Win32 reverse shellcode - pt .1 - Locating the kernelbase.dll address
This blog post explains how to locate the kernelbase.dll address using winDbg debugger in x86 assembly
This blog post explains how to locate the kernelbase.dll address using winDbg debugger in x86 assembly
This post shows a way to bypass AV detection using a Fully UnDetectable Cryptor
Reverse Engineering GTER using IDA Pro instead of fuzzing
This post demonstrates a DEP bypass buffer overflow against the vulnerable CloudMe v1.11.2 application
This post demonstrates the creation of a custom cryptor using the Affine Cipher for the purpose of the SLAE32 certification course