Background

Blog

20 Articles
38 Tags
Updated Monthly

Articles about reverse engineering and offensive security research

Suppose you want to reverse-engineer some of Darwin's binary source code. I want to show you the technique I used to find the binary source code quickly.