revengx.com
RevEngX.com - Reverse Engineering Extensions - Andrew L. Sandoval
http://www.revengx.com/license.html
RevEngX is an extension for the Debugging Tools for Windows, Windows Debuggers, that aids the user in Research, Reverse Engineering, finding IAT and EAT hooks, and performing Code Injection from the debugger. x86 and x64 targets are supported. RevEngX is licensed, not sold. By downloading a RevEngX module you indicate your acceptance of the following license agreement:.
instructables.com
Digital Window Sticker (Arduino Controlled)
http://www.instructables.com/id/Digital-Window-Sticker-Arduino-Controlled
Share what you make. With Instructables you can share what you make with the world, and tap into an ever-growing community of creative experts. How it Works ». New Instructable ». Digital Window Sticker (Arduino Controlled). Intro: Digital Window Sticker (Arduino Controlled). A bumper-sticker sized L.E.D. matrix that displays images in sequence from an SD card, to produce an animated sign or window sticker. Arduino controlled! Also includes Windows, Mac, . Step 1: Parts List. Step 3: Program your Arduino.
revengx.com
RevEngX.com - Reverse Engineering Extensions - Andrew L. Sandoval - Download and Install
http://www.revengx.com/download.html
RevEngX is an extension for the Debugging Tools for Windows, Windows Debuggers, that aids the user in Research, Reverse Engineering, finding IAT and EAT hooks, and performing Code Injection from the debugger. x86 and x64 targets are supported. RevEngX is licensed, not sold. By downloading a RevEngX module you indicate your acceptance of the license agreement. C: Program Files (x86) Windows Kits 10 Debuggers x64 winext. Secure Hash and Changes. For 64-bit x64/AMD64 Debugging Tools for Windows. Callfn on W...
revengx.com
RevEngX.com - Reverse Engineering Extensions - Andrew L. Sandoval - Download and Install
http://www.revengx.com/tutorial.html
Validating Installation, Selecting a Target, and Getting Help. The first thing to do is to load RevEngX, by issuing. At the debugger prompt:. If the extension was succesfully loaded you should see the license text:. If the license text was not displayed verify that you have installed RevEngX.dll in the correct winext directory for the Debugging Tools for Windows package you are using to launch windbg.exe. To obtain basic help on the extensions offered by RevEngX, issue! Allocates memory in live target, s...
revengx.com
RevEngX.com - Reverse Engineering Extensions - Andrew L. Sandoval
http://www.revengx.com/index.html
RevEngX is an extension for the Debugging Tools for Windows, Windows Debuggers, that aids the user in Research, Reverse Engineering, finding IAT and EAT hooks, and performing Code Injection from the debugger. x86 and x64 targets are supported. Callfn for calling any function in the target process with a C-like syntax for parameters and access to hundreds of common constant values as defined in SDK header files. Define constant for defining new constant numeric values that may be used in calls to!