Shellcode

Results: 175



#Item
111Software testing / Hacking / Nessus / Shellcode / Vulnerability / Exploit / Tenable Network Security / Hacker / Nmap / Software / Computer security / Cyberwarfare

Secrets of Vulnerability Scanning: Nessus, Nmap and More Ron Bowes - Researcher, Tenable Network Security 1

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2012-07-11 15:31:33
112Windows shell / Software / Computing / Shellcode / Portable Executable / Microsoft Windows

Windows Shellcode Mastery BlackHat Europe 2009 Benjamin CAILLAT ESIEA - SI&S lab

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
113Malware / Microsoft Office / Microsoft Excel / Software / Shellcode / Microsoft PowerPoint

Microsoft PowerPoint - New advances in Ms Office malware analysis.pptx

Add to Reading List

Source URL: www.reconstructer.org

Language: English - Date: 2010-06-24 04:10:45
114Instruction set architectures / Windows Mobile / ARM architecture / X86 assembly language / Windows Phone / Shellcode / MOV / X86 / Microsoft Reader / Computer architecture / Computing / Windows CE

Threats On Your Smartphone Celil ÜNÜVER , SignalSEC Inc. What is a smartphone?

Add to Reading List

Source URL: media.hacking-lab.com

Language: English - Date: 2011-03-15 03:59:12
115MOV / X86 / Shellcode / CPUID / Decompiler / Computer architecture / X86 architecture / X86 instructions

OptiROP: the art of hunting ROP gadgets - Proposal for Blackhat USA 2013 Nguyen Anh Quynh Abstract Return-Oriented-Programming (ROP) is the fundamental technique to bypass the widely-used DEP-based exp

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 04:35:32
116Computer file formats / Portable Document Format / Computer file / MongoDB / MHTML / File system fragmentation / Computing / Data management / Shellcode

Leveraging File Artifacts for Threat Intelligence SANS Cyber Threat Intelligence Summit 2014 Who’s This… Guy? • David Dorsey, Click Security, [removed]

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-02-18 18:49:31
117Shellcode / Software testing / Malware / Digital rights management / Exploit / Domain Name System / Google Chrome / Vulnerability / Software / Computing / Cyberwarfare

The Rotten Tomato Campaign By Gabor Szappanos, Principal Researcher, SophosLabs Hungary A SophosLabs technical paper – October 2014

Add to Reading List

Source URL: www.sophos.com

Language: English - Date: 2014-10-30 11:35:02
118Software bugs / Stack buffer overflow / Memory safety / Buffer overflow / Vulnerability / Arbitrary code execution / Rootkit / Shellcode / Code injection / Computer security / Cyberwarfare / Computing

Recent Developments in Low-Level Software Security Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, and Frank Piessens IBBT-Distrinet, Katholieke Universiteit Leuven, Belgium, [removed]uve

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:02
119Debugging / Disassembler / Programming language implementation / Shellcode / Assembly language / X86 / Cross-platform / ARM architecture / Linux kernel / Computing / Computer architecture / Instruction set architectures

Capstone: Next-Gen Disassembly Framework www.capstone-engine.org Nguyen Anh Quynh, Coseinc

Add to Reading List

Source URL: capstone-engine.org

Language: English - Date: 2014-08-08 11:54:22
120Software bugs / Shellcode / Buffer overflow / Computer file formats / Address space layout randomization / Dynamic-link library / Heap overflow / Stack / Metasploit Project / Computing / Computer security / Cyberwarfare

BYPASSING EMET 4.1 Jared DeMott Security Researcher [removed]

Add to Reading List

Source URL: bromiumlabs.files.wordpress.com

Language: English - Date: 2014-02-24 02:03:23
UPDATE