🔐Blog of Osanda

Security Researching and Reverse Engineering

Skip to content
  • 🏠 Home
  • 🔒 My Advisories
  • 💊 Cool Posts
    • 💉 SQLi
    • 🕷 Web App Security
    • 🛠 Tools
    • ☢ Exploits
    • 🔬 Reverse Engineering
    • 🧬 Malware Analysis
  • ☠ Shellcodes
  • ☣ About

AutoIt

  • Osanda Malith Jayathissa
  • March 4, 2016
  • 3 Comments

Reversing AutoIT Applications

When we try to open a compiled AutoIT application in a debugger we get this error message.

View post on imgur.com

Let’s try to find the return address from the MessageBoxA API from the stack.
(more…)

Share this:

  • Tweet
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to print (Opens in new window) Print
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Share on Tumblr
  • Pocket
Reversing
AutoIt, Olly, Reverse Engineering

Search

Archives

Categories

Join 4,752 other subscribers
Buy Me A Coffee

TRANSLATE

Tweets by OsandaMalith

Tags

0day AHK ARM arrays assembly AutoHotKey borland C C c/c++ Certs crackme CSRF ctf DLL Hijacking DoS EE EE 4GEE EE 4GEE Mini eLearnSecurity exploit exploit development format string game hacking HEVD kernel LFI mimikatz MS-DOS MySQL PE Pentesting PHP POST XSS Programming Reverse Engineering reversing shellcode SQLi SQL injection tools Web Application Security windows WMI XSS ZTE
  • Home
  • ☠ Shellcodes
  • ☣ About
  • 💊 Cool Posts
  • 🔒 My Advisories

Copyright © 2025 Osanda Malith Jayathissa