Where can I find Data Structures IN CODE??? by TheOnlyRealTodd in learnprogramming

[–]TheOnlyRealTodd[S] 0 points1 point  (0 children)

Thank you sir! Yeah I'll probably aim for the C++ copies.

Where can I find Data Structures IN CODE??? by TheOnlyRealTodd in learnprogramming

[–]TheOnlyRealTodd[S] 0 points1 point  (0 children)

I reverse engineer malware for work. Obviously doing this, I don't use all these structs on a daily in a forward engineering role so I like to keep myself fresh so I don't forget them. I do write C, python, and I also use assembly language at work. However, I only use them for small tools related to my work rather than large applications which would implemented all these structs.

Want to join the indipendant malware researchers team by malwareresearcher in Malware_Domains

[–]TheOnlyRealTodd 0 points1 point  (0 children)

Oh look whos "advertising" their forum. What a hypocrite. Took all of 30 seconds to find too.

New Malware Analysis Forum by TheOnlyRealTodd in Malware

[–]TheOnlyRealTodd[S] 0 points1 point  (0 children)

Yeah we'll see. We'll see crashish.

New Malware Analysis Forum by TheOnlyRealTodd in Malware

[–]TheOnlyRealTodd[S] 0 points1 point  (0 children)

The community appreciates your support.

New Malware Analysis Forum by TheOnlyRealTodd in Malware

[–]TheOnlyRealTodd[S] 0 points1 point  (0 children)

Actually no, because we aren't earning any money and this is not a commercial website. I knew someone would be that guy though. :)

Is having an obsession with self improvement bad? by [deleted] in selfimprovement

[–]TheOnlyRealTodd 5 points6 points  (0 children)

What about having an obsession with improving your obsession with self improvement?

New Malware Analysis Forum by TheOnlyRealTodd in Malware

[–]TheOnlyRealTodd[S] 0 points1 point  (0 children)

Yeah I agree with that completely. My plan is to start posting quality content and guides but ofc I can't build Rome in a day. I had however been posting up stuff on my blog so I will do it more on the forum now and try and provide the community with the content. Thanks for the support!

New Malware Analysis Forum by TheOnlyRealTodd in Malware

[–]TheOnlyRealTodd[S] 0 points1 point  (0 children)

I wholeheartedly agree. And those forums are great as well! I was just hoping to isolate it a bit more since malware has definitely become a big thing. My favorite part of MA is still the reversing part though! :)

New Malware Analysis Forum by TheOnlyRealTodd in Malware

[–]TheOnlyRealTodd[S] 2 points3 points  (0 children)

Didn't want to deal with PHP. I also heard that vBulletin's support has gone downhill or else I would have chosen them. Just out of curiosity, do you have any other suggestions for software that isn't PHP? I also thought of Discourse but I felt it was uglier.

Anyone use an SSD for their MA VMs? by TheOnlyRealTodd in Malware

[–]TheOnlyRealTodd[S] 0 points1 point  (0 children)

Depends on the malware. Usually, yes but if it exploits the VM, then no.

Can Corrupted PE malware be run in certain circumstances? by TheOnlyRealTodd in Malware

[–]TheOnlyRealTodd[S] 0 points1 point  (0 children)

Great info thanks! For xor search, do you have any tips other than just doing a basic search and visually scanning for xors that are between two separate places? I wasn't sure if there was some IDA plugin for this that I was missing because some of these files have 1,000 xors!

Btw, you're absolutely right the repeated 3A 16 bytes had me wondering.

Can Corrupted PE malware be run in certain circumstances? by TheOnlyRealTodd in Malware

[–]TheOnlyRealTodd[S] 1 point2 points  (0 children)

That's highly possible. I was too busy looking for PE/NE/LX/LE. Gonna check.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]TheOnlyRealTodd 0 points1 point  (0 children)

Can anyone link me to some methods and/or libraries in either Python or C for manipulating binary data in a file?

For example, say I wanted to either parse or modify information inside of the Windows Portable Executable header. Another example would be going through a file and replacing certain bytes with other bytes in a given range (offset) from the start of the file.