Reverse engineering

Linux Kernel Development Process

Introduction When I was listening to the question and answer session at LinuxCon, there was some interesting discussion going on: some of the latest news inf

Patching .NET Binary Code with CFF Explorer

Abstract The purpose of this article is to show how to bypass various security checks by modifying binary code directly, rather than source code, through th

Email encryption: Mailvelope

Between constant password breaches and the NSA looking in on everything you do, you've probably got privacy on the mind lately. If you're looking for a litt

Python for Web application security professionals

Introduction: Python is an open source, interactive, object oriented programming language. It's very easy to learn and an extremely powerful high level langu

.NET Memory Internals

Abstract This article delves into various aspects of memory access and management. There are distinctive categorizations of memory, for instance static data

Extreme .NET Reverse Engineering - 5

Introduction We have done lots of IL grammar so far. As I warned you earlier, Reverse engineering could be exercising both offensive and defensive motives.

Extreme .NET Reverse Engineering - 4

Introduction We shall explore round-trip engineering, which is one of the most advanced tactics to disassemble IL code in order to manipulate reverse engine

.NET Reverse Engineering – 3

Introduction We have taken tour of the syntax and semantics of raw CIL up till now. In this article, we shall be confronted with the rest of implementation

.NET Reverse Engineering –Part 2

Introduction The first Article of this series touched the most significant aspect of the MSIL code Instructions, for instance, how a program written in ILAS

Socket Programming

Introduction This article will give you a broad understanding of key networking concepts, such as ISO stack and TCP/IP, and how applications can logically an