Page 2 of 2

Writing a Volatility 3 Plugin

How powerful are Return Oriented Programming attacks?

Reverse-Engineering the String Decryption Algorithm of Mekotio

Unrelocating Windows Modules (II)

Unrelocating Windows Modules (I)

Digging into malloc

Authenticode (II): Verifying Authenticode with OpenSSL

Authenticode (I): Understanding Windows Authenticode

hello world

© 2024 RME-DisCo Research Group

Theme by Anders NorénUp ↑