[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: Photos_G8tOnXZJEA.png (703 KB, 1157x606)
703 KB PNG
How the heck do I find a specific call (like a value comparison) in a reversed engineered app's assembly with x64dbg?

It's getting too similar to look at assembly ¬_¬
>>
File: 1740712817740973.png (237 KB, 980x750)
237 KB PNG
>>108803249
>It's getting too similar to look at assembly ¬_¬
that's because it IS assembly dumb cunt
>also
if you don't like staring at ASM. Then download ghidra and get to it
>>
>>108803249
>call?
Depends, comparisons are done with cmp, or test, but you are probably looking for a memory comparison. IDK. Also a comparison can be any registers against any other register or memory operand, or immediate value.
>>
>>10880324
just use ghidra
>>
>>108803249
I feed all this crap into claude and it finds what I'm looking for then I change it
>>
>>108803249
use ghidra/ida.
you can scan for instruction patterns and it shows xrefs by default

unless you pay for ida's cloud there's not much reason to use it over ghidra.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.