Useful Links
Computer Science
Cybersecurity
Reverse Engineering
1. Foundations of Reverse Engineering
2. Prerequisite Knowledge
3. Software Reverse Engineering
4. Hardware Reverse Engineering
5. Applications and Specializations
6. Anti-Reverse Engineering Techniques
7. Essential Tools and Techniques
Anti-Reverse Engineering Techniques
Code Obfuscation Methods
Control Flow Obfuscation
Control Flow Flattening
Opaque Predicates
Bogus Control Flow
Data Obfuscation
String Encryption
Constant Hiding
Data Structure Obfuscation
Instruction-Level Obfuscation
Instruction Substitution
Dead Code Insertion
Equivalent Instruction Replacement
Packing and Encryption
Executable Packing
Compression-Based Packers
Encryption-Based Packers
Multi-Layer Packing
Runtime Decryption
Self-Decrypting Code
Key Derivation Methods
Decryption Triggers
Virtual Machine Protection
Custom Virtual Machines
Bytecode Translation
VM-Based Obfuscation
Anti-Debugging Techniques
Debugger Detection Methods
API-Based Detection
Timing-Based Detection
Hardware-Based Detection
Debug Prevention
Exception Handling Abuse
Thread Local Storage Tricks
Process Environment Block Manipulation
Dynamic Anti-Debugging
Runtime Debugger Checks
Breakpoint Detection
Single-Step Detection
Anti-Disassembly Techniques
Disassembly Confusion
Overlapping Instructions
False Disassembly
Jump Table Obfuscation
Self-Modifying Code
Runtime Code Generation
Polymorphic Code
Code Mutation
Indirect Control Flow
Function Pointer Obfuscation
Return Address Manipulation
Computed Jumps
Anti-Analysis Environment Detection
Virtual Machine Detection
Hardware Fingerprinting
Timing Discrepancies
VM-Specific Artifacts
Sandbox Detection
Environment Profiling
User Interaction Checks
File System Artifacts
Analysis Tool Detection
Process Enumeration
Window Detection
Registry Key Monitoring
Countermeasures and Bypass Techniques
Unpacking Methods
Manual Unpacking
Automated Unpacking Tools
Generic Unpacking Techniques
Deobfuscation Strategies
Pattern Recognition
Symbolic Execution
Dynamic Analysis Approaches
Anti-Anti-Debugging
Debugger Hiding Techniques
Detection Routine Patching
Environment Simulation
Analysis Environment Hardening
VM Detection Evasion
Sandbox Evasion
Tool Signature Hiding
Previous
5. Applications and Specializations
Go to top
Next
7. Essential Tools and Techniques