Reverse Engineering Challenges Logo

Reverse Engineering Challenges

0
Free
Visit Website

Reverse Engineering challenges contrived by Dennis Yurichev, inspired by Project Euler and the matasano crypto challenges. The website offers exercises and tasks covering various topics such as black boxes, obfuscation, unknown cryptoalgorithm, simple copyprotection, toy-level web server, broken data compression algorithm, and more. Challenges are categorized by level, with Level 1 including tasks related to stack, LOOP instruction, simple patching exercise, array manipulation, bit fields, and structures.

FEATURES

ALTERNATIVES

PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games, with CheatEngine-like value type support and memory searching capabilities.

Automated Android Malware Analysis tool

A file analysis framework that automates the evaluation of files by running a suite of tools and aggregating the output.

Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.

A minimal, consistent API for building integrations with malware sandboxes

A tool for identifying and analyzing Java serialized objects in network traffic

Define and validate YARA rule metadata with CCCS YARA Specification.

Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

PINNED