I'm an experienced Reverse Engineer with a passion for Game and Software Protections, I love understanding complex systems and breaking their protections.
I'm an experienced Reverse Engineer with a passion for Game and Software Protections, I love understanding complex systems and breaking their protections. Looking for freelance projects on malware & software analysis and work with great companies.
This article describes how to research a game protocol in order to create a private server for any computer game. The game described is Worms World Party
See PublicationThis article desribes how the networking protocol encryption of Worms World Party works
See PublicationThis article describes the networking protocol used in the game Worms World Party, along with its important commands, in order to emulate the server.
See PublicationThis article describes the analysis of Red Alert 2 and how to reverse a game or big software without symbols in the right way and how to use the things researched for write a trainer to add features the game doesn't have.
See PublicationSometimes protections can break the decompilers so it would be harder to understand the code. This article describes how to restore the OEP of visual basic 6 so decompilers can open the file in decompiler to view the code.
See PublicationThis is an article on the solutions of the Shabak research challenges
See PublicationThis is an article on the solutions of the Mossad challenge the article is published after the challenge has been closed
See PublicationThis is an article on the solutions of the Shabak development challenges
See PublicationWriteUp about the cyber challenge capture the flag competition that was built by ofek (an air force unit).
See PublicationThis is an article on the solutions of the Mossad challenge the article is published after the challenge has been closed
See Publication On July 28, someone hacked to a well-known YouTuber.
In this article, I explain how the malware works and bypassed the anti-virus.
This is a malware written in python that called CryPy
See PublicationCryptowall 3 is a type of ransomware This article describes how the protections of Cryptowall 3 work to prevent the researcher from reversing the malware and gives an overview of how the malware works.
See Publication