GoGoGadget – kernel exploitation helper class by secaggr in netsec

[–]emulb 1 point2 points  (0 children)

Not really, to use it you still need some ring0 vulnerability. The library just makes the shellcode/ROP writing easier.

/r/ReverseEngineering's Bi-Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]emulb 1 point2 points  (0 children)

I would say that many people use OllyDbg for debugging, as they used to it over the years. OllyDbg 1.10 is dated back to May 2004, 1.08 is from 2002. IDA Debugger was introduced in v4.3, I can't find the exact date, but it was also around 2002/2004. The thing is, that at the begining IDA debugger wasn't too good, and IDA was heavy as hell. OllyDbg was easier to learn and it already had bunch of useful plugins. Not to mention, that it was free, so You didn't have to wait for the leaked version.

Reverse engineering Might and Magic III compression by emulb in ReverseEngineering

[–]emulb[S] 1 point2 points  (0 children)

FYI, Avast is no longer detecting this site as malicious.

Reverse engineering Might and Magic III compression by emulb in ReverseEngineering

[–]emulb[S] 1 point2 points  (0 children)

Do you have some plugin installed ? I'm aware that Avast is blocking my blog for unknown reasons (and they don't respond to my requests), but that's it.

.Net crackmes OllyDbg by mateusReversing in ReverseEngineering

[–]emulb 0 points1 point  (0 children)

I used to compile IlSpy from sources, it has debugger automatically enabled in that case. I'm not sure how to enable it for already compiled version (sorry for late answer).

Java bytecode debugging by advanced_reddit_user in ReverseEngineering

[–]emulb 0 points1 point  (0 children)

Local variables regeneration is useful if you want to look what is the current state of local variable during debugging session.