{"id":326,"date":"2006-08-29T21:24:52","date_gmt":"2006-08-30T04:24:52","guid":{"rendered":"http:\/\/multimedia.cx\/eggs\/openrce\/"},"modified":"2006-08-29T21:24:52","modified_gmt":"2006-08-30T04:24:52","slug":"openrce","status":"publish","type":"post","link":"https:\/\/multimedia.cx\/eggs\/openrce\/","title":{"rendered":"OpenRCE"},"content":{"rendered":"<p>Pursuant to my last post of <a href=\"http:\/\/multimedia.cx\/eggs\/black-box-re\/\">black box reverse engineering<\/a>, a piece of sliverware (hi spoon!) emailed me and tipped me off to various programs hosted at a site called <a href=\"http:\/\/www.openrce.org\/\">OpenRCE<\/a>. The RCE stands for reverse code engineering. Nice logo, too:<\/p>\n<p><center><br \/>\n<a href=\"http:\/\/www.openrce.org\/\"><img decoding=\"async\" src=\"\/eggs\/images\/openrce-logo.png\" alt=\"OpenRCE logo\" \/><\/a><br \/>\n<\/center><\/p>\n<p>I do appreciate it when people clue me into other resources out there dedicated to the fine art of reverse engineering. The articles and utilities hosted at OpenRCE appear to be a little more focused towards understanding malware which is a domain with somewhat different characteristics than multimedia, but certainly no less challenging.<\/p>\n<p>In particular, my attention was directed to a Python-based RE framework called <a href=\"http:\/\/www.openrce.org\/downloads\/details\/208\/PaiMei\">Pai Mei<\/a> as well as another tool named Process Stalker.<\/p>\n<p>Related post:<\/p>\n<ul>\n<li><a href=\"http:\/\/multimedia.cx\/eggs\/black-box-re\/\">Black Box Reverse Engineering<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Pursuant to my last post of black box reverse engineering, a piece of sliverware (hi spoon!) emailed me and tipped me off to various programs hosted at a site called OpenRCE. The RCE stands for reverse code engineering. Nice logo, too: I do appreciate it when people clue me into other resources out there dedicated [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-326","post","type-post","status-publish","format-standard","hentry","category-reverse-engineering"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts\/326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/comments?post=326"}],"version-history":[{"count":0,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts\/326\/revisions"}],"wp:attachment":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/media?parent=326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/categories?post=326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/tags?post=326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}