<< CodeBreakers-Journal Collection List >> These documents were collected by AmesianX in powerhacker.net [ Codebreakers RECON 2006 - Conference Proceedings ] PaiMei - Reverse Engineering Framework 40-194-1-PB.pdf Pedram Amini Fixing Bugs in Binaries 44-208-1-PB.pdf Luis Miras Reverse Engineering Microsoft Binaries 39-188-1-PB.pdf Alexander Sotirov 39-190-1-PB.idb Reverse Engineering and the DMCA DMCA.html _ Woodmann Social Engineering for Penetration Testers 41-197-1-PB.pdf Sharon Conheady Disassembling and Patching Hardware 42-200-1-PB.pdf _ bunnie Fuzzing - Brute Force Vulnerability Discovery 43-204-1-PB.pdf Michael Sutton 43-205-1-PB.zip Cracking WiFiˇ¦ Faster! (Faster PwninG Assured) 45-211-1-PB.pdf David Hulton Insiders View: Network Security Devices 46-214-1-PB.pdf Dennis Cox Vanilla Skype 47-218-1-PB.pdf, 47-219-1-PB.pdf Fabrice Desclaux 47-220-1-PB.zip Secure Development with Static Analysis 48-223-1-PB.pdf Ted Unangst Subverting Windows 2003 SP1 Kernel Integrity Protection 49-226-1-PB.pdf Alex Ionescu IdaRub 50-230-1-PB.pdf _ spoonm 50-231-1-PB.zip Multi-cavity NOP-infection OS-Independent x86 Virus 51-234-1-PB.tgz Anthony de Almeida Lopes OllyBone - Semi-Automatic Unpacking on IA-32 52-237-1-PB.pdf Joe Stewart Tracing for Hardware, Driver and Binary Reverse Engineering in Linux 53-240-1-PB.pdf Mathieu Desnoyers Reversing our searching habits - Power searching without google 54-243-1-PB.pdf + Fravia Advancements in Anonymous eAnnoyance 55-248-1-PB.zip Christopher Abad 55-249-1-PB.zip Win32 Static Analysis in Python 56-252-1-PB.pdf Ero Carrera Unpacking bird's eye view 57-255-1-PB.pdf Ero Carrera Fire in the Skype - Skype powered botnets 58-258-1-PB.pdf Cedric Blancher [ Codebreakers 2006 Collection ] Reversing a Simple Virtual Machine 37-177-1-PB.pdf _ Maximus Processless Applications ˇ© Remotethreads 19-80-1-PB.pdf on Microsoft Windows 2000, XP and 2003 Thomas Kruse Sharepad 18-73-1-PB.pdf + Anubis Everything is Byte 16-65-1-PB.pdf + Mala Beginners Guide to Basic Linux Anti Anti 14-61-1-PB.pdf Debugging Techniques M. Schallner Guide on how to play with processes memory, 11-49-1-PB.pdf writing loaders, and Oraculumns 11-83-1-PB.rar Shub Nigurrath [ Codebreakers 2005 Collection ] Binary protection schemes CBJ-2005-51.pdf - Andrew Griffiths Beginners Guide to Basic Linux Anti Anti CBJ-2005-55.pdf Debugging Techniques - Henry Miller (aka 0xf001) Towards a Framework for Assembly Language CBJ-2005-56.pdf Testing - Thorsten Schneider Anti Reverse Engineering Uncovered CBJ-2005-57.pdf - Nicolas Brulez Award BIOS Code Injection CBJ-2005-58.pdf - Mappatutu Salihun Darmawan Advanced Award BIOS v4.51PG Hacking CBJ-2005-59.pdf - Mappatutu Salihun Darmawan Low Cost Embedded x86 Teaching Tool CBJ-2005-62.pdf - MS Darmawan Cracking with Loaders: Theory, General CBJ-2005-65.pdf Approach and a Framework - Shub-Nigurrath, ThunderPwr Scan of the Month 33 CBJ-2005-67.pdf - Bilbo Guide on How to Play with Processes Memory, CBJ-2005-70.pdf Write Loaders and Oraculumns - Shub-Nigurrath Embedded Reverse Engineering: Cracking CBJ-2005-72.pdf Mobile Binaries - Seth Fogie Portable Executable File Format - CBJ-2005-74.pdf A Reverse Engineer View - Goppit Cryptography in Data Compression CBJ-2005-75.pdf - Chung-E Wang Writing Loaders for DLLs: Theory and Techniques CBJ-2005-77.pdf - Shub-Nigurrath IDA Plug-In Writing in C/C++ CBJ-2005-79.pdf - Steve Micallef [ Codebreakers 2004 Collection ] Processless Applications - Remotethreads CBJ-2004-5.pdf on Microsoft Windows 2000, XP and 2003 - Thomas Kruse VX Reversing I, the basics CBJ-2004-17.pdf - Eduardo Labir Adding Imports By Hand CBJ-2004-18.pdf - Eduardo Labir 64-Bit - Programming and Assembly Issues CBJ-2004-19.pdf - Thorsten Schneider Abstract Algebra in Poly Engines CBJ-2004-20.pdf - Whitehead Coding Smart And Dynamic Code - For CBJ-2004-21.pdf better protections, and for the art of it! - The +Q Keygen Injection CBJ-2004-22.pdf - Kwazy Webbit Reverse Engineering the Service Control CBJ-2004-23.pdf Manager (SCM) - Doug XP SVCHOST Reversed - Services? CBJ-2004-24.pdf Processes? How many is too many! - Andrea Geddon Explaining Visual Basic CBJ-2004-25.pdf - B. Kathras Adding functions to any program CBJ-2004-26.pdf using a DLL - Dracon CRC and how to Reverse it CBJ-2004-27.pdf - Anarchriz Sharepad - Transforming the Windows CBJ-2004-28.pdf Notepad in Shareware - K. Anubis Introductory Primer To Polymorphism CBJ-2004-29.pdf - Opic Everything Is Byte CBJ-2004-31.pdf - +mala Protecting Applications with Petri Nets CBJ-2004-33.pdf - Robert Airapetyan - Thorsten Schneider AsProtect Notepad! CBJ-2004-34.pdf - E. Labir VX Reversing II, Sasser.B CBJ-2004-35.pdf - Eduardo Labir Unpacking by Code Injection CBJ-2004-36.pdf - E. Labir Minesweeper Reversing CBJ-2004-37.pdf - ZaiRoN Award BIOS Reverse Engineering CBJ-2004-38.pdf - Darmawan Mappatutu Salihun Replication from data files CBJ-2004-39.pdf - Roy G. Biv Hooking Windows API - Technics of CBJ-2004-40.pdf hooking API functions on Windows - Holy_Father Invisibility on NT boxes - How to CBJ-2004-41.pdf become unseen on Windows NT - Holy_Father Classes Restoration CBJ-2004-45.pdf - Hex VX Reversing III - Yellow Fever CBJ-2004-49.pdf (Griyo 29a) - Eduardo Labir