[ICO]NameLast modifiedSize
[parent]Parent Directory  -
[   ]Alan Sguigna & Ivan Rouzanov_JTAG debug of Windows Hyper-V Secure Kernel with WinDbg and DCIEXDI.pdf2025-12-19 20:41 1.8M
[   ]Alessandro Di Federico & Pietro Fezzardi_Path of rev.ng-ance from raw bytes to CodeQL on decompiled code.pdf2025-12-19 20:41 4.4M
[   ]Andrea Allievi & Satoshi Tanda_Hypervisor-enforced Paging Translation - The end of non data-driven Kernel Exploits.pdf2025-12-19 20:41 2.1M
[   ]Bálint Varga-Perke_Control Flow Intergrity on IBM i.pdf2025-12-19 20:41 6.8M
[   ]Chris Alladoum_Tips & Tricks for better debugging with WinDbg.pdf2025-12-19 20:41 5.1M
[text]Chris Alladoum_Tips & Tricks for better debugging with WinDbg_Cheatsheet.txt2025-12-19 20:41 51
[   ]Chris Bellows_DaBootZone Breaking the DA1469x BootROM.pdf2025-12-19 20:41 16M
[   ]Cindy Xiao_Reversing Rust Binaries One step beyond strings (workshop).pdf2025-12-19 20:41 9.3M
[text]Cindy Xiao_Reversing Rust Binaries One step beyond strings (workshop)_code .txt2025-12-19 20:41 59
[   ]Erik Egsgard_Tales From The Crypt Bug Hunting in the Windows CryptoAPI.pdf2025-12-19 20:41 4.5M
[   ]Erwan Grelet_Seeing Through Themida's Code Mutation .pdf2025-12-19 20:41 1.2M
[text]Erwan Grelet_Seeing Through Themida's Code Mutation_plugin.txt2025-12-19 20:41 44
[   ]Gabriel Landau_Smoke and Mirrors Driver Signatures Are Optional.pdf2025-12-19 20:41 3.9M
[text]Gabriel Landau_Smoke and Mirrors Driver Signatures Are Optional_code.txt2025-12-19 20:41 54
[   ]Gijs Rijnders_Cryptography is hard Breaking the DoNex ransomware.pdf2025-12-19 20:41 1.9M
[   ]Holger Unterbrink_Architecture Analysis of VMProtect 3.8 Demystifying the Complexity.pdf2025-12-19 20:41 9.4M
[text]Is_not_in_this_List.txt2025-12-19 20:41 1.8K
[   ]Joshua Reynolds_Automating Malware Deobfuscation with Binary Ninja.pdf2025-12-19 20:41 2.8M
[text]Joshua Reynolds_Automating Malware Deobfuscation with Binary Ninja_code.txt2025-12-19 20:41 58
[   ]Joshua Reynolds_Automating Malware Deobfuscation with Binary Ninja_workshop.pdf2025-12-19 20:41 3.3M
[   ]Laurie Kirk_Manipulating Malware Forcing Android Malware to Self-Unpack.pdf2025-12-19 20:41 2.5M
[   ]Lucas GEORGES_Open Sesame stack smashing your way into opening doors.pdf2025-12-19 20:41 17M
[   ]Mateusz Jurczyk_Peeling Back the Windows Registry Layers A Bug Hunter's Expedition.pdf2025-12-19 20:41 4.0M
[   ]Silvio & Davide Fontana & Antonio Villani_An unexpected journey into Microsoft Defender's signature World.pdf2025-12-19 20:41 3.5M
[   ]Sultan Qasim Khan & James Chambers_Reverse Engineering the PowerG Wireless Protocol .pdf2025-12-19 20:41 7.3M
[   ]Tim Blazytko & Moritz Schloegel_Unleashing AI The Future of Reverse Engineering with Large Language Models.pdf2025-12-19 20:41 2.2M
[text]Tim Blazytko & Moritz Schloegel_Unleashing AI The Future of Reverse Engineering with Large Language Models_tools.txt2025-12-19 20:41 40