πŸ”
Notes
CtrlK
TwitterGithub
  • πŸ‘‹Introduction
  • πŸ“šResearch
    • 2024
      • Reverse Engineering APK Built with Flutter
      • Reverse Engineering Application Protected with Pyarmor
      • Android Reverse Engineering (Native Library Analysis)
      • Malware Analysis: Wedding Invitation Scam
    • 2023
      • Analyzing CVE-2021-22204 Based on Network Traffic (PCAP file)
      • Emulating Android Native Library using Qiling - Part 1
      • Machine Learning Model (XGBoost) Reverse Engineering
      • CVE-2021-2461
      • CVE-2022-31367
      • CVE-2023-0046
      • CVE-2023-0048
      • CVE-2023-0316
    • 2022
      • Attacking Non Avalanche AES (Custom AES Implementation)
      • Cracking CRC32 with Forward Polynomial Constant
      • Cheating Game Built with WASM
      • Reverse Engineering Game Boy
      • Partial Known Plaintext Attack on Custom 3DES
    • 2021
      • Reverse Engineering Erlang BEAM File
      • Reverse Engineering Approach on Python Bytecode with Development Version
Powered by GitBook
On this page
  1. πŸ“šResearch

2023

Title
Page

Analyzing CVE-2021-22204 Based on Network Traffic (PCAP file)

Link

Emulating Android Native Library using Qiling - Part 1

Link

Machine Learning Model (XGBoost) Reverse Engineering

Link

CVE-2021-2461

Link

CVE-2022-31367

Link

CVE-2023-0046

Link

CVE-2023-0048

Link

CVE-2023-0316

Link

Last updated 11 months ago