並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 22 件 / 22件

新着順 人気順

"Reverse Engineering"の検索結果1 - 22 件 / 22件

タグ検索の該当結果が少ないため、タイトル検索結果を表示しています。

"Reverse Engineering"に関するエントリは22件あります。 セキュリティプログラミングarticle などが関連タグです。 人気エントリには 『TEPRA Lite ではじめる BLE リバースエンジニアリング / tepra-lite-ble-reverse-engineering』などがあります。
  • TEPRA Lite ではじめる BLE リバースエンジニアリング / tepra-lite-ble-reverse-engineering

    第54回 情報科学若手の会 #wakate2021

      TEPRA Lite ではじめる BLE リバースエンジニアリング / tepra-lite-ble-reverse-engineering
    • Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 Vaccine - Bert Hubert's writings

      Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 Vaccine Translations: ελληνικά / عربى / 中文 (Weixin video, Youtube video) / 粵文 / bahasa Indonesia / český / Català / český / Deutsch / Español / 2فارسی / فارسی / Français / עִברִית / Hrvatski / Italiano / Magyar / Nederlands / 日本語 / 日本語 2 / नेपाली / Polskie / русский / Português / Română / Slovensky / Slovenščina / Srpski / Türk

        Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 Vaccine - Bert Hubert's writings
      • GitHub - LuanRT/YouTube.js: A wrapper around YouTube's internal API — reverse engineering InnerTube

        You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

          GitHub - LuanRT/YouTube.js: A wrapper around YouTube's internal API — reverse engineering InnerTube
        • Reverse-Engineering Apple Dictionary

          Reverse-Engineering Apple Dictionary December 8, 2020 For a while now I have wanted to write a simple dictionary app for the Apple Watch. The goal was to be able to quickly look up words from paper books, by storing the book on the watch to be able to do fuzzy matches against the text. While Apple ships amazing dictionaries with macOS and iOS, they only provide a very limited API. On iOS, all you

          • How an anti ad-blocker works: Reverse-engineering BlockAdBlock

            How an anti ad-blocker works: Reverse-engineering BlockAdBlock If you've used an adblocker, you may have seen BlockAdBlock. This script detects your ad-blocker and disables website access until you deactivate your adblocker. But I found myself wondering how it worked. How does an anti ad-blocker detect adblockers? And how do adblockers react and block ad-block-blockers? Reverse-engineering through

              How an anti ad-blocker works: Reverse-engineering BlockAdBlock
            • Reverse Engineering Tiktok's VM Obfuscation (Part 1)

              TikTok has a reputation for its aggressive data collection. In fact, an article published on 22 December 2022 uncovered how ByteDance spied on multiple Forbes journalists using TikTok. While some of the data they collect may seem benign, it can be used to build a detailed profile of each user. Information such as user location, device type, and various hardware metrics are combined to create a uni

              • GitHub - secrary/Andromeda: Andromeda - Interactive Reverse Engineering Tool for Android Applications

                You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session.

                  GitHub - secrary/Andromeda: Andromeda - Interactive Reverse Engineering Tool for Android Applications
                • GitHub - acheong08/obi-sync: Reverse engineering of the native Obsidian sync and publish server

                  You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                    GitHub - acheong08/obi-sync: Reverse engineering of the native Obsidian sync and publish server
                  • GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.

                    You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                      GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
                    • Reverse-engineering the 8086's Arithmetic/Logic Unit from die photos

                      Computer history, restoring vintage computers, IC reverse engineering, and whatever The Intel 8086 processor was introduced in 1978, setting the course of modern computing. While the x86 processor family has supported 64-bit processing for decades, the original 8086 was a 16-bit processor. As such, it has a 16-bit arithmetic logic unit (ALU).1 The arithmetic logic unit is the heart of a processor:

                        Reverse-engineering the 8086's Arithmetic/Logic Unit from die photos
                      • Reverse-engineering the Yamaha DX7 synthesizer's sound chip from die photos

