IRONBYTE
  • HOME
  • ARCHIVES
  • ARTICELS
  • CTF WRITEUPS
  • ABOUT 
    • WHO AM I?
    • LINKEDIN
    • TWITTER
    • GITHUB
  • HOME
  • ARCHIVES
  • ARTICELS
  • CTF WRITEUPS
  • ABOUT 
  • WHO AM I?
  • LINKEDIN
  • TWITTER
  • GITHUB

Reverse Engineering:

Intel x86 - x64

  • Reverse Engineering ~ Chapter 1: Fundamental Skills
  • Reverse Engineering ~ Chapter 2: Intel x86/x64
  • Reverse Engineering ~ Chapter 3: Decompilers And Packers
  • Reverse Engineering 101 - Introduction & Motivation
  • Reverse Engineering 101 - Requirements
  • Reverse Engineering 101 - An idea on how a computer work?
  • Reverse Engineering 101 - Scheduling Process
  • Reverse Engineering 101 - Execution of a program (High Level Perspective)
  • Reverse Engineering 101 - ELF (Executable Linkable Format)
  • Reverse Engineering 101 - Paging
  • Reverse Engineering 101 - GDB

Android

  • Reverse Engineering Android ~ Chapter 1: Android Fundamentals
  • Reverse Engineering Android ~ Chapter 2: Unlocking Android Mysteries
  • Reverse Engineering Android ~ Chapter 3: Smashing The APK
  • Reverse Engineering Android ~ Chapter 4: Fortress Of The Unbreakable
  • Reverse Engineering Android ~ Chapter 5: ARM’s Intricacies ~ Full Experience

Competitive ~ Programming

  • Sorting And Searching ~ Classic Problems
© 2022 - 2024    Med Ali Ouachani
VISITOR COUNT 1720 TOTAL PAGE VIEWS 2770
POWERED BY Hexo
THEME Redefine v2.1.1
2022/8/17 11:45:14
Blog up for
81,808488
days
8189
hrs
8582
Min
8
4
8
1
2
Sec