AccidentalRebel.com
  • Archives
  • Categories
  • Tags
  • Newsletter
  • About
Reverse Engineering

IOLI Crackme 0x02

Sat 06 March 2021

IOLI Crackme 0x02 walkthrough — computing the password via static analysis of x86 arithmetic, then confirming with dynamic analysis by stepping through IDA.

Read more →
re crackme
Tools

Introducing shcode2exe

Fri 26 February 2021

shcode2exe converts raw shellcode blobs or strings into debuggable executables targeting 32 or 64-bit Windows, with no Wine dependency when running on Linux.

Read more →
re tools malware_analysis
Reverse Engineering

IOLI Crackme 0x01

Sat 20 February 2021

IOLI Crackme 0x01 walkthrough — converting hex to decimal to find the password, plus a closer look at how arguments are passed to functions in x86 assembly.

Read more →
re crackme
Reverse Engineering

IOLI Crackme 0x00

Tue 16 February 2021

IOLI Crackme 0x00 walkthrough — finding the hardcoded password in IDA Pro and patching the binary to accept any input by changing a jz opcode to jmp.

Read more →
re crackme
CTF

Hunt the Kingdom CTF Challenge

Mon 05 October 2020

How I won the GuideM Hunt the Kingdom blue team CTF — strategy, preparation, and the high-stakes final minutes that came down to four unsolved questions.

Read more →
ctf cybersecurity
Misc

My experience with manufacturing printed circuit boards

Thu 01 October 2020

First-time experience ordering custom PCBs from PCBWay using the ESPBoy gerber files — the process, quality, and what comes next for future board designs.

Read more →
pcbs electronics
CTF

CovidScammers writeup (Defcon RTV CTF)

Thu 13 August 2020

Defcon RTV CTF writeup — reversing a Linux malware binary, bypassing ptrace anti-debugging, and recovering flags from shared memory and rootkit files.

Read more →
ctf writeup malware_analysis +1 more
Misc

Study notes: MAC Spoofing

Sat 01 August 2020

Study notes on MAC spoofing — what it is, legitimate versus illegitimate uses, and how to change your MAC address using ifconfig or macchanger on Linux.

Read more →
spoofing cybersecurity
Misc

Chicken-Scheme FFI Examples

Tue 16 June 2020

Practical Chicken Scheme FFI examples covering foreign-lambda, struct accessors, inline C code, memory management, and enum bindings for C interop.

Read more →
programming dev research +1 more
Misc

#5 - Switching from C/C++ to C

Tue 19 May 2020

Dropping C++ from my custom game engine in favor of pure C, and the cross-platform bugs that surfaced when C++ features I didn't notice were being used.

Read more →
dev game_engine
« Previous 1 2 3 4 5 6 Next »
AccidentalRebel

AccidentalRebel

Juan Karlo Licudine

Hands-on AI security. I threat model AI agents, build containment tools, track real-world attacks, and write about what I find.

  • Email
  • LinkedIn
  • GitHub

For weekly Cybersecurity x AI threat analysis subscribe below

© AccidentalRebel. Hands-on AI security. I threat model AI agents, build containment tools, track real-world attacks, and write about what I find.
  • Email
  • LinkedIn
  • GitHub