r0da's Blog
Home
About
Hi, I'm r0da and welcome to my blog. Here you can find my posts about reverse engineering.
Find me on
and
.
Writings
2021
2021-06-15
🔥
Quick look around VMP 3.x - Part 3 : Virtualization
2021-04-11
::
Valve Anti Cheat - Part 1 : Module loading
2021-02-03
::
Bypassing 12 years old Xbox 360 Game Security
2021-01-26
🔥
Quick look around VMP 3.x - Part 2 : Code Mutation
2021-01-05
::
Quick look around VMP 3.x - Part 1 : Unpacking
2020
2020-10-21
::
How to inject code into PE executables
2020-08-06
🔥
Improvements of fuzzing techniques in Vuzzer
2020-06-30
::
Why last VAC Anticheat update is useless
2020-02-01
::
Quick analysis about Jar2exe protection 3
2019
2019-06-29
::
Encrypt functions in Windows executables
2019-06-25
::
Deceive cross references analysis (XREF)
2019-06-24
🇫🇷
Le hooking de function
Private
2022-01-01
🔒
W**** Writes - I : What are we talking about
Incoming
2021-05-11
🔧
80%
: Breaking into an Android - Part 1 : Preface
2019-09-28
🔧
40%
: Obfuscation with Windows PE - Part 1
Projects
2022-01-09
::
20%
Toka : Code obfuscation passes for LLVM IR
2021-01-27
::
✔️ Lumina : Legit mutated CSGO cheat
2020-08-06
::
✔️ Vuzzer64++ : Improved version of Vuzzer64
2020-04-11
::
70%
PERandomizer : PE polymorther
2019-07-08
::
✔️ Serana : .NET PE parser library
2019-06-28
::
✔️ Exe2Jar : Jar2Exe unpacker for Windows executables
2017-06-06
::
✔️ BitcoinNotify : Simple Windows desktop notification app
CTF Write-ups
2021-03-12
::
BTSCTF 2021 : BtS emulator Write-Up
2020-09-13
::
CSAW CTF 2020 : Cuba Write-Up
2019-02-27
::
KoreanCTF 2017 : CSHARP Write-Up