![[ICO]](images/blank.gif) | Name |
Last modified |
Size |
|
![[DIR]](./images/parent_dir.png) | Parent Directory | | - |
![[DIR]](images/folder.png) | Advanced_Malware_Analysis_Training_SecurityXploded | March-29-2015 23:37 | - |
![[PDF]](images/pdf.gif) | Analyse d un packer de trojan et programmation d un unpacker.pdf | July-11-2014 12:00 | 756 Ko |
![[PDF]](images/pdf.gif) | CodeBreakers 2006 - AntiDebugging techniques.pdf | May-29-2016 23:07 | 217 Ko |
![[PDF]](images/pdf.gif) | Comment contourner la protection aleatoire de la pile sur le noyau 2.6.pdf | April-16-2010 01:11 | 1 Mo |
![[PDF]](images/pdf.gif) | Construction d un desassembleur de taille oriente Hooking.pdf | April-16-2010 01:11 | 2 Mo |
![[PDF]](images/pdf.gif) | Control Flow Obfuscations in Malwares.pdf | July-11-2014 12:03 | 2 Mo |
![[PDF]](images/pdf.gif) | Corruption de la memoire lors de l exploitation.pdf | March-03-2010 22:06 | 510 Ko |
![[PDF]](images/pdf.gif) | Crack de Auto Window Manager.pdf | March-17-2010 23:51 | 249 Ko |
![[PDF]](images/pdf.gif) | Cracker les SSHA sous LDAP.pdf | October-20-2010 15:01 | 501 Ko |
![[PDF]](images/pdf.gif) | Cracking ZIP file s Password.pdf | June-14-2014 21:22 | 16 Ko |
![[PDF]](images/pdf.gif) | Cracking_Passwords_Guide.pdf | March-29-2015 22:55 | 272 Ko |
![[PDF]](images/pdf.gif) | Crackme KillNag de KiTo.pdf | October-20-2010 15:01 | 152 Ko |
![[PDF]](images/pdf.gif) | Creating code obfuscation Virtual Machines.pdf | May-29-2016 23:07 | 612 Ko |
![[DIR]](images/folder.png) | Deamon | March-29-2015 23:35 | - |
![[PDF]](images/pdf.gif) | Deobfuscation of Virtualization-Obfuscated Software.pdf | May-29-2016 23:07 | 192 Ko |
![[PDF]](images/pdf.gif) | Depassement de capacite de la pile.pdf | March-20-2010 23:15 | 1001 Ko |
![[PDF]](images/pdf.gif) | EN-Decimalisation Table Attacks For PIN Cracking.pdf | March-14-2011 17:31 | 223 Ko |
![[PDF]](images/pdf.gif) | Etude d un Loader Tout en Memoire pour Packer.pdf | July-11-2014 12:22 | 475 Ko |
![[PDF]](images/pdf.gif) | Exploit writing tutorial part 7 Unicode - from 0.00410041 to calc.pdf | January-11-2015 22:33 | 622 Ko |
![[PDF]](images/pdf.gif) | GDB - petit tutoriel.pdf | October-20-2010 15:01 | 84 Ko |
![[PDF]](images/pdf.gif) | HARES: Hardened Anti-Reverse Engineering System.pdf | May-29-2016 23:07 | 241 Ko |
![[PDF]](images/pdf.gif) | Hi GDB, this is python.pdf | May-29-2016 23:07 | 242 Ko |
![[PDF]](images/pdf.gif) | How We Cracked the Code Book Ciphers.pdf | October-20-2010 15:01 | 272 Ko |
![[PDF]](images/pdf.gif) | IDA L usine a Gaz.pdf | July-11-2014 12:02 | 532 Ko |
![[PDF]](images/pdf.gif) | Ingenierie inverse du code executable ELF dans l analyse apres intrusion.pdf | April-16-2010 01:12 | 226 Ko |
![[PDF]](images/pdf.gif) | Introduction au format Portable Executable.pdf | October-20-2010 15:01 | 3 Mo |
