Hi, I'm Paul.

Hacker

Threat intelligence analyst, security enthusiast and constant learner.

Read about me
Artik Blue's Picture

Reverse engineering 32 and 64 bits binaries with Radare2 - 8 (start doing crackmes now!)

Heeeeeello. No tutorial, only crackmes. So according to Wikipedia: A crackme is a small program designed to test a pro...

Reverse engineering 32 and 64 bits binaries with Radare2 - 7 (struct arrays, r2pm and patching)

So today we are going to work with a more complete example related to structs, the goal is to correctly understand how the...

Reverse engineering 32 and 64 bits binaries with Radare2 - 6 (2d arrays and structs)

Hi there, I hope you are all good, as I promised here we have this next part of the reversing with radare2 mini course :) ...

Reverse engineering 32 and 64 bits binaries with Radare2 - 5 (var types and casting)

Hi folks and welcome back to the most awesome reverse engineering with r2 post series 8) Today I’m going to drop some note...

Reverse engineering 32 and 64 bits binaries with Radare2 - 4 - II (more strings)

On this one, we are going to walk a little bit more through char arrays and strings to set solid fundamentals on the topic...

Reverse engineering 32 and 64 bits binaries with Radare2 - 4 (arrays and strings)

Yeahyeah, we are back at it! Today I’m going to walk you through some very basic data structures such as uni dimensional ...

Reverse engineering 32 and 64 bits binaries with Radare2 - 3 (funcs, cases and loops)

Here we go again. In the previous chapter of this radare2 full course, we walked through the very basic structure of an ex...

Embedded systems programming with atmel328 - 6

About keypads Keypads are simple input devices that can be used in embedded projects. Most of the time, we can find keyboa...

Reverse engineering x64 binaries with Radare2 - Exploiting basic Buffer Overflows

And after a very well deserved rest, here we go again. While these tutorials are generally aimed at developing skills in r...