Tag: reverse-engineering

673 How to avoid reverse engineering of an APK file? 2012-12-13T06:42:14.893

652 decompiling DEX into Java sourcecode 2009-08-08T21:39:45.463

449 Protect .NET code from reverse engineering? 2009-02-03T07:53:46.223

409 How to generate UML diagrams (especially sequence diagrams) from Java code? 2008-09-09T12:56:05.347

287 List of all index & index columns in SQL Server DB 2009-04-19T18:38:24.623

258 Best practice for storing and protecting private API keys in applications 2013-01-28T20:50:32.847

234 How do I decompile a .NET EXE into readable C# source code? 2008-10-07T18:27:08.950

171 Generate UML Class Diagram from Java Project 2011-05-29T10:45:46.737

158 How do you determine what technology a website is built on? 2008-12-28T22:01:00.227

142 What is the iBeacon Bluetooth Profile 2013-09-20T00:13:29.607

94 Is there a C++ decompiler? 2008-10-15T15:01:10.610

90 Google's Imageless Buttons 2009-02-06T15:12:31.980

90 How can I find the data structure that represents mine layout of Minesweeper in memory? 2009-05-31T04:24:38.083

89 What's the purpose of this [1] at the end of struct declaration? 2017-11-02T23:52:27.707

86 What's a good C decompiler? 2008-10-11T09:35:21.660

76 How can I protect MySQL username and password from decompiling? 2009-01-14T13:04:39.907

76 Tools to help reverse engineer binary file formats 2009-01-29T18:13:10.907

60 Sniffing/logging your own Android Bluetooth traffic 2014-05-26T21:09:50.797

55 Generate ER Diagram from existing MySQL database, created for CakePHP 2010-12-01T16:13:23.347

55 Is it really impossible to protect Android apps from reverse engineering? 2010-12-02T15:30:58.527

48 Compare compiled .NET assemblies? 2009-03-16T22:46:13.690

44 Annotating YouTube videos programmatically 2008-08-01T18:36:14.070

44 Stopping at the first machine code instruction in GDB 2012-05-07T14:07:04.820

43 How to get method signatures from a jar file? 2009-06-10T15:33:17.253

42 Reverse engineering war stories 2008-10-10T21:05:58.427

42 "xor eax, ebp" being used in C++ compiler output 2011-06-15T08:10:40.927

35 What's a good, free serial port monitor for reverse-engineering? 2009-01-20T15:35:20.387

34 Why some iphone apps won't finish ssl handshake with Charles Proxy? 2015-07-26T02:21:57.507

32 Deconstructing Pokémon glitches? 2011-07-29T17:14:20.270

32 How to Generate a Sequence Diagram from Java Source Code 2013-06-26T04:55:12.420

31 Tool to reverse Javascript minify? 2009-06-22T16:24:32.657

29 how are serial generators / cracks developed? 2008-09-24T21:21:22.330

29 How to hide strings in a exe or a dll? 2009-05-29T14:10:17.407

28 How do I copy-protect my Java application? 2010-09-05T18:37:30.810

27 Sequence Diagram Reverse Engineering 2008-09-17T20:14:13.730

27 Reversing an MD5 Hash 2009-09-24T13:19:54.773

27 How do i prevent my code from being stolen? 2010-02-25T23:05:56.317

26 How do these javascript obfuscators generate actual working code? 2012-01-16T17:40:12.317

25 What is your favourite anti-debugging trick? 2009-02-21T14:28:39.040

25 Can it be morally defensible to release a program which games an MMORPG? 2009-04-24T05:20:13.380

25 How to analyze binary file? 2009-06-22T08:24:44.617

24 Disassembling A Flat Binary File Using objdump 2013-01-12T06:21:49.447

24 How can I connect to the FitBit Zip over Bluetooth 4.0 LE on Linux with bluez? 2013-05-21T09:16:09.813

23 free UML sequence diagram reverse engineering eclipse plugin working out of the box - does such a thing exist? 2010-12-17T12:12:00.993

23 Protect string constant against reverse-engineering 2011-09-15T18:57:04.247

23 Raw floating point encoding 2012-02-22T21:59:46.100

21 convert ASM to C (not reverse engineer) 2009-09-04T01:51:20.277

21 How do you extract classes' source code from a dll file? 2011-01-16T16:00:30.570

20 Is there a program to decompile Delphi? 2008-12-02T19:17:42.557

20 analysing packed file of unknown format, how to continue? 2015-05-04T10:57:08.710

