When execution enters a new function by performing call I do often see this code template (asm list generated by Gnu Debugger when in debugging mode):
0x00401170 push %ebp
0x00401171 mov %esp,...
I'm trying to change an instruction in an executable that's loaded in IDA Pro v6.1
For example:
lis r11, ((qword_90E1B2D8+0x10000)@h)
to
lis r10, unk_90E163D0@h
Any help is appreciated, ...
I'm having trouble understanding the TEST instruction and its use. I'm looking at the following code at the end of a loop
0040A3D1 A9 00010181 TEST EAX,81010100
0040A3D6 74 E8 ...
Are there any scripts and/or online tools that can reverse the effects of minification?
I'm specifically looking to unminify a minified JavaScript file. Variable renaming is not a big issue, I want ...
When examining bin firmware files Binwalk is an extremely helpful tool. There are times though that Binwalk comes up empty and a lot more digging is required to make sense of the data.
Are there any ...
I have an unknown .dll from another program which I want to work with. With DLL Export Viewer I was able to find the exported functions.
But to call them I need the information about the parameters ...
It seems that a popular use of software reverse engineering skills is to reverse malicious code in an effort to build better protection for users.
The bottleneck here for people aspiring to break ...