<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 20:30:06 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/reverse-engineering/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[[Reverse-Engineering] PHP vld 0.17.1 Kompatibiltätsproblem mit PHP 5.6  Parameter -dvld.active=1 funktioniert nicht.]]></title><description><![CDATA[vld-Versionen größer als 0.13 lassen sich nicht mit php5.6 kompilieren, es wäre nett, wenn die Programmierer dieses angegeben hätten. Ich musste mir die Mühe machen, alles Versionen durchzuprobieren und]]></description><link>http://direct.ecency.com/reverse-engineering/@fehlerbeheber/reverse-engineering-php-vld-0171-kompatibiltatsproblem-mit-php-56-parameter-dvldactive1-funktioniert-nicht</link><guid isPermaLink="true">http://direct.ecency.com/reverse-engineering/@fehlerbeheber/reverse-engineering-php-vld-0171-kompatibiltatsproblem-mit-php-56-parameter-dvldactive1-funktioniert-nicht</guid><category><![CDATA[reverse-engineering]]></category><dc:creator><![CDATA[fehlerbeheber]]></dc:creator><pubDate>Tue, 22 Jun 2021 05:07:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NUeJEn5AVrJUoyatFqBqfcCJi1N7UixR4g2KPKN7w8NpZJjsT4pHEvzeAmSoEtZpQbwVJ9Wa2aQFp6E1uJHrDorBWBfvdgveenzywVjYmbkhcve85hpY1NfJbbzfCrJZH5AqNsjkhdhr6RSVEwm3VtyVytRUNaL32dLa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Reverse Engineering a Newsfeed Post: Amiibo Edition]]></title><description><![CDATA[If there is something that I would like anyone to know about me: I am a gamer. No, it's not as bad as you may think. Everyone needs a hobby, and video games are definitely one of them! So being a gamer,]]></description><link>http://direct.ecency.com/design/@disizsarg3/reverse-engineering-a-newsfeed-post-amiibo-edition</link><guid isPermaLink="true">http://direct.ecency.com/design/@disizsarg3/reverse-engineering-a-newsfeed-post-amiibo-edition</guid><category><![CDATA[design]]></category><dc:creator><![CDATA[disizsarg3]]></dc:creator><pubDate>Thu, 06 Jun 2019 04:48:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAN4hi5HFuPHE15QTPPYnA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[shell code]]></title><description><![CDATA[쉘코드 시스템에서 특정 명령을 실행하는 작은 사이즈의 코드 일반적으로 기계어 코드로 작성뎀 EX  ]]></description><link>http://direct.ecency.com/programming/@jej2660/shell-code</link><guid isPermaLink="true">http://direct.ecency.com/programming/@jej2660/shell-code</guid><category><![CDATA[programming]]></category><dc:creator><![CDATA[jej2660]]></dc:creator><pubDate>Fri, 16 Nov 2018 15:06:54 GMT</pubDate></item><item><title><![CDATA[assembly language]]></title><description><![CDATA[어셈블리어 기계어 와 1대1로 대응하는 언어 시스템 이해에 필요함 레지스터 범용 레지스터, 상태 레지스터, 플래그 레지스(cpu 내의 저장공간) 레지스터 구조 1.데이터 레지스터:EAX, EBX, ECX, EDX EAX:   Extended Accumulator Register    곱셉이나 나눗셈 연산에 사용, 함수의 결과값]]></description><link>http://direct.ecency.com/programming/@jej2660/assembly-language</link><guid isPermaLink="true">http://direct.ecency.com/programming/@jej2660/assembly-language</guid><category><![CDATA[programming]]></category><dc:creator><![CDATA[jej2660]]></dc:creator><pubDate>Thu, 15 Nov 2018 16:53:51 GMT</pubDate></item><item><title><![CDATA[Malware Analysis - Intro to RE - Lecture 2 [CS7038]]]></title><description><![CDATA[This is the second lecture of the malware analysis course taught by Professor Coleman Kane. It's a one hour lecture comprising of the following topics: inspecting raw pdfs creating a python parser looking]]></description><link>http://direct.ecency.com/science/@cristi/malware-analysis-intro-to-re-lecture-2-cs7038</link><guid isPermaLink="true">http://direct.ecency.com/science/@cristi/malware-analysis-intro-to-re-lecture-2-cs7038</guid><category><![CDATA[science]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Mon, 30 Jul 2018 11:58:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eHuDb1eG3tE69Eyukfk7TNmZJgpAcxFgEqU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Disassembling with IDA - Malware Analysis Tutorial]]></title><description><![CDATA[I'm not sure I've suggested this tutorial before, but here goes. So, for those who are into malware analysis, one of the tools in your repertoire is a disassembler. A very large majority of researchers]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/disassembling-with-ida-malware-analysis-tutorial</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/disassembling-with-ida-malware-analysis-tutorial</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Fri, 20 Jul 2018 12:39:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eHBGSpMuBCMjYDLzEkN5tBXjEvYEnVCqnRt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to Set Up a Malware Analysis Lab - [OALabs]]]></title><description><![CDATA[I know I was very confused the first time I created a virtual machine for malware analysis. My biggest concern was how to make sure that the samples I'm analyzing are not to escape the isolation environment.]