delroth's blog

My notes on reverse engineering, emulation and security related topics

  • HOME
  • rss feed
Category: Windows
2010
12.13

Accèder à une ressource win32 de type StringTable en parsant un fichier PE

Category: Notes, Python, Windows / Tags: no tag / Add Comment
  • Links

    • About Me
    • Twitter (@delroth_)
  • Recent Posts

    • Boston Key Party crackme300 “hypercube” writeup
    • Wii U Bootrom “dumped” – what it means in practice
    • Why Dolphin is getting rid of asynchronous audio processing
    • Escaping a Python sandbox (NdH 2013 quals writeup)
    • GITS 2013 Writeup: MysteryBox (re300)
  • Categories

    • CTF (4)
    • DMMS (3)
    • Dolphin (1)
    • EPITA (1)
    • Hacking (15)
    • Jeux (5)
    • Non classé (2)
    • Notes (13)
    • Python (5)
    • Review (1)
    • Système (3)
    • Wii (11)
    • Windows (1)
  • Recent Comments

    • Dolphin Emulator Shown Running on Nintendo Switch | eTeknix on Reverse engineering a Wii game script interpreter, part 1
    • Dolphin Emulator Shown Running on Nintendo Switch - 1st Gamers on Reverse engineering a Wii game script interpreter, part 1
    • Safe evaluation of math expressions in pure Python on Escaping a Python sandbox (NdH 2013 quals writeup)
    • SecOverflow » Stripe CTF Writeup on My Stripe CTF writeup
    • Mehdi on Escaping a Python sandbox (NdH 2013 quals writeup)
  • Archives

    • March 2014
    • February 2014
    • July 2013
    • March 2013
    • February 2013
    • October 2012
    • March 2012
    • November 2011
    • October 2011
    • June 2011
    • April 2011
    • March 2011
    • January 2011
    • December 2010
    • October 2010
  • Meta

    • Log in
    • Entries RSS
    • Comments RSS
    • WordPress.org
© delroth's blog. Powered by WordPress and Pyrmont V2.