I would like to continue my previous tutorial post on how to analyze ROP stack with IDA. Today, I am going to share a simple

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
I would like to continue my previous tutorial post on how to analyze ROP stack with IDA. Today, I am going to share a simple
Hi Reverser, I am gonna share a basic malware or exploit development to bypass Data Execution Protection (DEP) by implementing ROP. ROP exploitation is process
I like to share about how to generate a .sig file in order to help IDA to detect the function during reversing the code. It
Here is the next post that I promissed to create a simple list of the export function manually with C code. Why parsing manually of
Today, I want to write about small C code that enable you to listing out dll export and parsing some PE values from the headers.
Hi Fellows, After quite sometimes that having no update on the blog especially things related to reverse engineering. In this session, I would like to