How to use PyDbg as a powerful multitasking debugger
Evdokimov python arsenal for re
Debugging Windbg
The Ida Pro Book
Attacking and Defending Mobile Applications
Introduction to Intel x86 Assembly, Architecture, Applications, & Alliteration Xeno Kovah – 2009/2010 xkovah at gmail Approved for Public Release: 10-3348.
Information Gathering. Before an attack What information do we need? WHOIS details OS & web server details (NetCraft, whois.webhosting.info) DNS information,
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices Steve Hanna 1, Rolf Rolles 4, Andres.
Solution to warsaw's crackme1.1
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Reversing & malware analysis training part 9 advanced malware analysis
"egg" - A stealth fine grained code analyzer