Here is a collection of classic documents researched by ancient hackers.
These documents were collected by AmesianX in 2004~2007.
(Recommended for hackers who like Shakespeare.)
:: Full Download :: Text Document Table ::
:: Update Download :: Text Document Table ::
RECON 2006 - Conference Proceedings
PaiMei - Reverse Engineering Framework | |
Pedram Amini | |
Fixing Bugs in Binaries | |
Luis Miras | |
Reverse Engineering Microsoft Binaries | PDF SUPP.FILES |
Alexander Sotirov | |
Reverse Engineering and the DMCA | HTML |
_ Woodmann | |
Social Engineering for Penetration Testers | |
Sharon Conheady | |
Disassembling and Patching Hardware | |
_ bunnie | |
Fuzzing - Brute Force Vulnerability Discovery | PDF SUPP. FILES |
Michael Sutton | |
Cracking WiFi… Faster! (Faster PwninG Assured) | |
David Hulton | |
Insiders View: Network Security Devices | |
Dennis Cox | |
Vanilla Skype | PDF PDF SUPP. FILES |
Fabrice Desclaux | |
Secure Development with Static Analysis | |
Ted Unangst | |
Subverting Windows 2003 SP1 Kernel Integrity Protection | |
Alex Ionescu | |
IdaRub | PDF SUPP. FILES |
_ spoonm | |
Multi-cavity NOP-infection OS-Independent x86 Virus | ARTICLE FILES |
Anthony de Almeida Lopes | |
OllyBone - Semi-Automatic Unpacking on IA-32 | |
Joe Stewart | |
Tracing for Hardware, Driver and Binary Reverse Engineering in Linux | SLIDES PAPER |
Mathieu Desnoyers | |
Reversing our searching habits - Power searching without google | |
+ Fravia | |
Advancements in Anonymous eAnnoyance | ARTICLE FILES ARTICLE FILES |
Christopher Abad | |
Win32 Static Analysis in Python | |
Ero Carrera | |
Unpacking bird's eye view | |
Ero Carrera | |
Fire in the Skype - Skype powered botnets | |
Cedric Blancher |
Codebreakers 2006 Collection
Reversing a Simple Virtual Machine | |
_ Maximus | |
Virtual Machine Rebuilding | |
_ Maximus | |
Processless Applications - Remotethreads on Microsoft Windows 2000, XP and 2003 | |
Thomas Kruse | |
Sharepad | |
+ Anubis | |
Everything is Byte | |
+ Mala | |
Beginners Guide to Basic Linux Anti Anti Debugging Techniques | |
M. Schallner | |
Guide on how to play with processes memory, writing loaders, and Oraculumns | PDF SUPP. FILES |
Shub Nigurrath | |
How to Write Your Own Packer | |
Big Boote | |
Reverse Engineering Backdoored Binaries | |
Chris R. | |
Virus Attacks | |
Giovanni Tropeano | |
Self Modifying Code | |
Giovanni Tropeano |
RECON 2005 - Conference Proceedings
Visual Analysis: 2D Does it Better in Color | PDF VIDEO |
Jack Whitsitt | |
The Dark Side of Winsock | PDF VIDEO |
Jonathan Levin | |
Syllogistic Application Testing | |
Robert E. Lee | |
Wizard searching: reversing the commercial web for fun and knowledge | PDF VIDEO |
+ Fravia | |
Auditing Source Code | PDF VIDEO |
Nish Bhalla | |
Recent Shellcode Developments | PDF VIDEO |
_ spoonm | |
Binary Protection Schemes | PDF VIDEO SUPP. FILES |
Andrew Griffiths | |
Passive Asset Detection System | PDF VIDEO |
Matt Shelton | |
Packet Mastering the Monkey Way - Introduction to network programmi- ng with libevent. libdnet and libnids | PDF VIDEO |
Jose Nazario | |
Using honeyclients to discover new attacks | PDF VIDEO SUPP. FILES |
Kathy Wang | |
CUTLASS - Encrypted Communications for Everyone | PDF VIDEO |
Todd MacDermid | |
