Log in

View Full Version : Blogs Forum


Pages : 1 2 3 [4]

  1. IDA and Microcontrollers (0 replies)
  2. Hex-Rays SDK is ready! (0 replies)
  3. Coordinate system for Hex-Rays (0 replies)
  4. Trunk, Branches, and Leaves (0 replies)
  5. Finally, good STL replacement? (0 replies)
  6. Hex-Rays beta testing is open! (0 replies)
  7. Adding cross references (0 replies)
  8. On batch analysis (0 replies)
  9. Dynamic coloring (0 replies)
  10. Very simple custom viewer (0 replies)
  11. Decompilation gets real (0 replies)
  12. Does 'return' come back? (0 replies)
  13. Video #5 is up. (4 replies)
  14. Editable Listview control (9 replies)
  15. IDA plugin: Extract (UnRot13) and analyze (2 replies)
  16. The Point-R technique (19 replies)
  17. Doing it without Weird Hacks (tm) is even easier (1 replies)
  18. imports are easy to fix (5 replies)
  19. New Video Tutorials website (4 replies)
  20. Implementing a Customer X86 Encoder (0 replies)
  21. Exploiting 802.11 Wireless Driver Vulnerabilities on Windows (0 replies)
  22. Preventing the Exploitation of SEH Overwrites (0 replies)
  23. Effective Bug Discovery (0 replies)
  24. Wars Within (0 replies)
  25. Fingerprinting 802.11 Implementations via Statistical Analysis of the Duration Field (0 replies)
  26. Improving Automated Analysis of Windows x64 Binaries (0 replies)
  27. Exploiting the Otherwise Non-Exploitable on Windows (0 replies)
  28. Locreate: An Anagram for Relocate (0 replies)
  29. Subverting PatchGuard Version 2 (0 replies)
  30. Abusing Mach on Mac OS X (0 replies)
  31. Real-time Steganography with RTP (0 replies)
  32. PatchGuard Reloaded: A Brief Analysis of PatchGuard Version 3 (0 replies)
  33. OS X Kernel-mode Exploitation in a Weekend (0 replies)
  34. A Catalog of Local Windows Kernel-mode Backdoor Techniques (0 replies)
  35. Generalizing Data Flow Information (0 replies)
  36. Reducing the Effective Entropy of GS Cookies (0 replies)
  37. Memalyze: Dynamic Analysis of Memory Access Behavior in Software (0 replies)
  38. Mnemonic Password Formulas (0 replies)
  39. GREPEXEC: Grepping Executive Objects from Pool Memory (0 replies)
  40. Anti-Virus Software Gone Wrong (0 replies)
  41. Bypassing PatchGuard on Windows x64 (0 replies)
  42. Annoyances Caused by Unsafe Assumptions (0 replies)
  43. Mac OS X PPC Shellcode Tricks (0 replies)
  44. Social Zombies: Aspects of Trojan Networks (0 replies)
  45. Loop Detection (0 replies)
  46. Smart Parking Meters (0 replies)
  47. Post-Exploitation on Windows using ActiveX Controls (0 replies)
  48. Introduction to Reverse Engineering Win32 Applications (0 replies)
  49. 802.11 VLANs and Association Redirection (0 replies)
  50. Bypassing Windows Hardware-enforced DEP (0 replies)
  51. Temporal Return Addresses (0 replies)
  52. Windows Kernel-mode Payload Fundamentals (0 replies)
  53. Analyzing Common Binary Parser Mistakes (0 replies)
  54. Attacking NTLM with Precomputed Hashtables (0 replies)
  55. Linux Improvised Userland Schedular Virus (0 replies)
  56. FUTo (0 replies)
  57. Thick Clients Gone Wrong (0 replies)
  58. Inside Blizzard: Battle.net (0 replies)
  59. Funny API function inside ntdll.dll (11 replies)
  60. Upack (2 replies)
  61. Code injection (0 replies)
  62. How to get the Virtual Address of a PE section with IDA (0 replies)
  63. Finessing Import REConstructor (0 replies)
  64. REcon 2005 (0 replies)
  65. Getting around anti-debugger code (0 replies)
  66. Forcing IDA's "Create function..." on functions containing invalid code (0 replies)
  67. Function Analysis (0 replies)
  68. When the Red Pill is Hard to Swallow (0 replies)
  69. Unpacking DLLs and Drivers with OllyDbg (0 replies)
  70. Terms of the Trade (0 replies)
  71. Circumventing custom SEH (0 replies)
  72. Using Structure Offsets as Symbolic Constants in IDA (0 replies)
  73. Advanced Malware Deobfuscation training course at Black Hat (0 replies)
  74. Loading Drivers in OllyDbg (0 replies)
  75. Career Shift (0 replies)
  76. Virus Bulletin 2006 (3 replies)
  77. Using assembly buffers in C++ without using hex-strings (0 replies)
  78. Counting Lines of Source Code (0 replies)
  79. Investigating Outlook's Single-Instance Restriction (PART 2) (0 replies)
  80. Investigating Outlook's Single-Instance Restriction (PART 1) (0 replies)
  81. Stateless Bi-Directional Proxy (0 replies)
  82. stuffz (0 replies)
  83. ВМВаре видимо се : vmware detection (0 replies)
  84. Свету се немодзе угодити (0 replies)
  85. Making an advanced api redirection more advanced? (0 replies)
  86. Виртуелно, виртуелно и машински (4 replies)
  87. Блогујем ја, блогујеш ти.... (5 replies)
  88. Something About Firewall Hooking and Packet Filtering #1 (0 replies)
  89. Hello World (0 replies)
  90. A Framework for Hash Algorithms Analysis (0 replies)
  91. Something About Firewall Hooking and Packer Filtering #2 (0 replies)
  92. hm (0 replies)
  93. Serials and hashing (0 replies)
  94. A Guide to Decompiler Design - Part 0 (10 replies)
  95. Some words on how to decrypt trojan Ascesso (0 replies)
  96. First blog entry ever on Woodmann.com! (0 replies)