In-Memory Fuzzing with Java
Tags:
fuzzing,
memory-fuzzing,
papers
Ideas of advanced runtime Encryption of .NET Executables
Tags:
gtm,
hsyg,
jdc,
papers
Reversing & Malware Analysis Training Articles
Tags:
papers,
training,
training-articles
Reversing & Malware Analysis Training Presentations
Tags:
exploit,
papers,
Security
[Spanish] Penetration Testing – Analisis Web – Evaluacion de Vulnerabilidades – Explotacion
Tags:
evaluacion,
papers,
penetration
[Turkish] Exploitation of MsSQL Servers Explained
Tags:
exploit,
exploitation,
papers
Guidelines for Pentesting a Joomla Based Site
Tags:
facebook,
obj-endobj,
papers,
sxx,
tools
[Spanish] Software Exploitation
Tags:
exploit,
papers,
software-exploitation
Checkpoint/SofaWare Firewall Vulnerability Research
Tags:
database-connection,
papers
Sophail: Applied attacks against Sophos Antivirus
Tags:
obj-endobj,
papers,
tools