A Brief History of Malware (Part 3)

A Brief History of Malware (Part 2)

Module Extraction and DLL Hijacking Detection via Single or Multiple Memory Dumps

A Brief History of Malware (Part 1)

Recovering Data from the Memory of Telegram Desktop (and other IM Applications)

Hybrid-encryption Sockets using Crypto++

Disabling DEP in Windows 7 using rop3

Writing a Volatility 3 Plugin

How powerful are Return Oriented Programming attacks?

Reverse-Engineering the String Decryption Algorithm of Mekotio

© 2024 RME-DisCo Research Group

Theme by Anders NorénUp ↑