struct Reverser {
char *name;
char *tools[6];
char *focus;
char *fun_fact;
};
struct Reverser me = {
.name = "Esmil",
.tools = { "IDA Pro", "x64dbg", "gdb/pwndbg",
"Python", "C", "Linux" },
.focus = "Reverse Engineering",
.fun_fact = "Started with C, ended up reading raw assembly ๐"
};- ๐ฌ My focus: Reverse Engineering โ binaries, malware, CTFs
- ๐ ๏ธ Static analysis: IDA Pro is home
- ๐ Dynamic analysis: x64dbg on Windows, gdb/pwndbg on Linux
- ๐ Scripting: Python for automation and exploit dev
- ๐ Source reading: C โ when you can read source, you read faster
- ๐ง Main env: Linux, always
- โก Fun fact: The best documentation is the disassembly itself
|
|
# My daily life
while True:
binary = load_binary("unknown.exe")
try:
secrets = reverse(binary)
print(f"Got it: {secrets} ๐")
except ConfusedByObfuscation as e:
print(f"They tried: {e}")
drink_coffee()
open_ida()
continue # back to the disassembly
if make_sense_of_it_all():
print("If the disassembly makes sense, the day was worth it ๐ฌ")- ๐ My debugging: Works best at 3 AM with coffee and IDA open
- ๐ Assembly: Once you read enough of it, C looks like poetry
- ๐ Static analysis: I read binaries the way others read books
- โ Coffee: The only dependency I don't reverse
- ๐ฅ Segfaults: Old friends โ they always teach you something
- ๐ Docs: Who needs docs when you have strings and xrefs?
- ๐ฎ Breaks: Gaming โ and occasionally reversing the game itself




