Reverse engineering
Reverse engineering
Abstract In this series, we'll examine the core details of creating, deploying and configuring .NET assemblies and its advantage over existing COM technolog
July 16, 2013
Ajay Yadav
Reverse engineering
Introduction The prime objective of this article is to confront with the .NET mother tongue language termed as Common Instruction Language (CIL) which laid d
July 12, 2013
Ajay Yadav
Reverse engineering
Introduction When trying to protect memory from being maliciously used by the hackers, we must first understand how everything fits in the whole picture. Let
July 05, 2013
Dejan Lukan
Reverse engineering
Introduction The dissertation investigates attributes. You'll see how you can define attributes on various items within your program. We shall also discuss
June 20, 2013
Ajay Yadav
Reverse engineering
Introduction In this article we will look at malware that propagate to other machines using USB removable devices. Unlike most malware which make use of
June 14, 2013
Sudeep Singh
Reverse engineering
If you're reading this, then you've probably wanted to call some internal ntdll function that isn't exported and easily callable, right? If no, then let me e
June 06, 2013
Dejan Lukan
Reverse engineering
LVM + LUKS LVM is software that uses physical devices as physical volumes (PVs) in storage pools called volume group (VG). Physical volumes can be a partiti
June 05, 2013
Dejan Lukan
Reverse engineering
Note: all the code examples can be found on my Github profile under visual-studio-projects accessible here: https://github.com/proteansec . [pkadzone zo
June 03, 2013
Dejan Lukan
Reverse engineering
Note: all the code examples can be found on my Github profile under visual-studio-projects accessible here: https://github.com/proteansec. [pkadzone zon
May 31, 2013
Dejan Lukan
Reverse engineering
Note: all the code examples can be found on my Github profile under visual-studio-projects accessible here: https://github.com/proteansec . [pkadzone zo
May 30, 2013
Dejan Lukan- Exam Pass Guarantee
- Live expert instruction
- Hands-on labs
- CREA exam voucher
In this series
- Kali Linux: Top 8 tools for reverse engineering
- Stacks and Heap
- Top 8 reverse engineering tools for cyber security professionals [updated 2021]
- Arrays, Structs and Linked Lists
- Reverse engineering obfuscated assemblies [updated 2019]
- Crack Me Challenge Part 4 [Updated 2019]
- Writing windows kernel mode driver [Updated 2019]
- Assembly programming with Visual Studio.NET
- The basics of IDA pro
- Reverse engineering tools
- Hacking tools: Reverse engineering
- Reverse engineering a JavaScript obfuscated dropper
- Reverse Engineering – LAB 3
- Exploiting Protostar – Stack 0-3
- Reversing Binary: Spotting Bug without Source Code
- Reverse engineering virtual machine protected binaries
- Introduction to Reverse Engineering
- Pafish (Paranoid Fish)
- Extending Debuggers
- Encrypted code reverse engineering: Bypassing obfuscation
- Buffer Overflow Attack & Defense
- Invoking Assembly Code in C#
- iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)
- Hooking IDT
- A Guide to Debugging Android Binaries
- Kernel debugging with Qemu and WinDbg
- Shared Folders with Samba and Qemu
- Testing Hooks via the Windows Debugger – An Introduction to RevEngX
- Reverse Engineering with Reflector
- Applied Reverse Engineering with IDA Pro
- Injecting spyware in an EXE (code injection)
- Disassembler Mechanized Part 4: DLL Injector Development
- Disassembler Mechanized Part 3: Code Injection Operation
- Debugging TLS callbacks
- Disassembler Mechanized Part 2: Generating C# and MSIL code
- System address map initialization in x86/x64 architecture part 2: PCI express-based systems
- Coding of Disassembler
- Applied cracking & byte patching with IDA Pro
- .NET reversing with Reflexil
- Reversing firmware part 1
- Reverse Engineering with Reflector: Part 1
- Remoting Technology
- Reverse engineering with OllyDbg
- Understanding Session Fixation
- Optimizing Managed Code Execution
- File system manipulation
- The BodgeIt store part two
- The BodgeIt store part one
- Understanding Windows Internal Call Structure
- Pin: Dynamic Binary Instrumentation Framework
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!