I am continuing the last post regarding the process enumeration that we can use to find the target process that become the host of our
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
I am continuing the last post regarding the process enumeration that we can use to find the target process that become the host of our
Hi Guys, After taking some times to take some doing many other things, I am finally back writting small tutorial at my blog. If you
Hi everyone, I would like to share some basic patch diffing in this post. why patch diffing is important because it helps you to analyze
I would like to continue my previous tutorial post on how to analyze ROP stack with IDA. Today, I am going to share a simple
Hi Reverser, I am gonna share a basic malware or exploit development to bypass Data Execution Protection (DEP) by implementing ROP. ROP exploitation is process