How can I view the disassembly of optimised jitted .NET code? How to View the Disassembly of Optimized JI Tted NET Code When developing applications in NET understanding the compiled output of your code can provide valuabl 3 min read 08-10-2024 5
what does "Detected assembler with broken .inst" mean? Detected assembler with broken inst What It Means and How to Fix It You re likely encountering this error message while working with a software development envi 2 min read 06-10-2024 8
radare2 print data of pointer to pointer Dissecting Pointers to Pointers in Radare2 A Guide to Data Exploration The Problem You re working with a binary file and encounter a pointer to a pointer a vari 2 min read 04-10-2024 8
Iaito dissasembler shows invalid instructions Understanding Iaito Disassembler Invalid Instructions Error In the world of software development and programming tools like disassemblers are essential for anal 2 min read 14-09-2024 15
how to add an additional dll to an exe file and force it to use Injecting a DLL into an Existing Executable A Guide to Code Modification Modifying the behavior of an existing executable without directly altering its binary c 3 min read 30-08-2024 13
Recover a corrupted pickle file Reviving a Corrupted Pickle File A Step by Step Guide Have you ever encountered the dreaded EOF Error Ran out of input when trying to load a pickle file This er 3 min read 30-08-2024 33
Exposing what the compiler does for passing to a reference vs to a const reference Unmasking the Compilers Magic Passing by Reference vs Const Reference In the realm of C understanding the nuances of passing parameters by reference and const r 2 min read 30-08-2024 25
Listing imported functions from a Windows PE file Decoding the Mystery Finding Imported Functions in a PE File Extracting the list of imported functions from a Portable Executable PE file is a crucial task in r 2 min read 29-08-2024 21
How to find memory address of a function which isn't called in main, but declared and defined outside main in gdb Uncovering Hidden Functions Finding Memory Addresses in GDB Reverse engineering can be a challenging but rewarding pursuit and one common task is locating the m 2 min read 28-08-2024 19