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/how-to-set-up-a-malware-analysis-lab-oalabs</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/how-to-set-up-a-malware-analysis-lab-oalabs</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Thu, 19 Jul 2018 12:37:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eHXcSrPz3asNNArZ8RTte1D6oyqHrM8ANpv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Reverse Engineering Android Applications - [Talk]]]></title><description><![CDATA[I got a little bit surprised when I tried looking for information on reverse engineering android applications. Usually, I go for lectures, talks, and most importantly demonstrations and hands-on videos.]]></description><link>http://direct.ecency.com/programming/@cristi/reverse-engineering-android-applications-talk</link><guid isPermaLink="true">http://direct.ecency.com/programming/@cristi/reverse-engineering-android-applications-talk</guid><category><![CDATA[programming]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Wed, 11 Jul 2018 12:17:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eKvSc8KvoFGwigMqmR8uKBCZTqJKMxXTsYA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Binary Reverse Engineering - Lafarge2 [CrackMe]]]></title><description><![CDATA[Finally, I've been able to work on and post my first reverse engineering tutorial. So, in this demonstration I'm patching a binary from the very popular repository of crackmes. Up until not long ago, these]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/binary-reverse-engineering-lafarge2-crackme</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/binary-reverse-engineering-lafarge2-crackme</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Thu, 05 Jul 2018 12:59:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eP8rkD4gfYJm8AEe6mY3gELaRmZkegqRWVU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to Solve a Crackme the Right Way - [Gynvael]]]></title><description><![CDATA[Gynvael Coldwind makes a lot of live hacking and computer security demonstrations on his channel on Youtube. He and his team are frequently ranked high and reach the podium in CTF-like challenges, one]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/how-to-solve-a-crackme-the-right-way-gynvael</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/how-to-solve-a-crackme-the-right-way-gynvael</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Tue, 12 Jun 2018 12:20:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45ePXed3p3jPMB4Rr1NE5mSWi7Zix62vERiAi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Malware Analysis with IDA Pro - [Demonstration]]]></title><description><![CDATA[Yet another malware analysis video... I guess I kindof gotten you used to these materials. Folks at OpenAnalysis have posted, not too long ago, a video on their youtube channel, which is about doing malware]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/malware-analysis-with-ida-pro-demonstration</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/malware-analysis-with-ida-pro-demonstration</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Thu, 07 Jun 2018 15:15:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eMYhozYefNEVEnDaaVRTMNgEh9M5MvS66dL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Modern Exploitation - by RSA2018 Conference - [Presentation]]]></title><description><![CDATA[Folks at the RSA Conference have been posting a lot of videos on their youtube channel over the past couple of days. One of them that caught my attention was the one I'm suggesting here. It's about modern]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/modern-exploitation-by-rsa2018-conference-presentation</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/modern-exploitation-by-rsa2018-conference-presentation</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Fri, 01 Jun 2018 14:05:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e6G3qUyNejJ6X8VqBgvB2xaQ5e4AGqtjRgr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Buffer Overflow in Modern Applications - [Video Demonstration]]]></title><description><![CDATA[In this video,T3JV1L demonstrates how he found a buffer overflow type SEH vulnerability in a binary application. He told me that he first reported the vulnerability to the software company in cause, after]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/buffer-overflow-in-modern-applications-video-demonstration</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/buffer-overflow-in-modern-applications-video-demonstration</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Wed, 30 May 2018 12:08:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eJP7UtU1vHqQmodUm4EX5Qo99h1ksPJ8EfG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Teaching myself Reverse Engineering - Lafarge CrackMe [RE Tutorial]]]></title><description><![CDATA[One of the ways in which I teach myself reverse engineering is through hands-on practice. So, I take these binaries that are hosted on crackmes.one and I try to reverse them. In this context, reversing]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/teaching-myself-reverse-engineering-lafarge-crackme-re-tutorial</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/teaching-myself-reverse-engineering-lafarge-crackme-re-tutorial</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Tue, 29 May 2018 