logo
 
  1. Reverse Engineering >
  2. Hooking Golden Axe VBlanks (with Binary Ninja)


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Hooking Golden Axe VBlanks (with Binary Ninja)

Reverse Engineering vom | Direktlink: reddit.com Nachrichten Bewertung

submitted by /u/zznop_
[link] [comments] ...

Externe Webseite mit kompletten Inhalt öffnen

Kommentiere zu Hooking Golden Axe VBlanks (with Binary Ninja)






➤ Ähnliche Beiträge

  • 1.

    Ubuntu 18.04 hangs on shutdown/restart

    vom 241.91 Punkte ic_school_black_18dp
    I'm running a fresh install of Ubuntu 18.04LTS. When I go to either Power Off or Restart a fresh ubuntu session https://i.redd.it/280ghjkfz7j31.png ​ my computer will freeze for about a 30 seconds until popping up the options to Cancel, Restart, or Po
  • 2.

    MindShaRE: Automated Bug Hunting by Modeling Vulnerable Code

    vom 164.82 Punkte ic_school_black_18dp
    The REcon conference in Montreal is one of my favorite security conferences to attend, and this year I had the pleasure of taking the Program Analysis Training by Evan Jensen and Sophia D'Antoine. One of the many things covered during the course was
  • 3.

    TWC9: Ninja on Mixer, WSL 2 Updates, Docs Samples Browser and more | This Week On Channel 9

    vom 140.3 Punkte ic_school_black_18dp
    This week on Channel 9, Christina is back with the latest developer news including: [00:18] Christina's Shirt [00:41] NINJA on Mixer [01:08] WSL 2 Updates [02:03] Docker for Desktop WSL Technical Previewand Scott Hanselman's blog with his thoughts [03:05] Docs.Microsoft.com Samples Browser and you can
  • 4.

    Google Rapid Response (GRR ) – Remote Live Forensics For Incident Response

    vom 112.83 Punkte ic_school_black_18dp
    GRR Rapid Response is an incident response framework focused on remote live forensics. It based on client server architecture, so there’s an agent which is installed on target systems and a Python server infrastructure that can manage and communicate
  • 5.

    BeRoot- A Post Exploitation Tool To Check Common Misconfigurations For Windows Linux And Mac OS

    vom 103.67 Punkte ic_school_black_18dp
    BeRoot- A Post Exploitation Tool To Check Common Misconfigurations For Windows Linux And Mac OS A compiled version is available here.It will be added to the pupy project as a post exploitation module (so it will be executed in memory without tou
  • 6.

    Another country-sponsored #malware: Vietnam APT Campaign

    vom 92.16 Punkte ic_school_black_18dp
    The background This is a team work analysis, we have at least 5 (five) members involved with this investigation. The case that is about to be explained here is an APT case. Until now, we were (actually) avoiding APT cases for publicity in Malware Must Die
  • 7.

    Exploring Clang Tooling – Using Build Tools with clang-tidy

    vom 84.18 Punkte ic_school_black_18dp
    This post is part of a regular series of posts where the C++ product team and other guests answer questions we have received from customers. The questions can be about anything C++ related: MSVC toolset, the standard language and library, the C++ st
  • 8.

    Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)

    vom 83.21 Punkte ic_school_black_18dp
    We'll be writing a hooking engine using trampoline based hooks as explained in the previous article (we don't handle relative instructions as they're very rare, but we do use atomic write operations to prevent race conditions).First things first, we need to define the proxy function
  • 9.

    How the Voyager Golden Record Was Made

    vom 79.64 Punkte ic_school_black_18dp
    Fascinating article on The New Yorker about how the Voyager Golden Record was made: The Voyagers' scientific mission will end when their plutonium-238 thermoelectric power generators fail, around the year 2030. After that, the two craft will drift endlessly
  • 10.

    Hooking Golden Axe VBlanks (with Binary Ninja)

    vom 78.01 Punkte ic_school_black_18dp
  • 11.

    MMD-0037-2015 - A bad Shellshock & Linux/XOR.DDoS CNC "under the hood"

    vom 74.88 Punkte ic_school_black_18dp
    The background Yesterday was a hectic day when we gathered to check all recent ELF threats cross-fired in the internet traffic when I was informed of a recent shellshock attack. Seeing the command pattern of the one-liner shell executed script used I knew
  • 12.

    Ninja coming to London's Microsoft Store for some Fortnite fun

    vom 74.83 Punkte ic_school_black_18dp
    Compete to play in Fortnite matches shoutcasted by none other than Ninja himself. What you need to know Streaming giant Ninja is coming to the London Microsoft Store. Ninja will shout-cast Fortnite matches in which players can earn a "special prize." The