View Full Version : Blogs Forum
- Beware of stack usage with the new network stack in Windows Vista (0 replies)
- Activating process servers and connecting to them (0 replies)
- Remote debugging with process servers (dbgsrv) (0 replies)
- Reverse debugging -server and -remote (0 replies)
- Win32 calling conventions: __thiscall in assembler (0 replies)
- Overview of WinDbg remote debugging (0 replies)
- Win32 calling conventions: __stdcall in assembler (0 replies)
- Win32 calling conventions: Concepts (0 replies)
- Remote debugging with kdsrv.exe (0 replies)
- Remote debugging review (0 replies)
- Win32 calling conventions: __fastcall in assembler (2 replies)
- Ollydbg v1.10 and 6E/6F/A6 opcodes, a little oversight (1 replies)
- Securing -server and -remote remote debugging sessions (0 replies)
- Remote debugging with -server and -remote (0 replies)
- Remote debugging with KD and NTSD (0 replies)
- Remote debugging with remote.exe (0 replies)
- Win32 calling conventions: Usage cases (0 replies)
- Win32 calling conventions: __cdecl in assembler (0 replies)
- Tracing Over System Calls In OllyDbg (16 replies)
- DynLogger (13 replies)
- Some functions are neater than the decompiler thinks (0 replies)
- Self-modifying TLS callbacks (4 replies)
- Symbian debugger (0 replies)
- Trojan-PSW.Win32.OnLineGames.eos Reversing (0 replies)
- Compiler 1, X86 Virtualizer 0 (2 replies)
- IDA disasms reserved opcodes, is it a bug? (3 replies)
- Weird export forwarding thanks to Vista x64 SP1 (3 replies)
- Symbian AppTRK (0 replies)
- Inside Session 0 Isolation and the UI Detection Service - Part 2 (0 replies)
- Process Memory Dumper for Credentials Disclosure Vulns (2 replies)
- Cross Your T's and Dot Your Filenames (0 replies)
- Hello Symbian! (0 replies)
- (Part 2 of .NET native exe insights)Serial fishing and patching .NET exes with Ollydb (9 replies)
- Rebuilding native .NET exes into managed .NET exes by Exploiting lefotver IL... (6 replies)
- Some Quick Insights Into Native .NET exe's (part 1 of?) (7 replies)
- Reverse Engineering Position- TS/SCI Required (12 replies)
- Symbol Type Viewer 32Bit/64Bit v1.0.0.3 (1 replies)
- Non-continuable exception trick (1 replies)
- Inside Session 0 Isolation and the UI Detection Service - Part 1 (0 replies)
- Something different part 2 (0 replies)
- New Hex-Rays Demo (1 replies)
- Different versions of Windows kernel structures (1 replies)
- gee mail patented algorithm (2 replies)
- Pythonic way (4 replies)
- Working? with protected processes in NT 6 (0 replies)
- Alignment check (0 replies)
- Re: RtlRemoteCall (0 replies)
- hm (0 replies)
- Running Win32 program ASAP after Nt boot (0 replies)
- Microsoft's Rich Signature (undocumented) (32 replies)
- Tricky jump tables (0 replies)
- Reverse Engineering the flash virtual machine (3 replies)
- Collaborative RCE Tool Library (CRCETL) site update (1 replies)
- Two Extensions added into Collaborative RCE (2 replies)
- Why does every heap trace in UMDH get stuck at "malloc"? (0 replies)
- SoftICE Installation. (23 replies)
- Easy structure types (0 replies)
- Eeye BinDiffing Trick (3 replies)
- Industrial-Grade Binary-Only Profiling and Coverage (1 replies)
- Refreshing the Taskbar Notification Area (3 replies)
- Idc script and stack frame variables length (0 replies)
- Shellcode Analysis (0 replies)
- SpyShredder Malware Spammed on OpenRCE (0 replies)
- Array Indexing Quirk (0 replies)
- MRXDAV.SYS and Hex-Rays Decompiler (0 replies)
