Industrial Security.
Industrial Security.
Offensive Security & Explotation
Exploitation.
Exploitation.
Windows & Linux Kernel
Practical Pentesting
Practical Pentesting
Real world cybersecurity attack.
Tool Development
Tool Development
Design and develop own tool.
Shellcode.
Shellcode.
Write a shellcode step by step with NASM.
Reverse Engineering
Reverse Engineering
Reversing, debugging and protecting a software with cryptography.
[Studying] Analyzing Poison Ivy

[Studying] Analyzing Poison Ivy

READ MORE +
[Learning] How to Manually Unpack UPX and ASPack

[Learning] How to Manually Unpack UPX and ASPack

READ MORE +
[Reverse Engineering] How I Found a Suspicious Redistribution of My Project

[Reverse Engineering] How I Found a Suspicious Redistribution of My Project

READ MORE +
[Studying] Analyzing ProRat

[Studying] Analyzing ProRat

READ MORE +
[Learning] How to Configure the Network of Your Virtual Machine using VMware Workstation

[Learning] How to Configure the Network of Your Virtual Machine using VMware Workstation

READ MORE +
[Troubleshooting] Installing VMware Tools on Windows XP and Windows 95 with VMware WorkStation 17

[Troubleshooting] Installing VMware Tools on Windows XP and Windows 95 with VMware WorkStation 17

READ MORE +
[Learning] How to Setup Your Experimental Environment for Malware Analysis

[Learning] How to Setup Your Experimental Environment for Malware Analysis

READ MORE +
[Studying] Analyzing BeastDoor

[Studying] Analyzing BeastDoor

READ MORE +
[Studying] Analyzing Sub7 (SubSeven)

[Studying] Analyzing Sub7 (SubSeven)

READ MORE +
[Studying] Analyzing Back Orifice

[Studying] Analyzing Back Orifice

READ MORE +