River

  • Home
  • Archive
  • Categories
  • Tags
  • Search
  • 2025

  • 2025-05-02
    Binary Instrumentation II

    Intercepting & monitoring Windows API calls to find a flag in a hidden buffer

  • 2025-05-01
    Binary Instrumentation I

    Bypassing sleep functions using Frida

  • 2025-04-23
    FactCheck

    Reversing decompiled C++ code to extract a flag by tracing string manipulation logic

  • 2025-04-22
    WinAntiDbg0x300

    Bypassing an infinite debugger-killing loop by NOP'ing an unconditional jump

  • 2025-04-03
    WinAntiDbg0x200

    Further bypassing anti-debugging checks by editing register values

  • 2025-02-08
    WinAntiDbg0x100

    Bypassing simple anti-debugging techniques in a Windows executable through dynamic analysis

  • 2024

  • 2024-11-02
    Crackme-py

    A simple python challenge

  • 2024-11-02
    Shop

    Learning Ghidra basics

  • 2024-11-02
    Weird Snake

    Analyzing bytecode to reverse engineer an XOR key

  • 2024-10-30
    Packer

    Reverse engineering a simple linux executable

Page 1 of 2
Copyright © 2024-2025 River
  • Home
  • Archive
  • Categories
  • Tags
  • Search