MACHINE CODE |
2019-07-08 | Didier Stevens | Machine Code? No! |
2019-07-04 | Didier Stevens | Machine Code? |
MACHINE |
2020-07-04/a> | Russ McRee | Happy FouRth of July from the Internet Storm Center |
2019-07-08/a> | Didier Stevens | Machine Code? No! |
2019-07-04/a> | Didier Stevens | Machine Code? |
2013-10-22/a> | Richard Porter | Greenbone and OpenVAS Scanner |
2013-08-09/a> | Kevin Shortt | Copy Machines - Changing Scanned Content |
2010-06-17/a> | Deborah Hale | Digital Copy Machines - Security Risk? |
CODE |
2021-01-18/a> | Didier Stevens | Doc & RTF Malicious Document |
2020-10-14/a> | Xavier Mertens | Nicely Obfuscated Python RAT |
2020-09-02/a> | Xavier Mertens | Python and Risky Windows API Calls |
2020-08-06/a> | Xavier Mertens | A Fork of the FTCode Powershell Ransomware |
2020-07-27/a> | Didier Stevens | Analyzing Metasploit ASP .NET Payloads |
2019-12-12/a> | Xavier Mertens | Code & Data Reuse in the Malware Ecosystem |
2019-10-27/a> | Didier Stevens | Using scdbg to Find Shellcode |
2019-07-08/a> | Didier Stevens | Machine Code? No! |
2019-07-04/a> | Didier Stevens | Machine Code? |
2019-05-31/a> | Didier Stevens | Retrieving Second Stage Payload with Ncat |
2019-05-30/a> | Didier Stevens | Analyzing First Stage Shellcode |
2019-05-06/a> | Didier Stevens | Text and Text |
2019-05-01/a> | Xavier Mertens | Another Day, Another Suspicious UDF File |
2019-04-23/a> | Didier Stevens | Malicious VBA Office Document Without Source Code |
2019-03-24/a> | Didier Stevens | Decoding QR Codes with Python |
2019-02-25/a> | Didier Stevens | Sextortion Email Variant: With QR Code |
2019-01-02/a> | Didier Stevens | Maldoc with Nonfunctional Shellcode |
2018-09-24/a> | Didier Stevens | Analyzing Encoded Shellcode with scdbg |
2018-09-08/a> | Didier Stevens | Video: Using scdbg to analyze shellcode |
2018-09-03/a> | Didier Stevens | Another quickie: Using scdbg to analyze shellcode |
2018-08-31/a> | Jim Clausing | Quickie: Using radare2 to disassemble shellcode |
2018-06-04/a> | Rob VandenBrink | Digging into Authenticode Certificates |
2018-02-12/a> | Didier Stevens | Analyzing compressed shellcode |
2017-04-16/a> | Johannes Ullrich | Tool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains |
2016-11-24/a> | Didier Stevens | Extracting Shellcode From JavaScript |
2016-11-18/a> | Didier Stevens | VBA Shellcode and Windows 10 |
2016-09-26/a> | Didier Stevens | VBA and P-code |
2015-09-21/a> | Xavier Mertens | Detecting XCodeGhost Activity |
2015-03-30/a> | Didier Stevens | YARA Rules For Shellcode |
2013-10-25/a> | Johannes Ullrich | PHP.net compromise aftermath: Why Code Signing Beats Hashes |
2013-08-04/a> | Johannes Ullrich | BBCode tag "[php]" used to inject php code |
2013-02-16/a> | Lorna Hutcheson | Fedora RedHat Vulnerabilty Released |
2012-07-19/a> | Mark Baggett | A Heap of Overflows? |
2012-04-26/a> | Richard Porter | Packetstorm Security and Metasploit have Exploit code for MS12-027 |
2012-04-25/a> | Daniel Wesemann | Blacole's shell code |
2012-03-16/a> | Russ McRee | MS12-020 RDP vulnerabilities: Patch, Mitigate, Detect |
2012-03-11/a> | Johannes Ullrich | An Analysis of Jester's QR Code Attack. (Guest Diary) |
2011-08-11/a> | Guy Bruneau | BlackBerry Enterprise Server Critical Update |
2011-08-03/a> | Johannes Ullrich | Malicious Images: What's a QR Code |
2011-03-07/a> | Bojan Zdrnja | Oracle padding attacks (Codegate crypto 400 writeup) |
2010-05-12/a> | Rob VandenBrink | Adobe Shockwave Update |
2010-03-10/a> | Rob VandenBrink | Microsoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7 |
2010-02-08/a> | Adrien de Beaupre | When is a 0day not a 0day? Fake OpenSSh exploit, again. |
2009-08-08/a> | Guy Bruneau | XML Libraries Data Parsing Vulnerabilities |
2009-05-29/a> | Lorna Hutcheson | VMWare Patches Released |
2008-07-22/a> | Mari Nichols | ‘Cold Boot’ Attack Utility Tools |
2008-06-10/a> | Swa Frantzen | Ransomware keybreaking |