Diary of a reverse-engineer
订阅

最新

1. Competing in Pwn2Own ICS 2022 Miami: Exploiting a zero click remote memory corruption in ICONICS Genesis64 exploitation ‧ Axel "0vercl0k" Souchet
2. Pwn2Own 2021 Canon ImageCLASS MF644Cdw writeup exploitation ‧ Nicolas "NK" Devillers & Jean-Romain "JRomainG" Garnier & Raphaël "_trou_" Rigo
3. Competing in Pwn2Own 2021 Austin: Icarus at the Zenith exploitation ‧ Axel "0vercl0k" Souchet
4. Building a new snapshot fuzzer & fuzzing IDA misc ‧ Axel "0vercl0k" Souchet
5. Reverse-engineering tcpip.sys: mechanics of a packet of the death (CVE-2021-24086) reverse-engineering ‧ Axel "0vercl0k" Souchet
6. Modern attacks on the Chrome browser : optimizations and deoptimizations exploitation ‧ Jeremy "@__x86" Fetiveau
7. A journey into IonMonkey: root-causing CVE-2019-9810. exploitation ‧ Axel "0vercl0k" Souchet
8. Circumventing Chrome's hardening of typer bugs exploitation ‧ Jeremy "__x86" Fetiveau
9. Introduction to TurboFan exploitation ‧ Jeremy "__x86" Fetiveau
10. Introduction to SpiderMonkey exploitation. exploitation ‧ Axel "0vercl0k" Souchet
11. CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime. exploitation ‧ yrp
12. Breaking ledgerctf's AES white-box challenge reverse-engineering ‧ Axel "0vercl0k" Souchet
13. beVX challenge on the operation table reverse-engineering ‧ Axel "0vercl0k" Souchet
14. Debugger data model, Javascript & x64 exception handling debugging ‧ Axel "0vercl0k" Souchet
15. Binary rewriting with syzygy, Pt. I misc ‧ Axel "0vercl0k" Souchet
16. happy unikernels exploitation ‧ yrp
17. Token capture via an llvm-based analysis pass misc ‧ Axel "0vercl0k" Souchet
18. Keygenning with KLEE reverse-engineering ‧ Michele "brt_device" Bertasi
19. Spotlight on an unprotected AES128 white-box implementation obfuscation ‧ Axel "0vercl0k" Souchet
20. Taming a wild nanomite-protected MIPS binary with symbolic execution: No Such Crackme reverse-engineering ‧ Axel "0vercl0k" Souchet & Emilien "tr4nce" Girault
21. Dissection of Quarkslab's 2014 security challenge reverse-engineering ‧ Axel "0vercl0k" Souchet
22. Corrupting the ARM Exception Vector Table exploitation ‧ Amat "acez" Cama
23. Deep dive into Python's VM: Story of LOAD_CONST bug exploitation ‧ Axel "0vercl0k" Souchet
24. First dip into the kernel pool : MS10-058 exploitation ‧ Jeremy "__x86" Fetiveau
25. Having a look at the Windows' User/Kernel exceptions dispatcher reverse-engineering ‧ Axel "0vercl0k" Souchet
26. Breaking Kryptonite's obfuscation: a static analysis approach relying on symbolic execution reverse-engineering ‧ Axel "0vercl0k" Souchet
27. Pinpointing heap-related issues: OllyDbg2 off-by-one story debugging ‧ Axel "0vercl0k" Souchet
28. Some thoughts about code-coverage measurement with Pin misc ‧ Axel "0vercl0k" Souchet
29. Regular expressions obfuscation under the microscope obfuscation ‧ Axel "0vercl0k" Souchet
更新于 22 分钟前

