Skip to content
okread

Reverse Engineering

Home » Reverse Engineering
  • View:
  • 12
  • 24
  • All
  • Advanced Metamorphic Techniques in Computer Viruses Quick View
    • Advanced Metamorphic Techniques in Computer Viruses Quick View
    • Reverse Engineering
    • Advanced Metamorphic Techniques in Computer Viruses

    • $0.00
    • Nowadays viruses use polymorphic techniques to mutate their code on each replication, thus evading detection by antiviruses. However detection by emulation can defeat simple polymorphism: thus metamorphic techniques are used which thoroughly change the viral code, even after decryption. We briefly detail this evolution of virus protection techniques against detection and then study the METAPHOR virus, today’s most advanced metamorphic…
    • Read now
  • Analysis and Visualization of Common Packers Quick View
    • Analysis and Visualization of Common Packers Quick View
    • Reverse Engineering
    • Analysis and Visualization of Common Packers

    • $0.00
    • Read now
  • Anti-Debugging techniques Quick View
    • Anti-Debugging techniques Quick View
    • Reverse Engineering
    • Anti-Debugging techniques

    • $0.00
    • Anti-Debugging techniques take different forms from hiding code from reverse engineers and also to avoiding programs from automated analysis in virtual environments. Gone were days where the malwares encryption used XOR or some algorithms implemented like LZMA in UPX or used simple API to check debugger detection. My day-to-day experience with malwares through Comodo Antivirus for 3 years not only…
    • Read now
  • Hacking Secret Ciphers with Python Quick View
    • Hacking Secret Ciphers with Python Quick View
    • Reverse Engineering
    • Hacking Secret Ciphers with Python

    • $0.00
    • There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap. This book is for complete beginners who do not…
    • Read now
  • Inside Code Virtualizer Quick View
    • Inside Code Virtualizer Quick View
    • Reverse Engineering
    • Inside Code Virtualizer

    • $0.00
    • Code Virtualizer is a powerful code obfuscation system that helps developers protect their sensitive code areas against Reverse Engineering. Code Virtualizer has been designed to enact high security for your sensitive code while requiring minimal system resources. Code Virtualizer will convert your original code into Virtual Opcodes that will be only understood by an internal Virtual Machine. Those Virtual Opcodes…
    • Read now
  • Overview of one-byte opcodes Quick View
    • Overview of one-byte opcodes Quick View
    • Reverse Engineering
    • Overview of one-byte opcodes

    • $0.00
    • Read now
  • Packer Analysis Report-Debugging and unpacking the NsPack 3.4 and 3.7 packer. Quick View
    • Packer Analysis Report-Debugging and unpacking the NsPack 3.4 and 3.7 packer. Quick View
    • Reverse Engineering
    • Packer Analysis Report-Debugging and unpacking the NsPack 3.4 and 3.7 packer.

    • $0.00
    • This document provides instructions on how to unpack NsPack 3.4 and 3.7 using the OllyDbg debugger. The OllyScripts used in this process are included in the appendixes. The custom plug-ins that are used to automate the procedure are provided with the source code. This paper also includes instructions on how to fully restore the import table so the file can…
    • Read now
  • polymorphic virus analysis Quick View
    • polymorphic virus analysis Quick View
    • Reverse Engineering
    • polymorphic virus analysis

    • $0.00
    • The virus is Polymorphic and very infectious.  EPO : Entry Point Obscuring - the entry point address in the header is not modified, the virus injects code in the real entry point and hops around a few times, before it jumps to the virus entry point. Obfuscated layers, using junk instructions, and different decryption operations (simple ones tho). The junks…
    • Read now
  • Reversing Secrets of Reverse Engineering Quick View
    • Reversing Secrets of Reverse Engineering Quick View
    • Reverse Engineering
    • Reversing Secrets of Reverse Engineering

    • $0.00
    • It is amazing, and rather disconcerting, to realize how much software we run without knowing for sure what it does. We buy software off the shelf in shrinkwrapped packages. We run setup utilities that install numerous files, change system settings, delete or disable older versions and superceded utilities, and modify critical registry files. Every time we access a Web site,…
    • Read now
  • The Art of Unpacking Quick View
    • The Art of Unpacking Quick View
    • Reverse Engineering
    • The Art of Unpacking

    • $0.00
    • Read now
  • Home
  • Arts & Photography Books 11 product
  • Biographies & Memoirs 2727 products
  • Cloud computing 1818 products
  • computer 99 products
  • Fantasy 1515 products
  • Fantasy Manga 11 product
  • Finance 33 products
  • hacking 1919 products
  • Happiness 11 product
  • History 11 product
  • Humor & Entertainment 44 products
  • Linux 55 products
  • Literature & Fiction 1515 products
  • mythology 11 product
  • Politics & Social Sciences 11 product
  • Programming Language 33 products
  • Python (Computer program language) 55 products
  • Reverse Engineering 1010 products
  • Romance 66 products
  • Romance Manga 88 products
  • Social Aspects 11 product
  • Teacher & Student Mentoring 22 products
  • Tips And Tricks 22 products
  • Travel 11 product
×
×

Cart