Reverse Engineering Stack Exchange
Reverse Engineering Stack Exchange. Q&A for researchers and developers who explore the principles of a system through analysis of its structure, function, and...
Read Reverseengineering.stackexchange.com news digest here: view the latest Reverse Engineering Stack Exchange articles and content updates right away or get to their most visited pages. Reverseengineering.stackexchange.com is not yet rated by Alexa. It seems that Reverse Engineering Stack Exchange content is notably popular in USA, as 20.8% of all users (46K visits per month) come from this country. We haven’t detected security issues or inappropriate content on Reverseengineering.stackexchange.com and thus you can safely use it. Reverseengineering.stackexchange.com is hosted with CloudFlare, Inc. (United States) and its basic language is English.
Content verdict: Safe
Website availability: Live
Language: English
Last check:
-
7 417
Visitors daily -
11 719
Pageviews daily -
5
Google PR -
N/A
Alexa rank
Best pages on Reverseengineering.stackexchange.com
-
Reverse Engineering Stack Exchange
Q&A for researchers and developers who explore the principles of a system through analysis of its structure, function, and operation
-
Retrieve user data as if it were the game making the request - Reverse Engineering Stack Exchange
Don't think the title really summed it up but here goes. There's a game built in Unreal Engine 4 that displays your (and other users) in-game statistics e.g a leaderboards page. I can determine some
-
I am reversing Capcom driver and in IDA I have this list of functions: I want to set breakpoint on the function sub_10590 but I don't know what is the address of this function when I am doing live
Reverseengineering.stackexchange.com news digest
-
2 days
Bosch ECU (TC-1793) EEPROM unknown CHK
so I have here an unknown CRC/CHK algorithm. Here I will post some blocks from the EEPROM, they are 128 bytes in size and a the end of the block there is a CRC-16 check. This I have already figured out but as you can see highlighted in the blocks bellow...
-
6 years
CISC/RISC in reverse engineering
What is the difference between CISC/RISC when reverse engineering a binary?
I know the difference between them, but is there any difference while reversing? Is it easier to reverse CISC than RISC? -
4 days
What is the right-most term for the Javascript dumped from Chrome?
Let's say there is a website, http://foo.com which has function Bar() {} specified in an external JavaScript file, baz.js which is included onLoad.
If I say "Get me the JavaScript for foo.com", you're likely to get me the baz.js.
If I say "Get me the de-obfuscated code from foo.com" you're likely to use external tooling to statically analyze and make sense of baz.js.... -
5 years
Best way to protect source code of exe that being loaded by Assembly.Load method
I am protecting an exe that being loaded by Assembly.Load... This makes everything difficult because most obfuscators causing it to not work properly or not load at all. I used confuserEx Ameteurz modded its working with max settings but I don't like...
Domain history
| Web host: | CloudFlare, Inc. |
| Registrar: | CSC Corporate Domains, Inc. |
| Registrant: | Sysadmin Team (Stack Exchange, Inc.) |
| Updated: | June 08, 2025 |
| Expires: | June 12, 2026 |
| Created: | June 12, 2009 |
Whois record
Safety scores
Trustworthiness
ExcellentChild safety
Excellent