![[PDF]](images/pdf.gif) | Intro Reverse et Patch Android.pdf | July-11-2014 12:02 | 2 Mo |
![[DIR]](images/folder.png) | KromCrack | March-29-2015 23:35 | - |
![[PDF]](images/pdf.gif) | Manual Unpacking d Anti007 2.5.pdf | October-20-2010 15:01 | 376 Ko |
![[PDF]](images/pdf.gif) | Multi-stage Binary Code Obfuscation using Improved Virtual Machine.pdf | May-29-2016 23:07 | 485 Ko |
![[PDF]](images/pdf.gif) | OllyDbg.pdf | January-03-2010 19:21 | 446 Ko |
![[PDF]](images/pdf.gif) | OllyDbg 2.0 Brief Help.pdf | June-03-2010 23:03 | 372 Ko |
![[PDF]](images/pdf.gif) | Packer-analysis-report-debugging-unpacking-nspack-3.4-packer-3.7.pdf | March-29-2015 22:58 | 5 Mo |
![[PDF]](images/pdf.gif) | pas-a-pas-vers-l-assembleur-par-lord-noteworthy.pdf | October-20-2010 15:01 | 2 Mo |
![[DIR]](images/folder.png) | Pifoman | March-29-2015 23:35 | - |
![[PDF]](images/pdf.gif) | Practical Reverse Engineering.pdf | May-29-2016 23:07 | 5 Mo |
![[PDF]](images/pdf.gif) | radare.pdf | July-11-2014 12:03 | 281 Ko |
![[PDF]](images/pdf.gif) | RCE-Unpacking-eBook-Translated-by-LithiumLi-Unprotected.pdf | May-29-2016 23:07 | 111 Mo |
![[PDF]](images/pdf.gif) | Retro-Ingenierie C++ - Heritage et polymorphisme.pdf | May-01-2015 14:59 | 338 Ko |
![[PDF]](images/pdf.gif) | Reverse enginering.pdf | October-20-2010 15:01 | 269 Ko |
![[PDF]](images/pdf.gif) | Reversing - Secrets Of Reverse Engineering (2005).pdf | May-29-2016 23:07 | 8 Mo |
![[PDF]](images/pdf.gif) | Reversing CRC Theory and Practice.pdf | March-14-2011 17:31 | 624 Ko |
![[PDF]](images/pdf.gif) | Reversing Encrypted Callbacks and COM Interfaces.pdf | July-11-2014 12:03 | 1 Mo |
![[DIR]](images/folder.png) | Reversing Malware Analysis Training | March-29-2015 23:06 | - |
![[PDF]](images/pdf.gif) | Serial fishing sur un soft.pdf | February-17-2010 15:41 | 227 Ko |
![[PDF]](images/pdf.gif) | SSTIC06-Castle in the Skype.pdf | May-29-2016 23:07 | 950 Ko |
![[PDF]](images/pdf.gif) | SSTIC2012-Miasm Framework de reverse engineering-slides.pdf | May-29-2016 23:07 | 589 Ko |
![[PDF]](images/pdf.gif) | SSTIC2012-Miasm Framework de reverse engineering.pdf | May-29-2016 23:07 | 728 Ko |
![[PDF]](images/pdf.gif) | The Art of Unpacking.pdf | May-29-2016 23:07 | 504 Ko |
![[PDF]](images/pdf.gif) | Tuto reversing - Comment enlever une protection anti-debug classique sur un executable.pdf | April-06-2010 00:11 | 1 Mo |
![[PDF]](images/pdf.gif) | Unpacking Virtualization Obfuscators.pdf | May-29-2016 23:08 | 130 Ko |
![[PDF]](images/pdf.gif) | Utilisation du framework triton pour l.analyse de code obfusque.pdf | May-29-2016 23:08 | 1004 Ko |
![[PDF]](images/pdf.gif) | Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.pdf | May-29-2016 23:08 | 891 Ko |
|