<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Reverse-Engineering on MrAzoth</title>
    <link>https://az0th.it/tags/reverse-engineering/</link>
    <description>Recent content in Reverse-Engineering on MrAzoth</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 12 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://az0th.it/tags/reverse-engineering/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>A Kinder Russian Roulette — Encryption Practice</title>
      <link>https://az0th.it/projects/russian-roulette/</link>
      <pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/projects/russian-roulette/</guid>
      <description>Six chambers, six encryption/obfuscation methods. A CTF-style tool for practicing Ghidra analysis and decryption routine writing — from XOR to AES-256 CBC to UUID obfuscation.</description>
    </item>
    <item>
      <title>Backdooring PuTTY — PE Injection &amp; C2 Beacon Delivery</title>
      <link>https://az0th.it/projects/backdooring-putty/</link>
      <pubDate>Sun, 08 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/projects/backdooring-putty/</guid>
      <description>Manual PE backdooring from scratch: code cave injection, new section addition, XOR evasion, and Adaptix C2 beacon delivery inside a legitimate PuTTY binary.</description>
    </item>
    <item>
      <title>Walking the PE — Static Analyzer &amp; PEB Walker</title>
      <link>https://az0th.it/projects/walking-the-pe/</link>
      <pubDate>Fri, 06 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/projects/walking-the-pe/</guid>
      <description>Deep dive into the Windows PE file format and runtime process inspection via PEB walking — parsing headers, import/export tables, and the loader module list.</description>
    </item>
    <item>
      <title>IP Camera A-CW2303C-M — Hardware &amp; Firmware Analysis</title>
      <link>https://az0th.it/projects/ipcam-acw2303c/</link>
      <pubDate>Thu, 12 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/projects/ipcam-acw2303c/</guid>
      <description>Full hardware-level engagement on an IP PTZ camera: SPI flash dump, filesystem extraction, and manual static analysis revealing 8 vulnerabilities — including two critical RCE.</description>
    </item>
  </channel>
</rss>
