Cybersecurity professional with an interest/background in networking. Beginning to delve into binary exploitation and reverse engineering.

  • 0 Posts
  • 3 Comments
Joined 1 year ago
cake
Cake day: March 27th, 2024

help-circle

  • This cleared up my confusion, thanks!

    I’m familiar with reveng from a malware and security testing point of view, using tools like IDA, Binja, Ghidra, etc., so I was aware that decompilers are taking the compiled assembly instructions, then recreating Intermediate Language and pseudo-C stuff without debugging info or original function names and stuff, but I was missing the key point of game assets not being distributable.