Looks Like This Service Is On Hold
I will reverse engineer your windows or linux binary
Morocco
Reverse Engineer and Ethical Hacker
About this Gig
Contact me before ordering to discuss your binary, confirm you own it or have explicit permission, and clarify goals like behavior analysis or function mapping.
I'll load it into tools like Ghidra or IDA Pro, disassemble code, identify key functions, extract strings/IoCs, and map control flow. Once you contact me, we can figure out a solution to your use case for reverse engineering the program.
English explanations of what it does, plus recommendations if it's suspicious. No unauthorized access or cracking, strictly authorized RE for your assets.
FAQ
What formats and architectures do you support?
I handle common PE and ELF binaries on x86/x64, and can discuss other architectures (ARM, MIPS) with you before you order.
Can you find vulnerabilities in the binary?
Yes, as part of the analysis I can highlight potential vulnerabilities or insecure patterns and include them in the report, as long as the testing is authorized.
What happens if the binary is too complex for the chosen package?
I’ll tell you after the initial review and either adjust scope, suggest a higher package, or cancel if it can’t be done within your budget and timeline.

