Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
reverse-engineering
gdb
windbg
ida-plugin
android-security
frida
idapython
radare2
cuckoo
angr
x64dbg
idapro
dynamorio
binaryninja
binnavi
apk-analysis
intelpt
ghidra
-
Updated
Sep 1, 2021


pdgsddoes not seem to processPUSH EBPvery well, the p-code semantics show up aswhich doesn't make sense. Last line should be
STORE ram[ESP] = (unique,0x12f0,4)the raw p-code will show you:
STORE (const,0x55fef11636d0,8) (register,ESP,4) (unique,0x1b50,4)and the