- Shellcoding on Windows: Part II - Stack Overflow Problems (1 replies)
- Updated ExtraPass plug-in 2.1, and APIScan (2 replies)
- dr7.gd on mp systems running sice (5 replies)
- PE Validator Script (2 replies)
- Thread Optimization Checks : Code Prominence (0 replies)
- Run-time determination of VC++ virtual member function addresses: Take II (3 replies)
- Immunity Debugger v1.4 (0 replies)
- Debugger and process memory (0 replies)
- KeGetCurrentIrql can't return HIGH_LEVEL (6 replies)
- aMSN Input Validation Error (2 replies)
- Direct3D 9 Hook v1.1 (3 replies)
- Jump tables (0 replies)
- Something different (0 replies)
- Shellcoding on Windows: Part I (0 replies)
- ActiveX - Active Exploitation (0 replies)
- Context-keyed Payload Encoding (0 replies)
- Improving Software Security Analysis using Exploitation Properties (0 replies)
- An Objective Analysis of the Lockdown Protection System for Battle.net (0 replies)
- FPU Tracer v0.0.1 released (0 replies)
- .NET unpackme (3 replies)
- softice nmi hook (4 replies)
- ScTagQuery: Mapping Service Hosting Threads With Their Owner Service (2 replies)
- Virtual Machine detection method cd. (0 replies)
- Old new Virtual Machine detection method. (0 replies)
- Compiler Optimizations Regarding Structures (0 replies)
- HP printer and cpu at 100% (4 replies)
- Binary Search in Large-Scale Structure Recovery (0 replies)
- Again on Visual Basic (0 replies)
- GUID-Finder IDA Plug-in (0 replies)
- Explorer Suite III (CFF Explorer VII) (7 replies)
- Reversity Speech and Logs Available (10 replies)
- Control Flow Deobfuscation Part 1 (4 replies)
- Dvd movie and easter egg (7 replies)
- A catalog of NTDLL kernel mode to user mode callbacks, part 5: KiUserCallbackDispatch (0 replies)
- Thread Local Storage, part 2: Explicit TLS (0 replies)
- Thread Local Storage, part 3: Compiler and linker support for implicit TLS (0 replies)
- Thread Local Storage, part 4: Accessing __declspec(thread) data (0 replies)
- Thread Local Storage, part 5: Loader support for __declspec(thread) variables (proces (0 replies)
- Thread Local Storage, part 6: Design problems with the Windows Server 2003 (and earli (0 replies)
- Thread Local Storage, part 7: Windows Vista support for __declspec(thread) in demand (0 replies)
- Thread Local Storage, part 8: Wrap-up (0 replies)
- How does one retrieve the 32-bit context of a Wow64 program from a 64-bit process on (0 replies)
- Viridian guest hypercall interface published (0 replies)
- Why are certain DLLs required to be at the same base address system-wide? (0 replies)
- A catalog of NTDLL kernel mode to user mode callbacks, part 1: Overview (0 replies)
- A catalog of NTDLL kernel mode to user mode callbacks, part 2: KiUserExceptionDispatc (0 replies)
- A catalog of NTDLL kernel mode to user mode callbacks, part 3: KiUserApcDispatcher (0 replies)
- A catalog of NTDLL kernel mode to user mode callbacks, part 4: KiRaiseUserExceptionDi (0 replies)
- Thread Local Storage, part 1: Overview (0 replies)
- The optimizer has different traits between the x86 and x64 compilers (0 replies)
- Compiler tricks in x86 assembly: Ternary operator optimization (0 replies)
- A catalog of NTDLL kernel mode to user mode callbacks, part 6: LdrInitializeThunk (13 replies)
- Reversing the V740, part 4: Implementing a solution (4 replies)
- Common WinDbg problems and solutions (0 replies)
- Fast kernel debugging for VMware, part 1: Overview (0 replies)
- Fast kernel debugging for VMware, part 2: KD Transport Module Interface (0 replies)
- Fast kernel debugging for VMware, part 3: Guest to Host Communication Overview (0 replies)
- Fast kernel debugging for VMware, part 5: Bridging the Gap to DbgEng.dll (0 replies)
- Fast kernel debugging for VMware, part 6: Roadmap to Future Improvements (0 replies)
- VMKD 1.1.1.7 released (0 replies)
- I tend to prefer debugging with release builds instead of debug builds. (0 replies)
- The default invalid parameter behavior for the VC8 CRT doesnâ??t break into the debug (0 replies)
- Why doesn't the publicly available kernrate work on Windows x64? (and how to fix it (0 replies)
- Reversing the V740, part 1: Rationale (0 replies)
- Reversing the V740, part 2: Digging deeper: The connection manager software (0 replies)
- Reversing the V740, part 3: The V740 abstraction layer module (0 replies)
- Fast kernel debugging for VMware, part 4: Communicating with the VMware VMM (0 replies)
- More packer analysis (0 replies)
- Packer analysis (1 replies)
- Debugging a custom unhandled exception filter (0 replies)
- Collaborative RCE Tool Library contents so far (7 replies)
- ImageRemCert - Removes certificate from PE image. (4 replies)
- CommWarrior.B Thorough IDB (ARM/C++) (1 replies)
- MemInfo: Peer Inside Memory Manager Behavior on Windows Vista and Server 2008 (12 replies)
- dr7.gd - dr6 saving (4 replies)
- Better user interface for decompiler (3 replies)
- The Windows Vista Issue (23 replies)
- Weird Code: CCs On The Stack (0 replies)
- Windbg “dt” output converter (5 replies)
- MmGetSystemRoutineAddress : forwards on vista (11 replies)
- Traversing Offset Semantics : Walking Along the Curb (2 replies)
- The Collaborative RCE Tool Library (1 replies)
- syscall fuzzer (0 replies)
- The secret project finally revealed... (1 replies)
- Site Relaunch (3 replies)
- A framework to take the tedium out of code-injection in C++ (3 replies)
- Beware of int 2c instruction (3 replies)
- IDC scripting a Win32.Virut variant - Part 1 (4 replies)
- IDC scripting a Win32.Virut variant - Part 2 (11 replies)
- Nanomites by Deroko (0 replies)
- Hang problem due to Hooking Curb in Codes. (0 replies)
- Vaughn Of The Dead Pt III: Some small-fry (0 replies)
- Armadillo, Nanomites and vectored exception-handling (8 replies)
- Recent Events (0 replies)
- Update on Driver Signing Bypass (0 replies)
- Windows Vista 64-bit Driver Signing/PatchGuard Workaround (0 replies)
- Behind Windows x64's 44-bit Virtual Memory Addressing Limit (0 replies)
- Purple Pill: What Happened (0 replies)
- Secrets of the Application Compatilibity Database (SDB) - Part 4 (0 replies)
- Why Protected Processes Are A Bad Idea (3 replies)
- New Object Manager Filtering APIs (0 replies)
- Vista DRM Issue Aftermath (0 replies)
- Rebooting from Kernel Mode (0 replies)
- How I cracked the iTunes 7 DRM, Pt V (7 replies)
- Run-time determination of VC++ 2005 virtual member function addresses (0 replies)
- RCE essentials: PEiD (0 replies)
- Case study: Fraps (0 replies)
- How I cracked the iTunes 7 DRM, Pt III (0 replies)
- DLL injection via CreateRemoteThread (0 replies)
- Drawing on another Direct3D program's viewport (1 replies)
- Bypassing IsDebuggerPresent (3 replies)
- How I cracked the iTunes 7 DRM, Pt I (0 replies)
- How I cracked the iTunes 7 DRM, Pt II (0 replies)
- How I cracked the iTunes 7 DRM, Pt IV (3 replies)
- RDP Botnets : Malware Google Dorking - Not an Easy Task (0 replies)
