Finally working on my security project.
The scope of project is decided. But its the non - organizational way o=f doing my work that is going to trouble me.I have done a lot of research but I forget to keeep proper refrence of any of my work. Now again I have to search from scratch to do my work but I know this time what i want from myself.
Some useful URLS http://www.securityxploded.com/unpackingupx.php
http://thnetos.wordpress.com/2008/02/25/tutorial-finding-the-oep-of-an-upacked-binary-file/
how to edit PE FILES
http://www.codeproject.com/KB/system/inject2exe.aspx
dump ollydbg
https://www.openrce.org/blog/view/1135/Basic_tutorial_about_how_to_dump_a_process_and_update_the_IAT_
using_Immunity_Debug,_LordPE,_and_ImpRec
edit PE
http://www.strchr.com/creating_self-extracting_executables
library for PE modification
http://www.pelib.com/documentation.php
- ADF: Invoke row selection on table having single row.
- Algorithm to find the Control dependeny using PostDominator tree in llvm
- LLVM profiling...
- Buffer overflow attack on ubutu 10.10 tutorial.
- A method for drawing arrow in Applet
- Starting With LLVM installation
- Packed Malwares
- Some Puzzles
- PeLib - An open-source C++ library to modify PE files.
- Finally working on my security project.
- Assembly In VC++
- Working On LLVM an infrastructure for Compilers
- Dissecting Virus
- Backdoor.Hacarmy.D
- Code Obfuscation
0 comments:
Post a Comment