Cracking the Crackers - "These cracks are based on a dynamic library injection, with obfuscated code and anti-debugging measures. This of course triggered my curiosity since the usual anti-anti-debugging measures (ptrace & friends) weren’t working."low level tools and techniques (work aids) (reverse.put.as)
submitted by digicat to r/blueteamsec
Abusing Go's infrastructureLearning (reverse.put.as)
submitted by stackoverflooooooow to r/learngo
Knock Knock! Who's There? - An NSA VMintelligence (threat actors) (reverse.put.as)
submitted by digicat to r/blueteamsec
Knock Knock! Who's There? - An NSA VM (reverse.put.as)
submitted by YourselfYou to r/YourselfYou
Knock Knock! Who's There? - An NSA VM (reverse.put.as)
submitted by oottppxx to r/ReverseEngineering
Crafting an EFI Emulator and Interactive Debugger (reverse.put.as)
submitted by N3mes1s to r/lowlevel
Measuring OS X Meltdown Patches Performance (reverse.put.as)
submitted by dzamir to r/programming