#webscene

#The biggest in small world

Tutorials published by nimaarek

Exploiting Software: How to Break Code

# Exploiting Software: How to Break Code

Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problem...

Hacker Disassembling Uncovered

# Hacker Disassembling Uncovered

Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide...

Hacker Debugging Uncovered

# Hacker Debugging Uncovered

Tips for the practical use of debuggers, such as NuMega SoftIce, Microsoft Visual Studio Debugger, and Microsoft Kernel Debugger...

Shellcoder's Programming Uncovered

# Shellcoder's Programming Uncovered

How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this o...

Android Reverse Engineering

# Android Reverse Engineering

Slides of the presentation at the AnDevCon: Android Reverse Engineering...

Malware: Fighting Malicious Code

# Malware: Fighting Malicious Code

This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mai...

Android Internals A Confectioner's Cookbook - Vol1

# Android Internals A Confectioner's Cookbook - Vol1

An in-depth exploration of the inner-workings of Android: In Volume I, we take the perspective of the Power User as we delve int...

Android Application Reversing Via Android Mobile

# Android Application Reversing Via Android Mobile

small paper on Android Reversing based on reverse Target...

Offensive and Defensive Android Reversing

# Offensive and Defensive Android Reversing

Slides of the presentation at the DEFCON 23: Offensive and Defensive Android Reversing Thinking like an attacker, you will lear...

Disassembling Code : IDA Pro and SoftICE

# Disassembling Code : IDA Pro and SoftICE

This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level lang...

Disassembling Dalvik Bytecode

# Disassembling Dalvik Bytecode

...

Android Security: Attacks and Defenses

# Android Security: Attacks and Defenses

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android pl...

Android Deep DEX Analysis Technique

# Android Deep DEX Analysis Technique

Slides of the presentation at the Inc0gnito 2015: Android Deep DEX Analysis Technique...

Identifying Malicious Code Through Reverse Enginee

# Identifying Malicious Code Through Reverse Enginee

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. T...

Windows NT/2000 Native API Reference

# Windows NT/2000 Native API Reference

Windows NT/2000 Native API Reference is absolutely unique. Currently, documentation on WIndows NT's native APIs can only be foun...