19 Where is Reverse Engineering used? 2009-02-15T10:02:38.823

19 Call graph of the whole application 2010-01-29T11:40:44.660

18 Best way to inject functionality into a binary 2008-11-04T16:58:51.727

18 Tools to generate a database diagram/ER diagram from existing Oracle database? 2010-01-19T06:39:22.817

18 Considering getting into reverse engineering/disassembly 2010-05-03T13:59:33.690

18 Reverse Engineer a File Format 2012-02-03T16:59:45.050

18 Is it possible to call a non-exported function that resides in an exe? 2012-05-07T18:29:27.243

18 How to decode a PDF stream? 2015-01-17T09:11:35.190

18 How to unzip, edit and zip an android apk 2015-04-05T08:27:05.153

18 Java reverse engineering with Papyrus Software Designer in Eclipse Version: Neon.3 (4.6.3) 2017-08-08T11:18:03.317

17 Is there such a thing as a javascript deminifier (deobfuscator)? 2009-09-07T06:25:43.457

17 Making commercial Java software (DRM) 2010-03-17T22:40:24.030

16 Deciphering MMORPG Protocol Encoding 2009-02-12T02:52:43.260

16 How would I reverse engineer a cryptographic algorithm? 2009-06-12T19:37:45.740

16 Any tool/software in windows for viewing ELF file format? 2010-02-08T13:20:56.850

16 JNZ & CMP Assembly Instructions 2013-02-12T20:25:43.973

16 What's the difference between .rdata and .idata segments? 2013-09-25T18:18:11.853

15 Have you ever used code virtualizer or vmprotect to protect from reverse engineering? 2008-12-10T00:01:02.197

15 Edit (patch) a binary file in IDA Pro 2009-06-09T12:54:56.557

15 Howto Reverse-Engineer a REST-Webservice 2011-07-26T13:57:21.143

15 Where does the limitation of 10^15 in D.J. Bernstein's 'primegen' program come from? 2011-09-27T17:16:46.767

15 UML free reverse engineering tool for C++ (.h/.cpp ==> Class Diagram) 2011-11-04T20:40:38.637

15 Good software engineering vs. Security 2012-01-10T02:53:45.207

15 Why does this code enable me to detect a debugger? 2012-04-10T12:59:04.793

15 Reverse engineering a check digit algorithm 2012-11-21T14:31:15.683

15 How to reverse-engineer / decompile an Android APK which was obfuscated using ProGuard? 2013-02-09T13:10:34.617

15 Reverse engineering iWork '13 formats 2013-10-24T16:42:58.380

15 How to access Chrome's online bookmarks? 2013-12-29T13:15:31.037

15 REPNZ SCAS Assembly Instruction Specifics 2014-11-06T15:58:25.117

14 Reverse Engineering an Apple Kext - Reconstructing the Class 2009-11-29T01:51:13.953

14 Is There a Way to Tell What Language Was Used for a Program? 2009-12-30T03:08:16.330

14 reverse engineering c programs 2010-02-16T11:44:54.540

14 How hard to reverse engineer .pyd files? 2012-08-22T14:10:52.033

14 Reverse engineering a subset of tables for Entity Framework 2013-10-03T12:11:55.857

14 What exactly does _malloc do in assembly? 2013-12-11T03:46:15.917

14 Compile time string encryption using constexpr 2015-08-29T14:27:56.060

14 Telegram: get fileid from telegram client 2016-12-26T05:54:33.017

13 Is it legal to reverse engineer binary file formats 2008-09-23T14:08:05.267

13 Application to reverse engineer MySQL & PostgreSQL DB? 2009-03-22T02:35:55.453

13 IDA pro asm instructions change 2011-06-13T07:51:39.893

13 How do I bypass IsDebuggerPresent with OllyDbg? 2012-04-26T08:53:36.377

13 How can I generate UML diagrams from C# code written in Visual Studio 2012 into Visio 2010? 2012-11-12T16:49:48.870

13 Processing ELF relocations - understanding the relocs, symbols, section data, and how they work together 2013-05-30T23:56:00.907

12 Stored procedures reverse engineering 2008-09-16T06:54:50.943

12 Reverse Engineering Flash 2009-03-24T18:50:56.887

12 Reverse Engineering old paint programs 2009-03-27T01:56:15.180

12 How To Extract .flv Stream from JW Player 5.1? 2010-05-08T03:40:31.997

12 Is it possible to edit and recompile an iOS Binary? 2012-05-14T04:10:37.797

12 How hard is it (really) to decompile assembly code? 2013-01-13T21:50:59.070