Skip to main content

Explore our questions

2 votes
1 answer
116 views

The Logic Of Incremental Data on Serial Communication Encoding

0 votes
1 answer
150 views

Cracking cryptographic function with radare2

2 votes
2 answers
485 views

What is this RS-485 communication protocol/

0 votes
1 answer
49 views

Off-By-One handler addresses for ARM Coretex ISR tables

0 votes
1 answer
169 views

Code injection to system process(lsass.exe)

0 votes
0 answers
10 views

Immobilizer Logic of Specific ECU

1 vote
1 answer
231 views

VxWorks flat binary file

5 votes
1 answer
19k views

How to scan the ECU Delphi MT05?

6 votes
1 answer
508 views

Are there existing automated approaches to reverse engineering the data types in a binary data stream?

0 votes
1 answer
82 views

Extracting & Parsing Information from a Captured Packet

6 votes
1 answer
3k views

Huawei HG8245H, can't read some system files

-2 votes
0 answers
25 views

good way to intercept and figure out what it needs from defunct apis in order to figure out some of the defunct apis

0 votes
1 answer
168 views

convert Pdf to Executable

1 vote
1 answer
154 views

What does this function do? Why is one of the variables unresolved?

Browse more Questions