application upgrade with Ollydbg and reshacker....
The API-Guide Readme Sunday, 2002/03/31 1. Program Specific Information: API-Guide Readme 2. General informa...
how AutoPlay Media Studio Script Extract/Replace...
The Unofficial XM File Format Specification: FastTracker II, ADPCM and Stripped Module Subformats...
Object: After patching a .NET file will NOT be executed anymore... Cause: Microsoft Framework checks integrity for some files. ...
A Wireless networking tutorial, in the end is shown how to create a Peer-to-Peer Network using an UTP cable. This is NOT a reve...
The javascript have many custom obfuscators, In this tutorial you can see how manual deobfuscate some custom js obfuscators. ...
Writing exploits on modern Windows based platforms over the years has become a complex dance of memory manipulation to circumven...
Fuzzing has evolved into one of today’s most effective approaches to test software security. To “fuzz,” you attach a program’s i...
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliabl...
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerab...
- Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily...
Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problem...