Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2021.05.26.md
IRC Botnet Reverse Engineering Part 1 - Preparing Binary for Analysis in IDA PRO - https://www.youtube.com/watch?v=JPvcLLYR0tE
VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture - https://back.engineering/17/05/2021/
The Solution of the Zodiac Killer’s 340-Character Cipher - https://blog.wolfram.com/2021/03/24/the-solution-of-the-zodiac-killers-340-character-cipher/
Beginner Reverse Engineering | Part 2: Compiling and Decompiling (Ghidra + IDA) - https://www.youtube.com/watch?v=Bv-7SszPuvI
Changing Service Mesh - https://nais.io/blog/posts/2021/05/changing-service-mesh.html
Dumping Stored Credentials with SeTrustedCredmanAccessPrivilege - https://www.tiraniddo.dev/2021/05/dumping-stored-credentials-with.html
IRC Botnet Reverse Engineering Part 1 - Preparing Binary for Analysis in IDA PRO - https://www.youtube.com/watch?v=JPvcLLYR0tE
VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture - https://back.engineering/17/05/2021/
The Solution of the Zodiac Killer’s 340-Character Cipher - https://blog.wolfram.com/2021/03/24/the-solution-of-the-zodiac-killers-340-character-cipher/
Beginner Reverse Engineering | Part 2: Compiling and Decompiling (Ghidra + IDA) - https://www.youtube.com/watch?v=Bv-7SszPuvI
Changing Service Mesh - https://nais.io/blog/posts/2021/05/changing-service-mesh.html
Dumping Stored Credentials with SeTrustedCredmanAccessPrivilege - https://www.tiraniddo.dev/2021/05/dumping-stored-credentials-with.html
Zaloguj się aby komentować