#webscene

#The biggest in small world

Tutorials published by n0x90

Unpacking ASProtect v1.22 - v1.23

# Unpacking ASProtect v1.22 - v1.23

A Shockwave Flash movie tutorial showing a method of unpacking ASProtect v1.22 - v1.23...

Patching - Babylon 9.0.2

# Patching - Babylon 9.0.2

Protection : Molebox v2.3.x Language : Microsoft Visual c++ 6.0 Tools : OllyDbg , RDG Packer Detector Method : Patching...

Keygenning AceHTML v6.6 Pro

# Keygenning AceHTML v6.6 Pro

Blowfish + Custom Base...

keygenning Dynamic Photo 5.4.0

# keygenning Dynamic Photo 5.4.0

Custom...

offensive security advanced windows exploitation

# offensive security advanced windows exploitation

Writing exploits on modern Windows based platforms over the years has become a complex dance of memory manipulation to circumven...

010 Editor V2.0

# 010 Editor V2.0

010_Editor_V2.0_Registration Cracking Tutorial by ThunderPwr...

Assembly Language for x86 Processors

# Assembly Language for x86 Processors

Assembly Language for x86 Processors, 7e is intended for use in undergraduate courses in assembly language programming and intro...

Windows Assembly Language and Systems Programming

# Windows Assembly Language and Systems Programming

Access Real mode from Protected mode; Protected mode from Real mode Apply OOP concepts to assembly language programs Interface a...

A Guide to Kernel Exploitation: Attacking the Core

# A Guide to Kernel Exploitation: Attacking the Core

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliabl...

The Art of Computer Virus Research and Defense

# The Art of Computer Virus Research and Defense

Peter Szor takes you behind the scenes of anti-virus research, showing howthey are analyzed, how they spread, and~~most importan...

The Standard C Library

# The Standard C Library

Prentice Hall's most important C programming title in years. A companion volume to Kernighan & Ritchie's C PROGRAMMING LANGUAGE....

Fuzzing Brute Force Vulnerability Discovery

# Fuzzing Brute Force Vulnerability Discovery

Fuzzing has evolved into one of today’s most effective approaches to test software security. To “fuzz,” you attach a program’s i...

AssemblyLanguage StepByStep:Programming With Linux

# AssemblyLanguage StepByStep:Programming With Linux

The eagerly anticipated new edition of the bestsellingintroduction to x86 assembly language The long-awaited third edition of t...

Adobe Flash Malware

# Adobe Flash Malware

Analysing of an Adobe Flash Malware by NCR...

Malware Detection  Advances in Information Securit

# Malware Detection Advances in Information Securit

This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains...