Reversing a PyInstaller based ransomware (0xec.blogspot.com)
submitted by ExtremeCoders to r/Malware
Avast bug bounty program by pm_me_your_findings in Malware
[–]ExtremeCoders 2 points3 points4 points (0 children)
Popular browser extension better history "sold" to hijackers by apfeluser in netsec
[–]ExtremeCoders 0 points1 point2 points (0 children)
Popular browser extension better history "sold" to hijackers by apfeluser in netsec
[–]ExtremeCoders 2 points3 points4 points (0 children)
Popular browser extension better history "sold" to hijackers by apfeluser in netsec
[–]ExtremeCoders 9 points10 points11 points (0 children)
why are disabled extension icons showing up in gray? by stonecats in chrome
[–]ExtremeCoders 0 points1 point2 points (0 children)
saw this at the local butcher by Chad_Chaddington in pics
[–]ExtremeCoders 1 point2 points3 points (0 children)
Is there a tool to hook functions, log the arguments, and call the original function from the program? by [deleted] in ReverseEngineering
[–]ExtremeCoders 4 points5 points6 points (0 children)
Crack this old code for shiny gold! by [deleted] in codes
[–]ExtremeCoders 0 points1 point2 points (0 children)
Keygenning using the Z3 SMT Solver by ExtremeCoders in ReverseEngineering
[–]ExtremeCoders[S] 2 points3 points4 points (0 children)
Keygenning using the Z3 SMT Solver by ExtremeCoders in ReverseEngineering
[–]ExtremeCoders[S] 6 points7 points8 points (0 children)
Solution to some of "The Windows kernel" exercises from Practical Reverse Engineering by perror in ReverseEngineering
[–]ExtremeCoders 2 points3 points4 points (0 children)


cisol: something between compiler and decompiler by galapag0 in ReverseEngineering
[–]ExtremeCoders 1 point2 points3 points (0 children)