[Megathread] /m/ReverseEngineering questions & discussion
I'm stickying this thread for minor discussions related to reverse engineering, including:...
I'm stickying this thread for minor discussions related to reverse engineering, including:...
I'm starting work on reverse engineering an old original X-Box game and was wondering, can I commit the Ghidra database that I've worked on so far to GitHub. Does the database contain copyright or proprietary data from the original binaries or does it just have references to the data?
"Superpacking is a method of optimal binary compression developed by Meta to help reduce the size of their Android APKs. This compression for APKs makes sense for reducing network traffic required for distribution, but becomes an issue when trying to recover the original native ARM binaries for analysis. This post walks through...
A series of excellent blog posts by wrongbaud; this is must-read content for any beginner at hardware reverse engineering.
Normally you need to use a rooted iOS device to extract a device-specific encryption key that you can use to decrypt IPAs - this web service allows anyone to obtain the decrypted app files, even if they don't own an Apple device!
"This article delves into the reverse engineering of Dart executable or Flutter release applications. We focus on the reverse engineering of byte arrays."
Just click on the schedule item(s) you're interested in, and the slides should be attached in the page for each presentation.
Great article about reverse engineering Android apps, protobufs, and more.
Original post: https://kbin.social/m/tech/t/57239/How-do-projects-like-PINE64-and-Asahi-Linux-write-open-source...
datalocaltmp discusses the basics of iOS application reversing
An overview of React Native application structure on Android, plus some useful information about Hermes engine bytecode/disassembly.
You attempt to analyze a binary file compiled in the Rust programming language. You open the file in your favorite disassembler. Twenty minutes later you wish you had never been born...
A beginner's guide to reverse engineering Android apps, written by Maddie Stone of Google Project Zero.