The Decompiler's Digest
posts /
2025
  • Reverse Your First Binary: A Ghidra vs. IDA Pro Guide
    A hands-on guide for beginners to reverse engineering. We compare Ghidra and IDA Pro by analyzing and patching a simple binary from start to finish.
  • How to Find Vulnerabilities in IoT Binaries After Extraction
    A step-by-step guide for security researchers on performing static and dynamic binary analysis of IoT firmware to discover and exploit vulnerabilities.
  • From Fuzzing to Shellcode: An Advanced Buffer Overflow Guide
    Master advanced buffer overflow exploitation with this step-by-step guide. Learn fuzzing, finding offsets, handling bad characters, and crafting shellcode to gain a shell.
  • Lockpicking for Pentesters: Your First Physical Bypass Guide
    Demystify the art of lockpicking and physical bypass techniques essential for modern penetration testers and red team engagements. Learn fundamental concepts, necessary tools, and ethical considerations for assessing physical security.
  • Building a Simple ML Model to Detect Obfuscated Malware
    A step-by-step guide to building and comparing Random Forest and CNN models for detecting obfuscated malware using memory-based features.
  • A Practical Guide to Extracting and Analyzing IoT Firmware
    Learn the essential techniques for IoT hacking, from firmware extraction and static analysis with Ghidra to dynamic analysis and reverse engineering embedded device communication.
  • How to Find and Exploit a Simple Buffer Overflow Vulnerability
    A step-by-step tutorial for beginners on finding, understanding, and exploiting a classic stack-based buffer overflow vulnerability in a simple C program.
© 2025 • The Decompiler's Digest
Projects About Us Contact Privacy Policy Terms of Use
Press Esc or click anywhere to close