Ans | A | Title
3 | Y | Reading Physical Memory
1 | | Modifying PPID to avoid anti-debugging measure
1 | Y | Need help extracting JFFS2 filesystem from .img firmware binary
0 | | Network support when emulating firmware with QEMU
0 | | Reversing a file compressed with an unknown algorithm
0 | | Trying to figure what kind of compression was used here
3 | Y | Is it possible for a .exe PE file to do anything without any impor...
0 | | Changing strings in Hopper Disassembler
0 | | What does the “Offset to the filename” stands for in an Index ...
2 | Y | IDA cannot launch debugger for 64-bit exe files
1 | | MITM a Connection Between Components on a Motherboard
3 | Y | Parsing/Rescuing corrupted IDA database
2 | Y | Trying to figure what kind of compression was used
1 | Y | Help reverse engineering Linksys E1200 router firmware
1 | | IDA Pro — Patch String Value
1 | Y | How to get the information of "how many and which symbols are...
1 | Y | Router flash dump unknown filesystem
0 | | PE file: get function name in Export tables
1 | Y | What is the encoding format for unconditional Jumps on SPARC/SPARC64?
0 | | USB EJTAG debugger probe for MIPS32
0 | | What makes CDMs such as Widevine hard to reverse engineer?
2 | | Driver's Licence Last Name Numbering Format (Ontario, Quebec, ...
0 | | How to print all functions of a binary using radare2 c/c++ API
1 | | Automated Static Unpacking Binaries
2 | | How to locate dynamic instructions?
1 | | IDA pro: jump back to previous instruction
1 | | Android Native Library - How to match java references to sub_XXX f...
1 | Y | What are the Vectored Continue Handlers
2 | | "Proper" way to recreate undocumented structs / classes ...
0 | | Help finding smd datasheet
1 | Y | How to figure out method argument sizes and types in elf32-i386 di...
1 | Y | COM file starting point
1 | | MSP430 - IDA Pro Free Binary Dump
2 | Y | Obtain .exe/.dll/.sys for a given .pdb file
1 | Y | How calls work in x86
1 | | In Ollydbg, how do I change the path to a source code file without...
1 | | I'd like to ask about unpacking aspack 2.12
0 | | Help on extracting information from a encrypted/compressed .DAT file
0 | | Hex Editing software don't show all the possible offset
1 | Y | Reverse Engineering a automotive flash file
0 | | Set Xref to string
1 | Y | How to find a symbol in a binary using radare2?
3 | Y | How to get the CPU architecture via Idapython?
0 | | Get info.plist source tree path by reverse engineering
0 | | methods for identifying deliberately unmagiked filesystem
1 | Y | VBA code detection in MS office documents
1 | Y | IDA - call dword ptr [mana+0Ch] - Where is it pointing to?
1 | Y | Is it safe to load a virus to IDA Pro?
1 | Y | Decompiling and deobfuscating APK file
0 | | Debugging MIPS Binaries on Ubuntu 64-bit (version 14.04)