Emulating Exynos 4210 [like Samsung Galaxy S2 phone's] BootROM in QEMU (With Full Sources - See Comment for Details) Reverse Engineering |
- Emulating Exynos 4210 [like Samsung Galaxy S2 phone's] BootROM in QEMU (With Full Sources - See Comment for Details)
- Reversing an Aigo (Chinese encrypted HDD) − Part 2: Dumping a Cypress PSoC 1 microcontroller
- Reversing an Aigo (Chinese encrypted HDD) − Part 1: taking it apart
- Dumping the internal ROMs of Taito C-Chips (decapping, improved protection emulation etc.)
- Process Injection with GDB
- iOS Static Analysis and Recon
- Windows Remote Administration Tool via Telegram [See Comment for More Details]
Posted: 12 Mar 2018 02:20 AM PDT |
Reversing an Aigo (Chinese encrypted HDD) − Part 2: Dumping a Cypress PSoC 1 microcontroller Posted: 12 Mar 2018 07:46 AM PDT |
Reversing an Aigo (Chinese encrypted HDD) − Part 1: taking it apart Posted: 12 Mar 2018 07:36 AM PDT |
Dumping the internal ROMs of Taito C-Chips (decapping, improved protection emulation etc.) Posted: 11 Mar 2018 03:39 PM PDT |
Posted: 12 Mar 2018 11:40 AM PDT |
Posted: 12 Mar 2018 08:56 AM PDT |
Windows Remote Administration Tool via Telegram [See Comment for More Details] Posted: 12 Mar 2018 02:09 AM PDT |
You are subscribed to email updates from Reverse Engineering. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment