Category
- Aug 16 » Reversing a Remote Controller: A Case Study in RF Engineering
- Jun 13 » From Laziness to Control: Reversing an IoT device using Frida
- Sep 08 » Automated dynamic import resolving using binary emulation
- May 24 » Automated malware unpacking with binary emulation
- Mar 29 » Decrypting NetWire's keylog files
- Apr 20 » Frida by example: bypassing IsDebuggerPresent() check
- Aug 16 » Reversing a Remote Controller: A Case Study in RF Engineering
- Jun 13 » From Laziness to Control: Reversing an IoT device using Frida
- Sep 08 » Automated dynamic import resolving using binary emulation
- May 24 » Automated malware unpacking with binary emulation
- Mar 29 » Decrypting NetWire's keylog files
- Mar 01 » Crackmes for lazies: angr demonstration
- Apr 20 » Frida by example: bypassing IsDebuggerPresent() check
CRACKMES
HARDWARE
MALWARE-ANALYSIS
RADIO
REVERSE-ENGINEERING
SECURITY-ENGINEERING
THREAT-ANALYSIS
Newest Posts