curve Cryptography Using Secp256k1
Dynamic Reverse Engineering of a Custom Virtual Machine Using Instrumentation
Full Reverse Engineering Workflow of a Small Virtualized CrackMe
Reverse Engineering and Bypassing Protections in a CTF Stock Trading Game
Simple Walkthrough of Reverse Engineering Disassembled Code