This whitepaper provides an in-depth deep dive analysis into .NET malware.
4bf2a76e6ce65ee5d3885552452725dbcd30099c84069e4aa2d4e7d6bff0e016
This paper introduces the reader to techniques that can be used to analyze ROP payloads that are used in exploits in the wild.
c59fd17c7b2afac02c08d3a8f60019731e7b3883890d412fa57a5ba5782de8a7
Whitepaper that discusses viruses that make use of COM interfaces to implement their functionality and how to reverse the binaries.
6bd84f361d4b7a3a4d92217238917f08e6f6a2c74e8d9597f60630d686bbaf8c
The purpose of this paper is to make the reader aware of various Hash Cracking Techniques ranging from Basic to Advanced. The intended audience for this paper is those who have a basic understanding of hash cracking and password hashing algorithms.
6c41eb42dce76b95d64a452addb5a968a83f179dde367f0854ad7f166b86b909
Whitepaper called JavaScript Deobfuscation - A Manual Approach.
f62eacd0b6de91f97b5724b5c6970f9e9ca83dcf56688802e7c335036028d5a8