- IDA and Microcontrollers (0 replies)
 - Hex-Rays SDK is ready! (0 replies)
 - Coordinate system for Hex-Rays (0 replies)
 - Trunk, Branches, and Leaves (0 replies)
 - Finally, good STL replacement? (0 replies)
 - Hex-Rays beta testing is open! (0 replies)
 - Adding cross references (0 replies)
 - On batch analysis (0 replies)
 - Dynamic coloring (0 replies)
 - Very simple custom viewer (0 replies)
 - Decompilation gets real (0 replies)
 - Does 'return' come back? (0 replies)
 - Video #5 is up. (4 replies)
 - Editable Listview control (9 replies)
 - IDA plugin: Extract (UnRot13) and analyze (2 replies)
 - The Point-R technique (19 replies)
 - Doing it without Weird Hacks (tm) is even easier (1 replies)
 - imports are easy to fix (5 replies)
 - New Video Tutorials website (4 replies)
 - Implementing a Customer X86 Encoder (0 replies)
 - Exploiting 802.11 Wireless Driver Vulnerabilities on Windows (0 replies)
 - Preventing the Exploitation of SEH Overwrites (0 replies)
 - Effective Bug Discovery (0 replies)
 - Wars Within (0 replies)
 - Fingerprinting 802.11 Implementations via Statistical Analysis of the Duration Field (0 replies)
 - Improving Automated Analysis of Windows x64 Binaries (0 replies)
 - Exploiting the Otherwise Non-Exploitable on Windows (0 replies)
 - Locreate: An Anagram for Relocate (0 replies)
 - Subverting PatchGuard Version 2 (0 replies)
 - Abusing Mach on Mac OS X (0 replies)
 - Real-time Steganography with RTP (0 replies)
 - PatchGuard Reloaded: A Brief Analysis of PatchGuard Version 3 (0 replies)
 - OS X Kernel-mode Exploitation in a Weekend (0 replies)
 - A Catalog of Local Windows Kernel-mode Backdoor Techniques (0 replies)
 - Generalizing Data Flow Information (0 replies)
 - Reducing the Effective Entropy of GS Cookies (0 replies)
 - Memalyze: Dynamic Analysis of Memory Access Behavior in Software (0 replies)
 - Mnemonic Password Formulas (0 replies)
 - GREPEXEC: Grepping Executive Objects from Pool Memory (0 replies)
 - Anti-Virus Software Gone Wrong (0 replies)
 - Bypassing PatchGuard on Windows x64 (0 replies)
 - Annoyances Caused by Unsafe Assumptions (0 replies)
 - Mac OS X PPC Shellcode Tricks (0 replies)
 - Social Zombies: Aspects of Trojan Networks (0 replies)
 - Loop Detection (0 replies)
 - Smart Parking Meters (0 replies)
 - Post-Exploitation on Windows using ActiveX Controls (0 replies)
 - Introduction to Reverse Engineering Win32 Applications (0 replies)
 - 802.11 VLANs and Association Redirection (0 replies)
 - Bypassing Windows Hardware-enforced DEP (0 replies)
 - Temporal Return Addresses (0 replies)
 - Windows Kernel-mode Payload Fundamentals (0 replies)
 - Analyzing Common Binary Parser Mistakes (0 replies)
 - Attacking NTLM with Precomputed Hashtables (0 replies)
 - Linux Improvised Userland Schedular Virus (0 replies)
 - FUTo (0 replies)
 - Thick Clients Gone Wrong (0 replies)
 - Inside Blizzard: Battle.net (0 replies)
 - Funny API function inside ntdll.dll (11 replies)
 - Upack (2 replies)
 - Code injection (0 replies)
 - How to get the Virtual Address of a PE section with IDA (0 replies)
 - Finessing Import REConstructor (0 replies)
 - REcon 2005 (0 replies)
 - Getting around anti-debugger code (0 replies)
 - Forcing IDA's "Create function..." on functions containing invalid code (0 replies)
 - Function Analysis (0 replies)
 - When the Red Pill is Hard to Swallow (0 replies)
 - Unpacking DLLs and Drivers with OllyDbg (0 replies)
 - Terms of the Trade (0 replies)
 - Circumventing custom SEH (0 replies)
 - Using Structure Offsets as Symbolic Constants in IDA (0 replies)
 - Advanced Malware Deobfuscation training course at Black Hat (0 replies)
 - Loading Drivers in OllyDbg (0 replies)
 - Career Shift (0 replies)
 - Virus Bulletin 2006 (3 replies)
 - Using assembly buffers in C++ without using hex-strings (0 replies)
 - Counting Lines of Source Code (0 replies)
 - Investigating Outlook's Single-Instance Restriction (PART 2) (0 replies)
 - Investigating Outlook's Single-Instance Restriction (PART 1) (0 replies)
 - Stateless Bi-Directional Proxy (0 replies)
 - stuffz (0 replies)
 - ВМВаре видимо се : vmware detection (0 replies)
 - Свету се немодзе угодити (0 replies)
 - Making an advanced api redirection more advanced? (0 replies)
 - Виртуелно, виртуелно и машински (4 replies)
 - Блогујем ја, блогујеш ти.... (5 replies)
 - Something About Firewall Hooking and Packet Filtering #1 (0 replies)
 - Hello World (0 replies)
 - A Framework for Hash Algorithms Analysis (0 replies)
 - Something About Firewall Hooking and Packer Filtering #2 (0 replies)
 - hm (0 replies)
 - Serials and hashing (0 replies)
 - A Guide to Decompiler Design - Part 0 (10 replies)
 - Some words on how to decrypt trojan Ascesso (0 replies)
 - First blog entry ever on Woodmann.com! (0 replies)
 
