About 50 results
Open links in new tab
  1. How do I work out the Ultranet protocol? - Reverse Engineering Stack ...

    Sep 14, 2015 · Ultranet is a audio protocol that allows low latency audio with many channels to be transmitted over standard Ethernet cables. For instance you might have a Midas sound desk …

  2. What is this file format? First byte 0x04, found in Macintosh ...

    Oct 26, 2024 · You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I …

  3. User tuck1s - Reverse Engineering Stack Exchange

    Q&A for researchers and developers who explore the principles of a system through analysis of its structure, function, and operation

  4. unable to inject into com.apple.springboard

    Dec 29, 2025 · iPhone 6SP, iOS 15.8.5, palera1n + Ellekit, rootful , unable to i nject into com.apple.springboard. The same code works on iOS 12. Why is this happening?

  5. c - How to reconstruct `DecryptPak ()` decryption logic from IDA ...

    Jul 25, 2025 · I'm reverse engineering a game's .pak file format and trying to reconstruct its decryption process in C or Python. Here’s what I extracted from IDA pseudocode. The function DecryptPak() …

  6. ELF binary injection - Reverse Engineering Stack Exchange

    Nov 28, 2020 · I am currently working on an ELF-injector and my approach is standard: find code cave (long enough sequence of 0's), rewrite it with the instructions I want to execute and then jump back …

  7. How to get root access on Linux embedded system?

    Jul 1, 2021 · The usbboot option also seems promising. If you can find an image to boot, you could boot from USB and basically use the booted system to flash a fresh system, even backup the old one. If …

  8. Extracting ARM Boot zImage - Reverse Engineering Stack Exchange

    Jan 4, 1970 · I'm trying to analyze the firmware of a system running Linux and connecting various home automation and security devices. Every time it boots, the GM8125 processor running ARMv5TE …

  9. Visualizing ELF binaries - Reverse Engineering Stack Exchange

    Aug 5, 2014 · Thanks for your reaction! In your 2008 paper you mention platform independent versions as "future work" (p. 8). Were you able to pursue this any further, or is the download still the canonical …

  10. encryption - Figuring out the algorithm for an NFC reader, which ...

    Sep 4, 2023 · I have two NFC readers, reader A reads card ID numbers according to the ISO standard and the algorithm is publicly available. Reader B is from a Canon printer. The card numbers read by …