Name
Last modified
Size
Parent Directory
-
Advanced_Malware_Analysis_Training_SecurityXploded
March-29-2015 23:37
-
Analyse d un packer de trojan et programmation d un unpacker.pdf
July-11-2014 12:00
756 Ko
CodeBreakers 2006 - AntiDebugging techniques.pdf
May-29-2016 23:07
217 Ko
Comment contourner la protection aleatoire de la pile sur le noyau 2.6.pdf
April-16-2010 01:11
1 Mo
Construction d un desassembleur de taille oriente Hooking.pdf
April-16-2010 01:11
2 Mo
Control Flow Obfuscations in Malwares.pdf
July-11-2014 12:03
2 Mo
Corruption de la memoire lors de l exploitation.pdf
March-03-2010 22:06
510 Ko
Crack de Auto Window Manager.pdf
March-17-2010 23:51
249 Ko
Cracker les SSHA sous LDAP.pdf
October-20-2010 15:01
501 Ko
Cracking ZIP file s Password.pdf
June-14-2014 21:22
16 Ko
Cracking_Passwords_Guide.pdf
March-29-2015 22:55
272 Ko
Crackme KillNag de KiTo.pdf
October-20-2010 15:01
152 Ko
Creating code obfuscation Virtual Machines.pdf
May-29-2016 23:07
612 Ko
Deamon
March-29-2015 23:35
-
Deobfuscation of Virtualization-Obfuscated Software.pdf
May-29-2016 23:07
192 Ko
Depassement de capacite de la pile.pdf
March-20-2010 23:15
1001 Ko
EN-Decimalisation Table Attacks For PIN Cracking.pdf
March-14-2011 17:31
223 Ko
Etude d un Loader Tout en Memoire pour Packer.pdf
July-11-2014 12:22
475 Ko
Exploit writing tutorial part 7 Unicode - from 0.00410041 to calc.pdf
January-11-2015 22:33
622 Ko
GDB - petit tutoriel.pdf
October-20-2010 15:01
84 Ko
HARES: Hardened Anti-Reverse Engineering System.pdf
May-29-2016 23:07
241 Ko
Hi GDB, this is python.pdf
May-29-2016 23:07
242 Ko
How We Cracked the Code Book Ciphers.pdf
October-20-2010 15:01
272 Ko
IDA L usine a Gaz.pdf
July-11-2014 12:02
532 Ko
Ingenierie inverse du code executable ELF dans l analyse apres intrusion.pdf
April-16-2010 01:12
226 Ko
Introduction au format Portable Executable.pdf
October-20-2010 15:01
3 Mo
Intro Reverse et Patch Android.pdf
July-11-2014 12:02
2 Mo
KromCrack
March-29-2015 23:35
-
Manual Unpacking d Anti007 2.5.pdf
October-20-2010 15:01
376 Ko
Multi-stage Binary Code Obfuscation using Improved Virtual Machine.pdf
May-29-2016 23:07
485 Ko
OllyDbg.pdf
January-03-2010 19:21
446 Ko
OllyDbg 2.0 Brief Help.pdf
June-03-2010 23:03
372 Ko
Packer-analysis-report-debugging-unpacking-nspack-3.4-packer-3.7.pdf
March-29-2015 22:58
5 Mo
pas-a-pas-vers-l-assembleur-par-lord-noteworthy.pdf
October-20-2010 15:01
2 Mo
Pifoman
March-29-2015 23:35
-
Practical Reverse Engineering.pdf
May-29-2016 23:07
5 Mo
radare.pdf
July-11-2014 12:03
281 Ko
RCE-Unpacking-eBook-Translated-by-LithiumLi-Unprotected.pdf
May-29-2016 23:07
111 Mo
Retro-Ingenierie C++ - Heritage et polymorphisme.pdf
May-01-2015 14:59
338 Ko
Reverse enginering.pdf
October-20-2010 15:01
269 Ko
Reversing - Secrets Of Reverse Engineering (2005).pdf
May-29-2016 23:07
8 Mo
Reversing CRC Theory and Practice.pdf
March-14-2011 17:31
624 Ko
Reversing Encrypted Callbacks and COM Interfaces.pdf
July-11-2014 12:03
1 Mo
Reversing Malware Analysis Training
March-29-2015 23:06
-
Serial fishing sur un soft.pdf
February-17-2010 15:41
227 Ko
SSTIC06-Castle in the Skype.pdf
May-29-2016 23:07
950 Ko
SSTIC2012-Miasm Framework de reverse engineering-slides.pdf
May-29-2016 23:07
589 Ko
SSTIC2012-Miasm Framework de reverse engineering.pdf
May-29-2016 23:07
728 Ko
The Art of Unpacking.pdf
May-29-2016 23:07
504 Ko
Tuto reversing - Comment enlever une protection anti-debug classique sur un executable.pdf
April-06-2010 00:11
1 Mo
Unpacking Virtualization Obfuscators.pdf
May-29-2016 23:08
130 Ko
Utilisation du framework triton pour l.analyse de code obfusque.pdf
May-29-2016 23:08
1004 Ko
Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.pdf
May-29-2016 23:08
891 Ko
This repository contains 1692 documents
Zenk-Security
Repository - 2009-2023 - report problems at support [at] zenk-security [dot] com