近期历史最近 100 条记录

2022-06-14 Pwn2Own 2021 Canon ImageCLASS MF644Cdw writeup exploitation ‧ Nicolas "NK" Devillers & Jean-Romain "JRomainG" Garnier & Raphaël "_trou_" Rigo
2022-05-02 Competing in Pwn2Own 2021 Austin: Icarus at the Zenith exploitation ‧ Axel "0vercl0k" Souchet
2021-08-02 Building a new snapshot fuzzer & fuzzing IDA misc ‧ Axel "0vercl0k" Souchet
2021-04-15 Reverse-engineering tcpip.sys: mechanics of a packet of the death (CVE-2021-24086) reverse-engineering ‧ Axel "0vercl0k" Souchet
2021-03-17 A journey into IonMonkey: root-causing CVE-2019-9810. exploitation ‧ Axel "0vercl0k" Souchet
2021-03-17 Modern attacks on the Chrome browser : optimizations and deoptimizations exploitation ‧ Jeremy "@__x86" Fetiveau
2019-07-09 A journey into IonMonkey: root-causing CVE-2019-9810. ion ‧ Axel "0vercl0k" Souchet
2019-07-09 Circumventing Chrome's hardening of typer bugs v8 ‧ Jeremy "__x86" Fetiveau
2019-07-09 Introduction to TurboFan v8 ‧ Jeremy "__x86" Fetiveau
2019-07-09 Introduction to SpiderMonkey exploitation. spidermonkey ‧ Axel "0vercl0k" Souchet
2019-07-09 CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime. JavascriptCore ‧ yrp
2019-07-09 Breaking ledgerctf's AES white-box challenge reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-07-09 beVX challenge on the operation table reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-07-09 Debugger data model, Javascript & x64 exception handling debugging ‧ Axel "0vercl0k" Souchet
2019-07-09 Binary rewriting with syzygy, Pt. I binary rewriting ‧ Axel "0vercl0k" Souchet
2019-07-09 happy unikernels unikernel ‧ yrp
2019-07-09 Token capture via an llvm-based analysis pass fuzzing ‧ Axel "0vercl0k" Souchet
2019-07-09 Keygenning with KLEE reverse-engineering ‧ Michele "brt_device" Bertasi
2019-07-09 Spotlight on an unprotected AES128 white-box implementation obfuscation ‧ Axel "0vercl0k" Souchet
2019-07-09 Taming a wild nanomite-protected MIPS binary with symbolic execution: No Such Crackme reverse-engineering ‧ Axel "0vercl0k" Souchet & Emilien "tr4nce" Girault
2019-07-09 Dissection of Quarkslab's 2014 security challenge python ‧ Axel "0vercl0k" Souchet
2019-07-09 Corrupting the ARM Exception Vector Table exploitation ‧ Amat "acez" Cama
2019-07-09 Deep dive into Python's VM: Story of LOAD_CONST bug python ‧ Axel "0vercl0k" Souchet
2019-07-09 First dip into the kernel pool : MS10-058 reverse-engineering ‧ Jeremy "__x86" Fetiveau
2019-07-09 Having a look at the Windows' User/Kernel exceptions dispatcher coding ‧ Axel "0vercl0k" Souchet
2019-07-09 Breaking Kryptonite's obfuscation: a static analysis approach relying on symbolic execution reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-07-09 Pinpointing heap-related issues: OllyDbg2 off-by-one story reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-07-09 Some thoughts about code-coverage measurement with Pin reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-07-09 Regular expressions obfuscation under the microscope reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-05-09 Circumventing Chrome's hardening of typer bugs exploitation ‧ Jeremy "__x86" Fetiveau
2019-05-08 Introduction to TurboFan exploitation ‧ Jeremy "__x86" Fetiveau
2019-05-08 Introduction to SpiderMonkey exploitation. exploitation ‧ Axel "0vercl0k" Souchet
2019-05-08 CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime. exploitation ‧ yrp
2019-05-08 Breaking ledgerctf's AES white-box challenge reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-05-08 beVX challenge on the operation table reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-05-08 Debugger data model, Javascript & x64 exception handling debugging ‧ Axel "0vercl0k" Souchet
2019-05-08 Binary rewriting with syzygy, Pt. I misc ‧ Axel "0vercl0k" Souchet
2019-05-08 happy unikernels exploitation ‧ yrp
2019-05-08 Token capture via an llvm-based analysis pass misc ‧ Axel "0vercl0k" Souchet
2019-05-08 Keygenning with KLEE reverse-engineering ‧ Michele "brt_device" Bertasi
2019-05-08 Spotlight on an unprotected AES128 white-box implementation obfuscation ‧ Axel "0vercl0k" Souchet
2019-05-08 Taming a wild nanomite-protected MIPS binary with symbolic execution: No Such Crackme reverse-engineering ‧ Axel "0vercl0k" Souchet & Emilien "tr4nce" Girault
2019-05-08 Dissection of Quarkslab's 2014 security challenge reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-05-08 Corrupting the ARM Exception Vector Table exploitation ‧ Amat "acez" Cama
2019-05-08 Deep dive into Python's VM: Story of LOAD_CONST bug exploitation ‧ Axel "0vercl0k" Souchet
2019-05-08 First dip into the kernel pool : MS10-058 exploitation ‧ Jeremy "__x86" Fetiveau
2019-05-08 Having a look at the Windows' User/Kernel exceptions dispatcher reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-05-08 Breaking Kryptonite's obfuscation: a static analysis approach relying on symbolic execution reverse-engineering ‧ Axel "0vercl0k" Souchet
2019-05-08 Pinpointing heap-related issues: OllyDbg2 off-by-one story debugging ‧ Axel "0vercl0k" Souchet
2019-05-08 Some thoughts about code-coverage measurement with Pin misc ‧ Axel "0vercl0k" Souchet
2019-05-08 Regular expressions obfuscation under the microscope obfuscation ‧ Axel "0vercl0k" Souchet

匿名用户只展示最新 100 条榜单历史,更多历史数据请登录后查看,支持时光机按天筛选

Sponsors

今日解忧 - 赛博修行,舒缓静心,21世纪解压神器!
今日历 - 全球最全的日历,日历届的航空母舰!
百晓生AI - 全能创作助手

猜你喜欢