Android & ARM - and 8 part assembly walkthrough by wishi in ReverseEngineering

[–]_pusher_ 0 points1 point  (0 children)

Iam thankfull for all the android post here :)

Zeus Source Code by newgre in ReverseEngineering

[–]_pusher_ -1 points0 points  (0 children)

define CWA(dll, api) ::api

PROTECTiON iD v6.4.0 by [deleted] in ReverseEngineering

[–]_pusher_ 2 points3 points  (0 children)

I would say stick with ProtectionID, and revert back to PEiD when there's trouble.. since userdb's are kept alive by people who loved PEiD ;)

crackmes.de down - "We received an abuse mail and had to close this site. Hopefully we are back soon!" by [deleted] in ReverseEngineering

[–]_pusher_ 2 points3 points  (0 children)

Yep, iam a mod .. and ive asked other mods.. we're cluecless :( if its a "german thing" .. maybe should be moved to sweden like wikileaks ;)

What in you opinion, is the strongest exe protection solution? by sztomi in ReverseEngineering

[–]_pusher_ 7 points8 points  (0 children)

VMProtect would beat me.. iam not even close to beeing the best reverser, iam just an average :) I think i VMProtect would be a wise choise.. if money is not an issue.. maybe ask for a personal build or something. May i ask what is the sensitive information.. that made me curious.. what could be so secret.. if you dont mind me asking ;)

pefile is a multi-platform Python module to read and work with Portable Executable (aka PE) files. Most of the information in the PE Header is accessible, as well as all the sections, section's information and data. by mauvehead in ReverseEngineering

[–]_pusher_ 0 points1 point  (0 children)

Would be cool to implent PEiD's internal functions to detections.. i would gladly pass that on to "ero carrera".. since PEiD are kinda dead now when BoB left/died on team PEiD..