Explore >> Select a destination


You are here

reverse.put.as
| | www.huntandhackett.com
4.1 parsecs away

Travel
| | After months of dedicated research we cover a wide range of concealed code execution techniques and investigate their mechanisms and how to detect them.
| | blog.thalium.re
3.1 parsecs away

Travel
| | [AI summary] The blog post discusses the author's experience in vulnerability research and exploitation targeting Steam and its related products, including Steam Link and Remote Play. It covers various vulnerabilities such as format string vulnerabilities, request forgery, heap overflows, and a remote code execution (RCE) exploit. The author also details their interactions with HackerOne and Valve, highlighting the challenges in getting timely responses and the eventual resolution of the reported issues.
| | x0rb3l.github.io
4.8 parsecs away

Travel
| | OverviewIn Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine obfuscated strings on the stack. In this article, we will be conducting code analysis. Code analysis involves examining the code that comprises the specimen, only this time in a dynamic fashion. We will be using x32dbg as our debugger. The goal of Part III is to demonstrate how we can step through the malware's instructions and allow it to automatically reveal information about itself that is otherwise "invisible" while not running.x32dbgx32dbg is the 32-bit debugger that is a part of the open-source x64dbg software package. It is probably my favorite user mode Windows debugger due to its ease of use and fr...
| | sergioprado.blog
30.4 parsecs away

Travel
| TPM (Trusted Platform Module) is an international standard that enables trust in computing platforms in general, providing several security-related features for computer systems, including hashing, encryption, signing, random number generation, and many more!