-
Recent Posts
- Build nwjs12 for windows
- Deobfuscate Javascript using PhantomJS (Headless browser)
- Angler Exploit kit breaks Referer chain using HTTPS to HTTP redirection
- Instrument Microsoft Office applications to defeat macro obfuscations
- Dealing with pcaps in windows using Fiddler/FiddlerCore
- Extend Sulo to find the CVE of Flash exploits
- Understanding CVE-2015-0310 Flash vulnerability
- Build and use PCRE in windows
Top Clicks
- None
May 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 -
Join 54 other subscribers
Archives
Categories
- .Net (3)
- ASP.Net (2)
- Binary Auditing (4)
- Bookmarklets (1)
- Books (5)
- browser (12)
- C/C++ (24)
- Chrome (36)
- chrome OS (3)
- Code review experiance (25)
- COM (3)
- Course (2)
- Cr-48 (17)
- doxygen (1)
- Exploit (13)
- Exploit Kit (14)
- Exploit Mitigation (1)
- Firefox (6)
- Flash (3)
- Fuzzing (4)
- Google (5)
- gSOAP (1)
- IDA Pro (8)
- IE (8)
- Internals (9)
- IOCTL (1)
- Kindle (1)
- Malware (14)
- Malware Analyzer (9)
- MITRE (1)
- Mozilla (1)
- Native Client (1)
- NPAPI (3)
- ole (1)
- Peach (2)
- Pentest (1)
- PPAPI (1)
- Presentation (1)
- python (6)
- Regex (2)
- Reversing (13)
- Safari (6)
- SDLC (4)
- Shellcode (3)
- Static Analysis (2)
- Symbols (1)
- Tools (9)
- Uncategorized (2)
- Vxworks (2)
- Web (8)
- webKit (3)
- Windows (25)
- Windows VC++ (17)
- XPCOM (1)
Blog Stats
- 175,066 hits
Meta