Explore >> Select a destination


You are here

yurisk.info
| | www.lab539.com
4.0 parsecs away

Travel
| | This LimaCharlie lookup allows you to check whether binaries being executed on your Linux system are known malware and create rules or actions that trigger if so. This is a free lookup provided by Lab539 which pulls from various sources including our own sensor network.
| | blog.nuculabs.de
3.9 parsecs away

Travel
| | I always wanted to play around with a binary analysis framework but most of the time I was turned off by how difficult it was to install and use it. Just recently I've thought to give angr a try and now I want to share my experience with you! I will present you a two scripts that solve two challenges, if you wish to dig deeper and learn Angr then you should visit it's official documentation.
| | gist.github.com
3.8 parsecs away

Travel
| | Get process name and argv in Solaris from /proc/[pid/psinfo - solaris_getprocs.c
| | pentestlab.blog
21.0 parsecs away

Travel
| 1 post published by Administrator on March 9, 2017