How to Modify or Patch the Compiled Executable (inplace, reverse engineering)? October 6, 2023 assembly language, c / c++, Reverse Engineering No Comments I have a compiled .o file, and how to modify a string constant in it? for example, change “hello” to “HELLO”. Let’s take a look at this simple C … [Continue Reading...]
How to View the Byte Code (Dis-assembler) of a Compiled Executable? October 3, 2023 assembly language, debug, Reverse Engineering No Comments To view the bytecode of a compiled executable, you can follow these steps: Compile the C source code to generate an executable file with debugging information using the -g … [Continue Reading...]