Anonymous Blogging Submission | PDF VIDEO |
Adam Shostack | |
Analyzing Malicious Code - Disassembly with a time constraint | PDF VIDEO |
Nicolas Brulez | |
Attacking WiFi networks with traffc injection - Why open and WEP 802.11 networks really suck | PDF VIDEO SUPP. FILES |
Cedric Blancher | |
Practical Attacks on a Proximity Card | PDF VIDEO |
Jonathan Westhues | |
Process Stalking - Run-Time Visual Reverse Engineering | PDF VIDEO |
Pedram Amini | |
Hardening Registration Number Protection Schemes against Reverse Code Engineering with Multithreaded Petri Nets | PDF VIDEO SUPP. FILES |
Dr. Thorsten Schneider | |
recon2005_ryan_russell_keynote | VIDEO |
recon2005_reverse_engineering_panel | VIDEO |
Codebreakers 2005 Collection
Binary protection schemes | |
Andrew Griffiths | |
Beginners Guide to Basic Linux Anti Anti Debugging Techniques | |
Henry Miller (aka 0xf001) | |
Towards a Framework for Assembly Language Testing | |
Thorsten Schneider | |
Anti Reverse Engineering Uncovered | |
Nicolas Brulez | |
Award BIOS Code Injection | |
Mappatutu Salihun Darmawan | |
Advanced Award BIOS v4.51PG Hacking | |
Mappatutu Salihun Darmawan | |
Low Cost Embedded x86 Teaching Tool | |
MS Darmawan | |
Cracking with Loaders: Theory, General Approach and a Framework | |
Shub-Nigurrath, ThunderPwr | |
Scan of the Month 33 | |
Bilbo | |
Guide on How to Play with Processes Memory, Write Loaders and Oraculumns | |
Shub-Nigurrath | |
Embedded Reverse Engineering: Cracking Mobile Binaries | |
Seth Fogie | |
Portable Executable File Format - A Reverse Engineer View | |
Goppit | |
Cryptography in Data Compression | |
Chung-E Wang | |
Writing Loaders for DLLs: Theory and Techniques | |
Shub-Nigurrath | |
IDA Plug-In Writing in C/C++ | |
Steve Micallef |
Codebreakers 2004 Collection
Processless Applications Remotethreads on Microsoft Windows 2000, XP and 2003 | |
Thomas Kruse | |
VX Reversing I, the basics | |
Eduardo Labir | |
Adding Imports By Hand | |
Eduardo Labir | |
64-Bit - Programming and Assembly Issues | |
Thorsten Schneider | |
Abstract Algebra in Poly Engines | |
Whitehead | |
Coding Smart And Dynamic Code - For better protections, and for the art of it! | |
The +Q | |
Keygen Injection | |
Kwazy Webbit | |
Reverse Engineering the Service Control Manager (SCM) | |
Doug | |
XP SVCHOST Reversed | |
Andrea Geddon | |
Explaining Visual Basic | |
B. Kathras | |
Adding functions to any program using a DLL | |
Dracon | |
CRC and how to Reverse it | |
Anarchriz | |
Sharepad - Transforming the Windows Notepad in Shareware | |
K. Anubis | |
Introductory Primer To Polymorphism | |
Opic | |
Everything Is Byte | |
+mala | |
Protecting Applications with Petri Nets | |
Robert Airapetyan Thorsten Schneider |
|
AsProtect Notepad! | |
E. Labir | |
VX Reversing II, Sasser.B | |
Eduardo Labir | |
Unpacking by Code Injection | |
E. Labir | |
Minesweeper Reversing | |
ZaiRoN | |
Award BIOS Reverse Engineering | |
Darmawan Mappatutu Salihun | |
Replication from data files | |
Roy G. Biv | |
Hooking Windows API - Technics of hooking API functions on Windows | |
Holy_Father | |
Invisibility on NT boxes - How to become unseen on Windows NT | |
Holy_Father | |
Classes Restoration | |
Hex | |
VX Reversing III - Yellow Fever (Griyo 29a) | |
Eduardo Labir |