#webscene

#The biggest in small world

Tutorials published by nimaarek

Exploiting Software: How to Break Code

# Exploiting Software: How to Break Code

Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problem...

Hacker Disassembling Uncovered

# Hacker Disassembling Uncovered

Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide...

Hacker Debugging Uncovered

# Hacker Debugging Uncovered

Tips for the practical use of debuggers, such as NuMega SoftIce, Microsoft Visual Studio Debugger, and Microsoft Kernel Debugger...

Shellcoder's Programming Uncovered

# Shellcoder's Programming Uncovered

How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this o...

Android Reverse Engineering

# Android Reverse Engineering

Slides of the presentation at the AnDevCon: Android Reverse Engineering...

Malware: Fighting Malicious Code

# Malware: Fighting Malicious Code

This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mai...

Offensive and Defensive Android Reversing

# Offensive and Defensive Android Reversing

Slides of the presentation at the DEFCON 23: Offensive and Defensive Android Reversing Thinking like an attacker, you will lear...

Android Application Reversing Via Android Mobile

# Android Application Reversing Via Android Mobile

small paper on Android Reversing based on reverse Target...

Disassembling Code : IDA Pro and SoftICE

# Disassembling Code : IDA Pro and SoftICE

This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level lang...

Android Internals A Confectioner's Cookbook - Vol1

# Android Internals A Confectioner's Cookbook - Vol1

An in-depth exploration of the inner-workings of Android: In Volume I, we take the perspective of the Power User as we delve int...

Android Security: Attacks and Defenses

# Android Security: Attacks and Defenses

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android pl...

Identifying Malicious Code Through Reverse Enginee

# Identifying Malicious Code Through Reverse Enginee

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. T...

Android Deep DEX Analysis Technique

# Android Deep DEX Analysis Technique

Slides of the presentation at the Inc0gnito 2015: Android Deep DEX Analysis Technique...

Windows NT/2000 Native API Reference

# Windows NT/2000 Native API Reference

Windows NT/2000 Native API Reference is absolutely unique. Currently, documentation on WIndows NT's native APIs can only be foun...

Disassembling Dalvik Bytecode

# Disassembling Dalvik Bytecode

...