- Is Win32 A Debugging API? If Not, How Close Is It? (11 replies)
- Reversing a ZLib-Obfuscated? Network Protocol (0 replies)
- Exploring Protocols 2: Writing some tools (0 replies)
- Exploring Protocols - Part 1 (0 replies)
- MITMing an SSLized Java App (0 replies)
- Analyzing Mac OS X Applications 101: CrashReporter and Malloc (0 replies)
- Refreshing Change Of Pace: Actual Technical Discussions at Nate's Blog (0 replies)
- Mystery Vulnerability Theater 3000: Part I (0 replies)
- ridiculous_fish Open-Sources HexFiend! (0 replies)
- BinNavi Traces IOS and ScreenOS. It's On, Yo. (0 replies)
- Experimenting with IDA 5.2's scriptable debugger (2 replies)
- Undocumented Windows 2000 Secrets - free pdf edition (0 replies)
- Auditing Oracle with Cesar Cerrudo (0 replies)
- PaiMei / PIDA Fun (0 replies)
- Breaking in DAV RPC INTERFACE : Peripherals (0 replies)
- Decompiler output ctree (0 replies)
- Intrinsic "_ReturnAddress()" C/C++ WTF! (1 replies)
- New face and new concept for the Reverse Code Engineering Video Portal (2 replies)
- Small PyDBG Enhancements Incoming (0 replies)
- Packet Sniffing With ImmunityDebugger (0 replies)
- Grey Box Web Application Testing With Immunity Debugger (0 replies)
- Visual Patterns for File Format Fuzzing (0 replies)
- Reliability of Pseudo Registers in Bug Tracking (0 replies)
- Python + Microsoft Minidumps (0 replies)
- Dissecting Windows XP Svchost Internals : Traversing Core Parameters (0 replies)
- Stack Unwinding : Reliability Panorama (0 replies)
- An "extra pass" for IDA Pro (2 replies)
- Hardware Breakpoints : Stature (0 replies)
- Comming soon! Uber process hooking/detour system! (3 replies)
- My Training Class (0 replies)
- Vista Heap, Controlling the Determinism. (0 replies)
- For those who miss it: Immunity Debugger v1.2 Release (0 replies)
- Immunity Debugger v1.1 Release (0 replies)
- Updated APIScan (1 replies)
- Embedded Portable Executable File (0 replies)
- Real Time Tracing (0 replies)
- My first entry (0 replies)
- Another IDA script: Dump section (0 replies)
- Assembly Custom GetProcAddress (0 replies)
- IDA's .IDS Files Part I (0 replies)
- IDA's .IDS Files Part II (0 replies)
- ProcDump Thorough IDB (0 replies)
- T2 2006 VM Analysis (0 replies)
- Syscall lister (0 replies)
- Mysteries of win32k & GDI - Win32Thread (0 replies)
- Null pointer dereference in win32k (0 replies)
- Immunity Debugger is now released! (0 replies)
- Immunity Debugger Plugin Awards (0 replies)
- Dancing with exceptions (4 replies)
- Future occupation: Archeological reverser? (0 replies)
- Automating analysis with PyDbg (0 replies)
- Interesting primer on Virtualization from VMware (0 replies)
- Mass deface with RFI scanners (0 replies)
- Semi-automatic import recovery (0 replies)
- ExeCryptor's code morphing "technology" (0 replies)
- Why VMware is bad for shareware? (3 replies)
- Radio? (0 replies)
- Komodo Edit 4.2 released (0 replies)
- Visual Basic DllFunctionCall (0 replies)
- A new player in the virtualization arena for Mac (0 replies)
- VMWare Fusion? (0 replies)
- HELLO! (0 replies)
- OUTLAW ROOTKITS? (0 replies)
- LINUX AT LAST! (0 replies)
- Adding IDC commands to the out-of-the-box set (0 replies)
- Scripting fun (0 replies)
- EXPLICATOR? (0 replies)
- On batch analysis (0 replies)
- Dynamic coloring (0 replies)
- Does 'return' come back? (0 replies)
Powered by vBulletin® Version 4.2.2 Copyright © 2018 vBulletin Solutions, Inc. All rights reserved.