First Page | Document Content | |
---|---|---|
![]() Date: 2015-05-28 15:51:40EXE packers Debuggers Interactive Disassembler Obfuscation Source code Computer security Disassembler UPX Obfuscated code Computer programming Computing Software engineering | Add to Reading List |
![]() | Zero-day vulnerability discovery, analysis, triage, and exploitation. Advanced exploitation topics, including Windows mitigation bypasses (up toDocID: 1nNha - View Document |
![]() | Attacking Obfuscated Code with IDA Pro Chris EagleDocID: 18pND - View Document |
![]() | Executive Summary: IDA Pro – at the cornerstone of IT security What is IDA Pro? The official line is: IDA Pro combines an interactive, programmable, multi-processor disassembler coupled to a local and remote debuggerDocID: ZMCt - View Document |
![]() | VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS HIDAN AND DANGEROUS Peter Ferrie Symantec Security Response, USADocID: Xsph - View Document |
![]() | Microsoft PowerPoint - shmoo2007_conference.pptDocID: VS3U - View Document |