Hackerman's Hacking Tutorials

The knowledge of anything, since all things have causes, is not acquired or complete unless it is known by its causes. - Avicenna

Category: Reverse Engineering

2018 Aug 25DVTA - Part 5 - Client-side Storage and DLL Hijacking
2018 Aug 2DVTA - Part 4 - Traffic Tampering with dnSpy
2018 Jul 30DVTA - Part 3 - Network Recon
2018 Jul 21DVTA - Part 2 - Cert Pinning and Login Button
2018 Jul 15Damn Vulnerable Thick Client Application - Part 1 - Setup
2018 Jun 5ContextIS xmas CTF Writeup
2017 Nov 15WinAppDbg - Part 4 - Bruteforcing FlareOn 2017 - Challenge 3
2017 Nov 15WinAppDbg - Part 3 - Manipulating Function Calls
2017 Nov 11WinAppDbg - Part 2 - Function Hooking and Others
2017 Nov 9WinAppDbg - Part 1 - Basics
2016 Jul 14Gynvael Coldwind - Garage4Hackers - Notes from March 2014
2015 Nov 14Intro to .NET Remoting for Hackers
2015 Jan 6Tales from the Crypt(o) - Leaking AES Keys
2014 Dec 8Pin Adventures - Chapter 1 - PinSolver Mk1
2014 Sep 23My Adventure with Fireeye FLARE Challenge
2014 Sep 2Fireeye's FLARE Challenge
2013 Sep 29Microsoft Bluehat Challenges