                        Computer history, restoring vintage computers, IC reverse engineering, and whatever The Yamaha DX7 digital synthesizer was released in 1983 and became "one of the most important advances in the history of modern popular music"1. It defined the sound of 1980s pop music, used by bands from A-ha and Michael Jackson to Dolly Parton and Whitney Houston. The DX7's electric piano sound can be heard in ov

                          Reverse-engineering the Yamaha DX7 synthesizer's sound chip from die photos
                        • GitHub - 0xdidu/Reverse-Engineering-Intel-x64-101: Material for a RE 101 class on Intel x64 binaries

                          You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                            GitHub - 0xdidu/Reverse-Engineering-Intel-x64-101: Material for a RE 101 class on Intel x64 binaries
                          • Reverse Engineering の腕試し: Flare-On Challenge の紹介 | NTT Communications Developer Portal

                            こんにちは、インシデントレスポンスサービス担当の濱崎です。今回は日本時間で 2020/9/12 10:00 ~ 10/24 10:00 に開催された Reverse Engineering の腕を競う大会、Flare-On 7 Challenge に参加したので、その内容と結果を紹介したいと思います。 Flare-On Challenge とは Flare-On Challenge は FireEye 社が毎年主催している Reverse Engineering に特化した Capture The Flag(CTF) 形式のセキュリティコンテストです。2014年から毎年 8~10 月の期間で開催されており、今年で7回目なので Flare-On 7 Challenge と呼ばれています。他の CTF に比べ次のような特徴があります。 多くの問題が Windows で動作するソフトウェアで構成

                            • 5 Days to Virtualization: A Series on Hypervisor Development - Reverse Engineering

                              On October 25, 2018 By daax 5 Days to Virtualization: A Series on Hypervisor Development Overview Next week, (10/29) I’ll be starting to publish a series that is written to aid new and interested readers with building, testing, and understanding type-2 hypervisor development. This hypervisor will be written for use on Intel processors with virtualization support. If you’re operating on an AMD chip

                              • GitHub - mandiant/flare-vm: A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.

                                You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                  GitHub - mandiant/flare-vm: A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
                                • GitHub - ax/apk.sh: apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK.

                                  You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                    GitHub - ax/apk.sh: apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK.
                                  • GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

                                    You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                      GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
                                    • GitHub - rockbruno/swiftshield: 🔒 Swift Obfuscator that protects iOS apps against reverse engineering attacks.

                                      Don't use this tool for production apps. I gave up on keeping this tool updated because every Swift release breaks SourceKit in a different way. It's probably really broken and is only useful as a way for you to learn more about obfuscation and SourceKit. SwiftShield is a tool that generates random and irreversible encrypted names for your iOS project's types and methods (including third-party lib

                                        GitHub - rockbruno/swiftshield: 🔒 Swift Obfuscator that protects iOS apps against reverse engineering attacks.
                                      • Reverse Engineering Dark Souls 3 Networking (#1 - Connection)

                                        The Backstory FromSoftware’s SoulsBorne series are some of my most cherished games. I’ve got a lot of fond memories in these games, mainly participating in jolly cooperations with friends. Being a programmer, I’ve also had somewhat more interest than is probably healthy in how they’ve but together these masterpieces. To that end I spend a lot of time browsing social media related to modding and da

                                        • GitHub - geohot/corona: Reverse engineering SARS-CoV-2

                                          You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                            GitHub - geohot/corona: Reverse engineering SARS-CoV-2
                                          • Reverse-engineering the Final Fantasy: Theatrhythm track format

                                            GitLab.com

                                              Reverse-engineering the Final Fantasy: Theatrhythm track format
                                            • Reverse engineering Flutter apps (Part 1)

                                              Chapter 1: Down the rabbit hole To start this journey I'll cover some backstory on the Flutter stack and how it works. What you probably already know: Flutter was built from the ground up with its own render pipeline and widget library, allowing it to be truly cross platform and have a consistent design and feel no matter what device its running on. Unlike most platforms, all of the essential rend

                                                Reverse engineering Flutter apps (Part 1)
                                              1

                                              新着記事