11:44:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e3SfyViojvBdLJ67rBFnSFzCLXAq3XGP7c2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to achieve unlimited score in 🎮 Hodl the Coin Steem game [Hack]]]></title><description><![CDATA[There is new retro Steem game by @LimeSoda. Hodl the Coin is a tribute to Flappy Bird in the galaxies. Player try to hodl the Steem coin through downsides and upsides for as many days as he can. Mouse]]></description><link>http://direct.ecency.com/hodlthecoin/@mys/how-to-achieve-unlimited-score-in-hodl-the-coin-steem-game-hack</link><guid isPermaLink="true">http://direct.ecency.com/hodlthecoin/@mys/how-to-achieve-unlimited-score-in-hodl-the-coin-steem-game-hack</guid><category><![CDATA[hodlthecoin]]></category><dc:creator><![CDATA[mys]]></dc:creator><pubDate>Mon, 21 May 2018 20:16:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUMp8dW6yuJTR9MKNu8P8DCXDU9qmmoWZLRX6SmWdapNwqF9P34u2rXzuYPUMQzi9u8Dk6Caz7iZwhgDU24cPK375Z?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Disassembling Binaries with IDA - [A Reverse Engineering Tutorial]]]></title><description><![CDATA[In my penetration testing training, I'm currently working on a vulnerable machine that doesn't seem to have too many ways in. There are only 2 open ports, both for web services. I was able to extract a]]></description><link>http://direct.ecency.com/programming/@cristi/disassembling-binaries-with-ida-a-reverse-engineering-tutorial</link><guid isPermaLink="true">http://direct.ecency.com/programming/@cristi/disassembling-binaries-with-ida-a-reverse-engineering-tutorial</guid><category><![CDATA[programming]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Wed, 14 Feb 2018 12:41:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVZ5NRzV2o8MyJEzowAL6rjbt8w3dTGq7UfgC3dyKHtVxxYQCS2KSs1541XW52SFev7ac6LqyDZYzV3sDYop6j5NRsTCS9m5DX7KoUindhbo2SH8mKk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A brief, holistic view of (some) Cybersecurity]]></title><description><![CDATA[Disclaimer: I am not a seasoned veteran in Cybersecurity, I am simply someone who loves the field and wants to push their skills as far as possible within their favoured topics. Ultimately, netting a position]]></description><link>http://direct.ecency.com/cybersecurity/@justblink/a-brief-holistic-view-of-some-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@justblink/a-brief-holistic-view-of-some-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[justblink]]></dc:creator><pubDate>Thu, 30 Nov 2017 20:53:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJR3iqPxDrevHK3vDeQGnHc8Wj8C8neiDLbY9Nawqf4R48NZnDc8aPewfa5NqgnLgVjr46o77jtiKbpeenAayyGocvKKwZrg9dwhmMkLfUf6GtjXhA1P5f4a?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[OPEN-SOURCE PROJECT: Remote control a power-wheelchair!]]></title><description><![CDATA[This repo holds code to control power-wheelchairs with R-Net electronics. I want people to spread the word and maybe even make cool stuff with it... Some electronic wheelchairs use the same signaling bus]]></description><link>http://direct.ecency.com/utopian-io/@tech.ninja/r-net-can2rnet</link><guid isPermaLink="true">http://direct.ecency.com/utopian-io/@tech.ninja/r-net-can2rnet</guid><category><![CDATA[utopian-io]]></category><dc:creator><![CDATA[tech.ninja]]></dc:creator><pubDate>Sat, 18 Nov 2017 20:40:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45ePzYaneFnJ1C5JWcfoPELvDDnBguvG62mAN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Reverse Engineering One Line of JavaScript: Raytraced Checkboard]]></title><description><![CDATA[Pretty cool and educational. This guy Alex Kras reverse engineered this nice piece of a oneliner demo made by Mathie "p01" Henri. I just gotta love his work. What about an Ascii art raytraced]]></description><link>http://direct.ecency.com/programming/@gaissa/reverse-engineering-one-line-of-javascript-raytraced-checkboard</link><guid isPermaLink="true">http://direct.ecency.com/programming/@gaissa/reverse-engineering-one-line-of-javascript-raytraced-checkboard</guid><category><![CDATA[programming]]></category><dc:creator><![CDATA[gaissa]]></dc:creator><pubDate>Mon, 17 Jul 2017 12:48:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/6gUbcKN7Uxeo9Nxy34FzXEBdZJJv2hbWVWmk9MmSS2Khct4aX9fAp5LKu8E4ibqgxwmwBj?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Reverse engineering Pokemon Go]]></title><description><![CDATA[Adrien Couque from Appdium takes Pokemon Go Android APK distribution apart and shows what it takes to run the highest scalability mobile game ever. Nothing was obfuscated. Good to read if you want to build]]></description><link>http://direct.ecency.com/pokemongo/@miohtama/reverse-engineering-pokemon-go-on-android</link><guid isPermaLink="true">http://direct.ecency.com/pokemongo/@miohtama/reverse-engineering-pokemon-go-on-android</guid><category><![CDATA[pokemongo]]></category><dc:creator><![CDATA[miohtama]]></dc:creator><pubDate>Wed, 20 Jul 2016 05:03:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXB2rvTALkFhKKa1xy9XM51SPCyy9UjTC8ys1BoYLJKHxx43Jy7nVfwWupr33S2Q3hrzVtmh47HqmYkXQVbPDujYyjUPCB?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>