Direct Memory Access (DMA) Attack Software - Map Processes to Files and Folders - DMA over PCIe (No Drivers Needed on Target System) - [Full Sources and Binaries -See Comment] Reverse Engineering |
- Direct Memory Access (DMA) Attack Software - Map Processes to Files and Folders - DMA over PCIe (No Drivers Needed on Target System) - [Full Sources and Binaries -See Comment]
- JavaScript Zero: real JavaScript, and zero side-channel attacks
- OCEANLOTUS: OLD TECHNIQUES, NEW BACKDOOR
- Reverse engineering of Mikrotik exploit from Vault 7 CIA Leaks [Working PoC (Full Sources) and PDF Article - See Comment]
- Reversing a Self-Modifying Binary with radare2
- Visualizing an audio application's signal processing chain with an IDAPython debugging plugin
- Exploring New Depths of Threat Hunting [PDF]
Posted: 12 Mar 2018 07:49 PM PDT |
JavaScript Zero: real JavaScript, and zero side-channel attacks Posted: 13 Mar 2018 06:15 AM PDT |
OCEANLOTUS: OLD TECHNIQUES, NEW BACKDOOR Posted: 13 Mar 2018 11:25 AM PDT |
Posted: 13 Mar 2018 11:19 AM PDT |
Reversing a Self-Modifying Binary with radare2 Posted: 13 Mar 2018 11:08 AM PDT |
Visualizing an audio application's signal processing chain with an IDAPython debugging plugin Posted: 13 Mar 2018 03:25 AM PDT |
Exploring New Depths of Threat Hunting [PDF] Posted: 12 Mar 2018 04:51 PM PDT |
You are subscribed to email updates from Reverse Engineering. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment