Entries tagged - "reverseengineering"
-
Ghidra: NSA’s reverse engineerin tool released to the public Mar 6, 2019
-
The source code of the TreasureHunter PoS Malware leaked online May 12, 2018
-
Root cause analysis of the latest Internet Explorer zero day – CVE-2018-8174 May 9, 2018
-
Rediscovery, analysis and exploitation of a CIA zero-day MikroTik Vulnerability May 1, 2018
-
Analysis: Zebrocy used heavily by the Sednit group over last two years Apr 29, 2018
-
Fuzzing Adobe Reader for exploitable vulns (fun != profit) Apr 27, 2018
-
CSE Malware ZLab – Malware Analysis Report: The Bandios malware suite Apr 24, 2018
-
Windows Exploitation Tricks: Exploiting Arbitrary File Writes for Local Elevation of Privilege Apr 19, 2018
-
Inside the Unnerving CCleaner Supply Chain Attack Apr 19, 2018
-
CVE-2017-0263 – reported exploit used to interfere the French election Apr 15, 2018
-
Malware monitor – leveraging PyREBox for malware analysis Apr 14, 2018
-
Intel FSP reverse engineering: finding the real entry point Apr 4, 2018
-
Backdooring popular windows plugins Apr 4, 2018
-
In-depth Formbook malware analysis Mar 31, 2018
-
An in-depth malware analysis of QuantLoader Mar 29, 2018
-
Dynamic analysis of iOS apps without Jailbreak Mar 20, 2018
-
How We Reverse Engineered the Cuban “Sonic Weapon” Attack Mar 16, 2018
-
Reversing a Self-Modifying Binary with radare2 Mar 13, 2018
-
Time of death? A therapeutic postmortem of connected medicine Mar 13, 2018
-
Knot Forensics Mar 6, 2018
-
I got infected with malware and appreciated by its author Mar 6, 2018
-
How I discovered Instagram’s upcoming video calling feature on iOS Mar 5, 2018
-
FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines Mar 2, 2018