#WebScene

#The biggest in small world

Miscellaneous content

nfo viewer bug fixing for win7

# nfo viewer bug fixing for win7

application upgrade with Ollydbg and reshacker....

The API-Guide

# The API-Guide

The API-Guide Readme Sunday, 2002/03/31 1. Program Specific Information: API-Guide Readme 2. General informa...

AutoPlay Media Studio rip Script Extract/Replace

# AutoPlay Media Studio rip Script Extract/Replace

how AutoPlay Media Studio Script Extract/Replace...

The Unofficial XM File Format Specification

# The Unofficial XM File Format Specification

The Unofficial XM File Format Specification: FastTracker II, ADPCM and Stripped Module Subformats...

L'Ethique Hacker et l'Esprit de l'ère de l'informa

# L'Ethique Hacker et l'Esprit de l'ère de l'informa

...

DotNet Signing

# DotNet Signing

Object: After patching a .NET file will NOT be executed anymore... Cause: Microsoft Framework checks integrity for some files. ...

Wireless Networking

# Wireless Networking

A Wireless networking tutorial, in the end is shown how to create a Peer-to-Peer Network using an UTP cable. This is NOT a reve...

Manual deobfuscate javascript code

# Manual deobfuscate javascript code

The javascript have many custom obfuscators, In this tutorial you can see how manual deobfuscate some custom js obfuscators. ...

offensive security advanced windows exploitation

# offensive security advanced windows exploitation

Writing exploits on modern Windows based platforms over the years has become a complex dance of memory manipulation to circumven...

Fuzzing Brute Force Vulnerability Discovery

# Fuzzing Brute Force Vulnerability Discovery

Fuzzing has evolved into one of today’s most effective approaches to test software security. To “fuzz,” you attach a program’s i...

A Guide to Kernel Exploitation: Attacking the Core

# A Guide to Kernel Exploitation: Attacking the Core

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliabl...

A Bug Hunters Diary

# A Bug Hunters Diary

Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerab...

[Persian] How to Buffer Overflow and Exploiting

# [Persian] How to Buffer Overflow and Exploiting

...

The Shellcoder's Handbook: Discovering and Exploit

# The Shellcoder's Handbook: Discovering and Exploit

- Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily...

Exploiting Software: How to Break Code

# Exploiting Software: How to Break Code

Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problem...