|
You are here |
www.humansecurity.com | ||
| | | | |
steakenthusiast.github.io
|
|
| | | | | IntroductionWelcome to the first article in my series about Javascript deobfuscation. I won't be going in-depth regarding practical deobfuscation techniques; that'll be reserved for later articles. Ra | |
| | | | |
antoinevastel.com
|
|
| | | | | Example of a simple homemade JavaScript obfuscator applied on a security fingerprinting script. | |
| | | | |
x0rb3l.github.io
|
|
| | | | | OverviewIn Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine obfuscated strings on the stack. In this article, we will be conducting code analysis. Code analysis involves examining the code that comprises the specimen, only this time in a dynamic fashion. We will be using x32dbg as our debugger. The goal of Part III is to demonstrate how we can step through the malware's instructions and allow it to automatically reveal information about itself that is otherwise "invisible" while not running.x32dbgx32dbg is the 32-bit debugger that is a part of the open-source x64dbg software package. It is probably my favorite user mode Windows debugger due to its ease of use and fr... | |
| | | | |
ryanseddon.com
|
|
| | | Recently I have been playing around with CSS transitions and animations as implemented in webkit based browsers such as Safari and Chrome. They have been submitted to the W3C for consideration in the CSS3 spec so hopefully we should see more browsers support this soon, Firefox 3.5 supports CSS transforms which was developed by the webkit people to work alongside CSS animations & transitions. | ||