I would like to continue my previous tutorial post on how to analyze ROP stack with IDA. Today, I am going to share a simple
Hi Reverser, I am gonna share a basic malware or exploit development to bypass Data Execution Protection (DEP) by implementing ROP. ROP exploitation is process
Hi Friends Another tutorial on penetration testing and red teaming. I would like to share a small tool that can help you on doing the
Hi Fellow, As usual that I am going to write a tutorial on some stuff that is quite interesting during penetration testing or red teaming.
I like to share about how to generate a .sig file in order to help IDA to detect the function during reversing the code. It
I would like to discuss the attack that happened on May 2021 to one of the biggest web programming language that support about 79% web