<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>IAT Patcher - new tool for easy API hooking</title>
                            <pubDate>Wed, 24 Sep 2014 15:37:26 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/5103/IAT_Patcher_-_new_tool_for_easy_API_hooking</link>
                                        <author>hasherezade &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Wanna see how easy and fast API hooking can be?&lt;br /&gt;
Please have a look and share your opinions:&lt;br /&gt;
&lt;a href=&quot;http://hasherezade.net/IAT_patcher/&quot;&gt;IAT Patcher&lt;/a&gt;</description>
                    </item>
                <item>
            <title>Andromeda (W32/Kryptik.AX!tr) - analysis of the malware</title>
                            <pubDate>Sat, 24 Aug 2013 16:12:12 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/4695/Andromeda_(W32/Kryptik.AX!tr)_-_analysis_of_the_malware</link>
                                        <author>hasherezade &lt;email-suppressed@example.com&gt;</author>
                                                    <description>The object of the analysis is a cryptor of MMS malware (called W32/Kryptik.AX!tr by Fortinet, aka Andromeda).&lt;br /&gt;
The malware apeared few moths ago in Poland.It have various mutations, carying a various payload.&lt;br /&gt;
In this document, I will explain the common elements and mechanisms used in the cryptor. &lt;br /&gt;
Link:&lt;br /&gt;
&lt;a href=&quot;http://hasherezade.net/malware/andromeda&quot;&gt;http://hasherezade.net/malware/andromeda&lt;/a&gt;</description>
                    </item>
                <item>
            <title>PE-bear - a new PE files reversing tool</title>
                            <pubDate>Tue, 09 Jul 2013 09:54:39 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/4667/PE-bear_-_a_new_PE_files_reversing_tool</link>
                                        <author>hasherezade &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Hi! Today I would like to introduce my new project  PE-bear. In short words  it is a viewer/editor for PE32 and PE64 files. You may ask  why the hell another PE reversing tool? Well, I started developing it just for myself and for my friends, involved in malware analysis  due to the fact that existing tools were not matching all our needs. The tool grown, so now I decided to share it with the world, with the hope (but no warranty) that You also will find it useful.&lt;br /&gt;
The latest version is 0.2.0 (beta)&lt;br /&gt;
&lt;br /&gt;
More details you can find here:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://hshrzd.wordpress.com/pe-bear/&quot;&gt;PE-bear&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Special thanks goes to Sfires, for hosting the project and supporting the full development process.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
- handles PE32 and PE64&lt;br /&gt;
- views multiple files in parallel&lt;br /&gt;
- recognizes known packers (by signatures)&lt;br /&gt;
- fast disassembler  starting from any chosen RVA/File offset&lt;br /&gt;
- visualization of sections layout&lt;br /&gt;
- selective comparing of two chosen PE files&lt;br /&gt;
- integration with explorer menu&lt;br /&gt;
- and more&lt;br /&gt;
</description>
                    </item>
                <item>
            <title>Keygen for CONfidence2012 ESET CrackMe</title>
                            <pubDate>Thu, 19 Jul 2012 00:41:37 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/2262/Keygen_for_CONfidence2012_ESET_CrackMe</link>
                                        <author>hasherezade &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Hi,&lt;br /&gt;
last time I published a solution for ESET Crackme 2012. However, some people were interested how to keygen it. If you also are, be my guest: &lt;a href=&quot;http://hshrzd.wordpress.com/2012/07/08/keygenning-esets-confidence-2012-crackme/&quot;&gt;http://hshrzd.wordpress.com/2012/07/08/keygenning-esets-confidence-2012-crackme/&lt;/a&gt;</description>
                    </item>
                <item>
            <title>Solution to CONfidence2012 ESET CrackMe</title>
                            <pubDate>Sun, 03 Jun 2012 08:12:26 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/2172/Solution_to_CONfidence2012_ESET_CrackMe</link>
                                        <author>hasherezade &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Hi, recently i placed on my blog a solution to the CONfidence2012 CrackMe. If anyone interested, You are welcome!&lt;br /&gt;
&lt;a href=&quot;http://hshrzd.wordpress.com/2012/05/29/solving-esets-confidence-2012-crackme/&quot;&gt;http://hshrzd.wordpress.com/2012/05/29/solving-esets-confidence-2012-crackme/&lt;/a&gt;</description>
                    </item>
            </channel>
</rss>
