Skip content

151 160 187 results

Filter by

  • Technical Analysis of ELF/Spylock.A Malware for GNU/Linux

    Nettitude recently obtained a sample of some malware intended to run on GNU/Linux-based servers, with the purpose...

    Read more
  • Malware manual unpacking - [custom + upx]

    Malware Manual Unpacking - [Custom + UPX]

    Read more
  • Malware Manual Unpacking - [Custom + UPX]

    Implementing all sort of methods to bypass anti-virus (AV) scanners and/or to make the analysis of a malware...

    Read more
  • Version Tracking in Ghidra

    When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s...

    Read more
  • Vulnerability discovered in unsupported Cisco Systems VPN Client

    An alternative, but no less accurate title to this article would be ‘why you shouldn’t stick with...

    Read more
  • CVE-2015-5227: zeropress and remote code execution in the Wordpress...

    CVE-2015-5227: Zeropress and Remote Code Execution in the Wordpress Landing Pages Plugin

    Read more
  • Rocktastic

    To a penetration tester, passwords are very interesting. They are often simple dictionary words and they can tell...

    Read more
  • Reducing The Attack Surface: A Human Error Perspective

    The efforts required for a successful cyber-attack do not match the efforts that are invested to build a...

    Read more
  • Cyber Fighting Power – Who Has The Upper Hand?

    Reading through the British Army Military Doctrine manual the other day (as you do!) the concept of Fighting Power in...

    Read more
  • Cyber fighting power - who has the upper hand?

    Cyber Fighting Power, Who Has The Upper Hand?

    Read more

Error

Error

No results found

No results found that match your query

Loading results