Radare2.

5 Ways to patch binaries with Cutter.

Five methods for patching binaries using Cutter: NOP instructions, reversing jumps, editing assembly, writing bytes, and applying patches from the hex editor.

Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 2.

Continued analysis of APT33’s Dropshot malware. Automating string decryption with r2pipe, resource extraction, and completing the malware analysis with Cutter.

‘Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1’.

Analyzing APT33’s Dropshot (StoneDrill) malware using Cutter and radare2. String decryption, function analysis, and Jupyter integration for malware research.

Reversing a Self-Modifying Binary with radare2.

Analyzing a packed, self-modifying binary with radare2. Covers UPX-like packers, runtime unpacking, ESIL emulation, and debugging packed executables.

Reverse engineering a Gameboy ROM with radare2.

Reverse engineering a Gameboy ROM using radare2. Analyzing the Z80 architecture, Game Boy memory map, and solving a CTF challenge with r2.

A journey into Radare 2 – Part 2: Exploitation.

Part 2 of the radare2 tutorial series. Covers exploitation, buffer overflows, ROP chains, and writing exploits with radare2.

A journey into Radare 2 – Part 1: Simple crackme.

Step-by-step tutorial for learning radare2 by solving a simple crackme. Covers installation, basic commands, visual mode, analysis, and debugging.