- IDA and Microcontrollers (0 replies)
- Hex-Rays SDK is ready! (0 replies)
- Coordinate system for Hex-Rays (0 replies)
- Trunk, Branches, and Leaves (0 replies)
- Finally, good STL replacement? (0 replies)
- Hex-Rays beta testing is open! (0 replies)
- Adding cross references (0 replies)
- On batch analysis (0 replies)
- Dynamic coloring (0 replies)
- Very simple custom viewer (0 replies)
- Decompilation gets real (0 replies)
- Does 'return' come back? (0 replies)
- Video #5 is up. (4 replies)
- Editable Listview control (9 replies)
- IDA plugin: Extract (UnRot13) and analyze (2 replies)
- The Point-R technique (19 replies)
- Doing it without Weird Hacks (tm) is even easier (1 replies)
- imports are easy to fix (5 replies)
- New Video Tutorials website (4 replies)
- Implementing a Customer X86 Encoder (0 replies)
- Exploiting 802.11 Wireless Driver Vulnerabilities on Windows (0 replies)
- Preventing the Exploitation of SEH Overwrites (0 replies)
- Effective Bug Discovery (0 replies)
- Wars Within (0 replies)
- Fingerprinting 802.11 Implementations via Statistical Analysis of the Duration Field (0 replies)
- Improving Automated Analysis of Windows x64 Binaries (0 replies)
- Exploiting the Otherwise Non-Exploitable on Windows (0 replies)
- Locreate: An Anagram for Relocate (0 replies)
- Subverting PatchGuard Version 2 (0 replies)
- Abusing Mach on Mac OS X (0 replies)
- Real-time Steganography with RTP (0 replies)
- PatchGuard Reloaded: A Brief Analysis of PatchGuard Version 3 (0 replies)
- OS X Kernel-mode Exploitation in a Weekend (0 replies)
- A Catalog of Local Windows Kernel-mode Backdoor Techniques (0 replies)
- Generalizing Data Flow Information (0 replies)
- Reducing the Effective Entropy of GS Cookies (0 replies)
- Memalyze: Dynamic Analysis of Memory Access Behavior in Software (0 replies)
- Mnemonic Password Formulas (0 replies)
- GREPEXEC: Grepping Executive Objects from Pool Memory (0 replies)
- Anti-Virus Software Gone Wrong (0 replies)
- Bypassing PatchGuard on Windows x64 (0 replies)
- Annoyances Caused by Unsafe Assumptions (0 replies)
- Mac OS X PPC Shellcode Tricks (0 replies)
- Social Zombies: Aspects of Trojan Networks (0 replies)
- Loop Detection (0 replies)
- Smart Parking Meters (0 replies)
- Post-Exploitation on Windows using ActiveX Controls (0 replies)
- Introduction to Reverse Engineering Win32 Applications (0 replies)
- 802.11 VLANs and Association Redirection (0 replies)
- Bypassing Windows Hardware-enforced DEP (0 replies)
- Temporal Return Addresses (0 replies)
- Windows Kernel-mode Payload Fundamentals (0 replies)
- Analyzing Common Binary Parser Mistakes (0 replies)
- Attacking NTLM with Precomputed Hashtables (0 replies)
- Linux Improvised Userland Schedular Virus (0 replies)
- FUTo (0 replies)
- Thick Clients Gone Wrong (0 replies)
- Inside Blizzard: Battle.net (0 replies)
- Funny API function inside ntdll.dll (11 replies)
- Upack (2 replies)
- Code injection (0 replies)
- How to get the Virtual Address of a PE section with IDA (0 replies)
- Finessing Import REConstructor (0 replies)
- REcon 2005 (0 replies)
- Getting around anti-debugger code (0 replies)
- Forcing IDA's "Create function..." on functions containing invalid code (0 replies)
- Function Analysis (0 replies)
- When the Red Pill is Hard to Swallow (0 replies)
- Unpacking DLLs and Drivers with OllyDbg (0 replies)
- Terms of the Trade (0 replies)
- Circumventing custom SEH (0 replies)
- Using Structure Offsets as Symbolic Constants in IDA (0 replies)
- Advanced Malware Deobfuscation training course at Black Hat (0 replies)
- Loading Drivers in OllyDbg (0 replies)
- Career Shift (0 replies)
- Virus Bulletin 2006 (3 replies)
- Using assembly buffers in C++ without using hex-strings (0 replies)
- Counting Lines of Source Code (0 replies)
- Investigating Outlook's Single-Instance Restriction (PART 2) (0 replies)
- Investigating Outlook's Single-Instance Restriction (PART 1) (0 replies)
- Stateless Bi-Directional Proxy (0 replies)
- stuffz (0 replies)
- ВМВаре видимо се : vmware detection (0 replies)
- Свету се немодзе угодити (0 replies)
- Making an advanced api redirection more advanced? (0 replies)
- Виртуелно, виртуелно и машински (4 replies)
- Блогујем ја, блогујеш ти.... (5 replies)
- Something About Firewall Hooking and Packet Filtering #1 (0 replies)
- Hello World (0 replies)
- A Framework for Hash Algorithms Analysis (0 replies)
- Something About Firewall Hooking and Packer Filtering #2 (0 replies)
- hm (0 replies)
- Serials and hashing (0 replies)
- A Guide to Decompiler Design - Part 0 (10 replies)
- Some words on how to decrypt trojan Ascesso (0 replies)
- First blog entry ever on Woodmann.com! (0 replies)