7 total entries
Date | D | A | V | Title | Platform | Author |
---|---|---|---|---|---|---|
2014-11-24 |
![]() |
- | - | Deep Dive into ROP Payload Analysis | Papers | Sudeep Singh |
2014-09-09 |
![]() |
- | - | Breaking the Sandbox | Papers | Sudeep Singh |
2014-02-05 |
![]() |
- | - | Reversing Encrypted Callbacks and COM Interfaces | Papers | Sudeep Singh |
2014-01-05 |
![]() |
- | - | Control Flow Obfuscations in Malwares | Papers | Sudeep Singh |
2012-05-30 |
![]() |
- | - | Breaking The Crypt - Advanced Hash Cracking | Papers | Sudeep Singh |
2012-04-17 |
![]() |
- | - | JavaScript Deobfuscation - A Manual Approach | Papers | Sudeep Singh |
2012-03-09 |
![]() |
- | - | Deep Dive Into OS Internals with Windbg | Papers | Sudeep Singh |
7 total entries