Hacking .NET Applications: Reverse Engineering 101 – Jon McCoy
November 24th, 2012 | π
iSpeech Title: Hacking .NET Applications: Reverse Engineering 101 - Jon McCoy Abstract This speech will focus on Reverse Engineering and
November 24th, 2012 | π
iSpeech Title: Hacking .NET Applications: Reverse Engineering 101 - Jon McCoy Abstract This speech will focus on Reverse Engineering and
September 8th, 2012 | π
iSpeech This video is the part of our free community project on "Reverse engineering and Malware analysis" training. Training source
September 8th, 2012 | π
iSpeech.org This video is the part of our free community project on "Reverse engineering and Malware analysis" training. Training source
May 15th, 2012 | π
iSpeech.org This video is the part of our free community project on "Reverse engineering and Malware analysis" training. Training source
November 3rd, 2011 | π
https://www.ispeech.orgREC Studio is an interactive decompiler. It reads a Windows, Linux, Mac OS X or raw executable file, and attempts
November 1st, 2011 | π
iSpeechVirtual Machine for Android Reverse Engineering Do you need to analyze a piece of Android malware, but dont have all
September 7th, 2011 | π
TTS Demo Reverse Engineering the RSA Malware Attack Likes: 3 Viewed: source
October 5th, 2010 | π
https://www.ispeech.org Speakers: Elie Bursztein, Jocelyn Lagarenne, Dan Boneh While we were slaving away hacking an awesome memory analysis tool, Kartograph,
November 14th, 2009 | π
iSpeechEnabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering Automatic protocol reverse-engineering is important for many security applications,including the analysis and
October 14th, 2009 | π
https://www.ispeech.org/text.to.speech How to extract shellcode from a flash file with swfdump and python. The shellcode itself is a simple dropper
October 15th, 2008 | π
iSpeech.org This video shows how to create a meterpreter reverse connecting executable. It can be ported to a U3 device
Gloss