post Hacking through imagesAttack reverse engineering Security UncategorizedOctober 22, 2013January 9, 2019
post ZeuS Evolution: it’s time for P2P and RSA.Attack reverse engineering Security UncategorizedJune 16, 2013January 9, 2019
post Finding path to known functions through IDA-ProAttack Security UncategorizedMay 4, 2013January 9, 2019