[ICO]Name Last modified Size

[DIR]Parent Directory  -
[DIR]Advanced_Malware_Analysis_Training_SecurityXplodedMarch-29-2015 23:37 -
[PDF]Analyse d un packer de trojan et programmation d un unpacker.pdfJuly-11-2014 12:00 756 Ko
[PDF]CodeBreakers 2006 - AntiDebugging techniques.pdfMay-29-2016 23:07 217 Ko
[PDF]Comment contourner la protection aleatoire de la pile sur le noyau 2.6.pdfApril-16-2010 01:11 1 Mo
[PDF]Construction d un desassembleur de taille oriente Hooking.pdfApril-16-2010 01:11 2 Mo
[PDF]Control Flow Obfuscations in Malwares.pdfJuly-11-2014 12:03 2 Mo
[PDF]Corruption de la memoire lors de l exploitation.pdfMarch-03-2010 22:06 510 Ko
[PDF]Crack de Auto Window Manager.pdfMarch-17-2010 23:51 249 Ko
[PDF]Cracker les SSHA sous LDAP.pdfOctober-20-2010 15:01 501 Ko
[PDF]Cracking ZIP file s Password.pdfJune-14-2014 21:22 16 Ko
[PDF]Cracking_Passwords_Guide.pdfMarch-29-2015 22:55 272 Ko
[PDF]Crackme KillNag de KiTo.pdfOctober-20-2010 15:01 152 Ko
[PDF]Creating code obfuscation Virtual Machines.pdfMay-29-2016 23:07 612 Ko
[DIR]DeamonMarch-29-2015 23:35 -
[PDF]Deobfuscation of Virtualization-Obfuscated Software.pdfMay-29-2016 23:07 192 Ko
[PDF]Depassement de capacite de la pile.pdfMarch-20-2010 23:15 1001 Ko
[PDF]EN-Decimalisation Table Attacks For PIN Cracking.pdfMarch-14-2011 17:31 223 Ko
[PDF]Etude d un Loader Tout en Memoire pour Packer.pdfJuly-11-2014 12:22 475 Ko
[PDF]Exploit writing tutorial part 7 Unicode - from 0.00410041 to calc.pdfJanuary-11-2015 22:33 622 Ko
[PDF]GDB - petit tutoriel.pdfOctober-20-2010 15:01 84 Ko
[PDF]HARES: Hardened Anti-Reverse Engineering System.pdfMay-29-2016 23:07 241 Ko
[PDF]Hi GDB, this is python.pdfMay-29-2016 23:07 242 Ko
[PDF]How We Cracked the Code Book Ciphers.pdfOctober-20-2010 15:01 272 Ko
[PDF]IDA L usine a Gaz.pdfJuly-11-2014 12:02 532 Ko
[PDF]Ingenierie inverse du code executable ELF dans l analyse apres intrusion.pdfApril-16-2010 01:12 226 Ko
[PDF]Introduction au format Portable Executable.pdfOctober-20-2010 15:01 3 Mo
[PDF]Intro Reverse et Patch Android.pdfJuly-11-2014 12:02 2 Mo
[DIR]KromCrackMarch-29-2015 23:35 -
[PDF]Manual Unpacking d Anti007 2.5.pdfOctober-20-2010 15:01 376 Ko
[PDF]Multi-stage Binary Code Obfuscation using Improved Virtual Machine.pdfMay-29-2016 23:07 485 Ko
[PDF]OllyDbg.pdfJanuary-03-2010 19:21 446 Ko
[PDF]OllyDbg 2.0 Brief Help.pdfJune-03-2010 23:03 372 Ko
[PDF]Packer-analysis-report-debugging-unpacking-nspack-3.4-packer-3.7.pdfMarch-29-2015 22:58 5 Mo
[PDF]pas-a-pas-vers-l-assembleur-par-lord-noteworthy.pdfOctober-20-2010 15:01 2 Mo
[DIR]PifomanMarch-29-2015 23:35 -
[PDF]Practical Reverse Engineering.pdfMay-29-2016 23:07 5 Mo
[PDF]radare.pdfJuly-11-2014 12:03 281 Ko
[PDF]RCE-Unpacking-eBook-Translated-by-LithiumLi-Unprotected.pdfMay-29-2016 23:07 111 Mo
[PDF]Retro-Ingenierie C++ - Heritage et polymorphisme.pdfMay-01-2015 14:59 338 Ko
[PDF]Reverse enginering.pdfOctober-20-2010 15:01 269 Ko
[PDF]Reversing - Secrets Of Reverse Engineering (2005).pdfMay-29-2016 23:07 8 Mo
[PDF]Reversing CRC Theory and Practice.pdfMarch-14-2011 17:31 624 Ko
[PDF]Reversing Encrypted Callbacks and COM Interfaces.pdfJuly-11-2014 12:03 1 Mo
[DIR]Reversing Malware Analysis TrainingMarch-29-2015 23:06 -
[PDF]Serial fishing sur un soft.pdfFebruary-17-2010 15:41 227 Ko
[PDF]SSTIC06-Castle in the Skype.pdfMay-29-2016 23:07 950 Ko
[PDF]SSTIC2012-Miasm Framework de reverse engineering-slides.pdfMay-29-2016 23:07 589 Ko
[PDF]SSTIC2012-Miasm Framework de reverse engineering.pdfMay-29-2016 23:07 728 Ko
[PDF]The Art of Unpacking.pdfMay-29-2016 23:07 504 Ko
[PDF]Tuto reversing - Comment enlever une protection anti-debug classique sur un executable.pdfApril-06-2010 00:11 1 Mo
[PDF]Unpacking Virtualization Obfuscators.pdfMay-29-2016 23:08 130 Ko
[PDF]Utilisation du framework triton pour l.analyse de code obfusque.pdfMay-29-2016 23:08 1004 Ko
[PDF]Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.pdfMay-29-2016 23:08 891 Ko


This repository contains 1692 documents
Zenk-Security Repository - 2009-2023 - report problems at support [at] zenk-security [dot] com