Shellcode

Results: 175



#Item
91Shellcode / Instruction set architectures / Metasploit Project / X86 / Computer security / Cyberwarfare / Computer architecture

Microsoft PowerPoint - Shmoocon2008.pptx

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:09
92Computer programming / Control flow / JavaScript / Scripting languages / SpiderMonkey / Eval / Shellcode / GetElementById / Hooking / Computing / Software engineering / Cross-platform software

Jsunpack: An Automatic JavaScript Unpacker http://jsunpack.jeek.org/ Shmoocon, Washington DC Sunday February 8, 2009 Blake Hartstein

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:37
93Address space layout randomization / Data Execution Prevention / Exploit / Pointer / JIT spraying / Computer security / Cyberwarfare / Shellcode

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos, and David Brumley Carnegie Mellon University[removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
94Computer hardware / Unified Extensible Firmware Interface / System Management Mode / Advanced Configuration and Power Interface / Booting / Trusted Execution Technology / Shellcode / BIOS / System software / Computing

Attacking UEFI Boot Script Rafal Wojtczuk Corey Kallenberg Bromium, Inc.

Add to Reading List

Source URL: bromiumlabs.files.wordpress.com

Language: English - Date: 2015-01-06 13:48:32
95Cyberwarfare / Computer security / Polymorphic code / Rootkit / Computer virus / Shellcode / Code injection / VirusTotal.com / DLL injection / System software / Malware / Antivirus software

Bypass Antivirus Dynamic Analysis Limitations of the AV model and how to exploit them Date of writing: [removed]Author: Emeric Nasi – emeric.nasi[at]sevagas.com Website: http://www.sevagas.com/

Add to Reading List

Source URL: www.gironsec.com

Language: English - Date: 2014-08-25 06:22:22
96Microsoft Windows / Shellcode / Blaster / Welchia / Windows XP / Windows Registry / Svchost.exe / Mydoom / Windows / Malware / System software / Computer worms

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS 1 THE WORMPIRE STRIKES BACK Peter Ferrie, Frédéric Perriot Symantec Security Response, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
97Machine code / Assembly languages / Computing / MOV / JMP / Shellcode / X86 assembly language / Electronic engineering / JIT spraying / X86 architecture / X86 instructions / CPUID

VIRUS BULLETIN www.virusbtn.com TECHNICAL FEATURE ANTI-UNPACKER TRICKS – PART FOURTEEN Peter Ferrie

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
98Scripting languages / Cross-platform software / Heap spraying / Machine code / JavaScript / Shellcode / NOP slide / NOP / Address space layout randomization / Computing / Software engineering / Computer programming

Nozzle: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan, Cornell University Ben Livshits and Ben Zorn, Microsoft Research (Redmond, WA)

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-08-24 10:51:00
99JIT spraying / Heap spraying / Shellcode / Cross-platform software / Address space layout randomization / Self-modifying code / Just-in-time compilation / NOP / JavaScript engine / Software / Computing / System software

Microsoft Word - pp44s-wei31-1.doc

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-05-09 22:15:56
100Concurrency / Shellcode / Computer programming / Parallel computing / Concurrency control / Event dispatching thread / Multithreading / Computing / Threads / Concurrent computing

Creating User-Friendly Exploits Skylar Rampersaud Security Research

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2009-03-25 18:45:02
UPDATE