Pintool: tracking 'CALL 0' and 'JMP 0' instruction Reverse Engineering |
- Pintool: tracking 'CALL 0' and 'JMP 0' instruction
- Encoutering an error when trying to run an .exe through both Ollydbg and x64dbg (failure to load a DLL)
- [Blog series] One of the easiest way to unpack java malware e.g. Qealler is to use Java agent
Pintool: tracking 'CALL 0' and 'JMP 0' instruction Posted: 26 Jul 2020 08:18 AM PDT |
Posted: 26 Jul 2020 11:04 AM PDT |
[Blog series] One of the easiest way to unpack java malware e.g. Qealler is to use Java agent Posted: 25 Jul 2020 04:30 PM PDT |
You are subscribed to email updates from Reverse Engineering. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment