Get Mystery Box with random crypto!

r0 Crew (Channel)

Logo of telegram channel r0_crew — r0 Crew (Channel) R
Logo of telegram channel r0_crew — r0 Crew (Channel)
Channel address: @r0_crew
Categories: Technologies
Language: English
Subscribers: 7.25K
Description from channel

Security Related Links:
- Reverse Engineering;
- Malware Research;
- Exploit Development;
- Pentest;
- etc;
Join to chat: @r0crew_bot 👈
Forum: https://forum.reverse4you.org
Twitter: https://twitter.com/R0_Crew

Ratings & Reviews

2.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

1

3 stars

1

2 stars

0

1 stars

1


The latest Messages 17

2021-01-20 10:37:01 How to use Ghidra to Reverse Engineer Mobile Application https://medium.com/bugbountywriteup/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa #reverse #android #ghidra #newbie #dukeBarman
3.4K views07:37
Open / Comment
2021-01-18 14:37:02 Escaping VirtualBox 6.1: Part 1 https://secret.club/2021/01/14/vbox-escape.html #reverse #exploitation #dukeBarman
3.7K views11:37
Open / Comment
2021-01-15 13:37:00 xnu_gym is a pongoOS module that patches XNU to reintroduce previously known and patched vulnerabilities https://github.com/tjkr0wn/xnu_gym #reverse #ios #exploitation #dukeBarman
4.3K views10:37
Open / Comment
2021-01-15 10:37:00 MASM32 Code collection for reverse engineers https://github.com/Xyl2k/Xylitol-MASM32-snippets #reverse #asm #dukeBarman
3.8K views07:37
Open / Comment
2021-01-14 13:37:00 lst2x64dbg was updated. Now it works with IDA, Ghidra, Binary Ninja, Relyze files, export x64dbg database and radare2 https://github.com/utkonos/lst2x64dbg #reverse #ida #ghidra #binaryninja #radare2 #dukeBarman
3.7K views10:37
Open / Comment
2021-01-13 10:30:16 IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature

#reverse #ida #dukeBarman
3.9K views07:30
Open / Comment