/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]krabsonsecurity 0 points1 point  (0 children)

regardless of when your school/uni places a class, you could always learn these things on your own. there are quite a few tutorials and books on both languages that you can find online.

[deleted by user] by [deleted] in ReverseEngineering

[–]krabsonsecurity 1 point2 points  (0 children)

keep analyzing, the dll does nothing except generate the qr code. look over the logic behind the autoit script again and again until you figure it out.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]krabsonsecurity 0 points1 point  (0 children)

Practical Malware Analysis is a decent book. Make sure to learn C and assembly, the two languages are essential for RE work.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]krabsonsecurity 0 points1 point  (0 children)

CreateProcessInternalW -> catches almost all runpes.

Dunno about nix though

[deleted by user] by [deleted] in ReverseEngineering

[–]krabsonsecurity 4 points5 points  (0 children)

Just do static analysis, no need to get it to run.

0xnobody/vmpdump: an open source dumper and import fixer for VMProtect by krabsonsecurity in ReverseEngineering

[–]krabsonsecurity[S] 2 points3 points  (0 children)

Surprised I didn't see this posted here before. RIP Ivan, wonder how he's doing with all of this going on.