Source Byte
7.79K subscribers
852 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from Art of Engineering (Mohsen)
Name: Portable Format Specification (ELF32)
Requirements: Compiling Steps, C Programming
Level: Intermediate
Author: Tools Interface Standards (TIS)

Chapters:

1- Object Files
1- Introduction
2- ELF Header
3- Sections
4- String Table
5- Symbol Table
6- Relocation

2- Program Loading and Dynamic Linking
1- Introduction
2- Program Header
3- Program Loading
4- Dynamic Linking

3- C Library
1- C Library

#elf #reverse_engineering #binary #paper #resource
Forwarded from Art of Engineering (Mohsen)
Name: Portable Format Specification (PE/EXE)
Requirements: Compiling Steps, C Programming
Level: Intermediate
Author: Tools Interface Standards (TIS)

Chapters:

1 - Overview
2 - PE Header
3 - Object Table
4 - Image Pages
5 - Exports
6 - Imports
7 - Thread Local Storage
8 - Resources
9 - Fixup Table
10 - Debug Information

#pe #exe #reverse_engineering #binary #paper #resource
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Infosec Fortress
Skochinsky - Recon (2011) - Practical C++ Decompilation
#reverse
#binary
#slides
———
🆔 @Infosec_Fortress
🔥2👍1
Forwarded from Infosec Fortress
Recon-2011-Skochinsky.pdf
794 KB
4👍1
Forwarded from Infosec Fortress
Cindy Xiao - Reversing Rust Binaries
#binary
#reverse
#slides
———
🆔 @Infosec_Fortress
👍3
Forwarded from Infosec Fortress
Reversing_Rust_Binaries_One_Step_Beyond_Strings_Cindy_Xiao_NorthSec.pdf
73.2 MB
5👏2
Forwarded from Infosec Fortress
Sina Karvandi - Chasing Bugs with Hypervisors

#virtualization
#slides
#binary
———
🆔 @Infosec_Fortress
👍51
Forwarded from Infosec Fortress
Chasing Bugs With-In Hypervisors.pdf
1.3 MB
👾3👍2
Forwarded from Infosec Fortress
Zhang Yunhai - BYPASS CONTROL FLOW GUARD COMPREHENSIVELY - Blackhat

#binary
#exploitation
———
🆔 @Infosec_Fortress
5👍3
Forwarded from Infosec Fortress
us-15-Zhang-Bypass-Control-Flow-Guard-Comprehensively-wp.pdf
425.2 KB
👍3👎1
Forwarded from Infosec Fortress
Windows 10 Segment Heap Internals

#binary
#windows
#internals
———
🆔 @Infosec_Fortress
👍32👾1
Forwarded from Infosec Fortress
us-16-Yason-Windows-10-Segment-Heap-Internals-wp.pdf
1.8 MB
👍5👾2
Forwarded from Infosec Fortress
The Kernel Hacker's Guide to the Galaxy
Automating Exploit Engineering Workflows
H2HC 2024

#binary
#kernel
#exploitation
———
🆔 @Infosec_Fortress
👍3
Forwarded from Cafe Security (Mohammad)
Architecture Analysis of VMProtect 3.8

The focus will be on the new architecture for the latest VMProtect and techniques for attacking or reversing protected binaries. I will demonstrate how reverse engineering techniques—such as symbolic execution and binary instrumentation—can facilitate the de-virtualization or de-obfuscation of the protected code.

https://youtu.be/IMUUjTJzmFI?si=I02CASpsIo_w6G1B

#binary
#reverse
#vmp
#conference
@cafe_security
5
Forwarded from Infosec Fortress (Amir M. Jahangirzad)
SSTIC2025_Slides_windows_kernel_shadow_stack_mitigation_aulnette.pdf
2.8 MB
Analyzing the Windows kernel shadow stack mitigation

#slides
#binary
#windows
#exploitation
#shadow_stack
———
🆔 @Infosec_Fortress
5