Login  |  Register

Latest links

AutoIt Obfuscator — Obfuscation for AutoIt Script Source Code

Oct 9, 2016 |
PR: 0
Obfuscate your AutoIt script source code & algorithms to protect it against reverse engineering analysis, cracking and decompilation. ... Read more

PE Format Poster

Jan 15, 2014 |
PR: 1
A PE Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with comments from WinNT.h header file). ... Read more

BugChecker

Mar 7, 2011 |
PR: 2
BugChecker is a single-host kernel debugger for the Microsoft Windows 2000 and XP operating systems. "Single-host" means that the debugger and the debuggee (in this case the whole system, ... Read more

Valkyrie

Jan 1, 2011 |
N/A
A Decompiler for Clipper S87 & CA-Clipper 5. Supports CA-Clipper 5.0 through 5.2 ... Read more

Flasm

Oct 15, 2010 |
PR: 4
Flasm disassembles your entire SWF including all the timelines and events. Looking at disassembly, you learn how the Flash compiler works, which improves your ActionScript skills. You can also do some ... Read more

Popular Listings

Rasta Ring0 Debugger

Apr 3, 2008 |
PR: 5
RR0D is a ring 0 debugger. It offers the possibility to debug any kind of code (kernel/user/rasta land). Its philosophy is to be OS independent. That's why RR0D can today be installed on Linux, *BSD, ... Read more

ReFox

Apr 3, 2008 |
PR: 3
ReFox is a multi-purpose and easy-to-use utility for viewing and restoring source code from Visual FoxPro 9.0, VFP 8.0, VFP 7.0, VFP 6.0, VFP 5.0, VFP 3.0, FoxPro 2.x, FoxPro 1 and FoxBASE+ compiled ... Read more

Valkyrie

Jan 1, 2011 |
N/A
A Decompiler for Clipper S87 & CA-Clipper 5. Supports CA-Clipper 5.0 through 5.2 ... Read more

Immunity Debugger

Apr 3, 2008 |
PR: 5
Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry's first heap ... Read more

Microsoft Portable Executable and Common Object File Format Specification

Apr 4, 2008 |
PR: 0
This document specifies the structure of executable (image) files and object files under the Microsoft Windows family of operating systems. These files are referred to as Portable Executable (PE) and ... Read more

Krebs on Security

This blog will feature posts on a number of recurring themes , including: Online Crime Investigations: A major focus of my work over the past half decade has been to highlight individuals, networks and entities that — according to multiple sources — appear to facilitate or directly participate in illicit activity online. This blog will continue that tradition. Latest Threats: Every now and then, the bad guys work out a clever new wrinkle in an old scam, or an ingenious way of attacking Internet users. Count on these type of entries to pop up quite a bit, including tips on how to protect yourself. Security Updates: Like it or not, security is a process, not some set-it-and-forget it task. Malicious hackers by and large are an opportunistic lot: They prey on the lazy, casual and uninformed users, such as those who neglect to update their PDF reader software, or routinely play audio and movie files with media software that hasn’t been updated in a while. In the spirit of the Security Fix blog, krebsonsecurity.com will periodically point to the availability of new critical security updates for widely-used software. Data Breaches: I’ll be writing about the big ones, and hopefully continuing to break news about breaches that haven’t yet been reported publicly. Cyber Justice: Because it’s gratifying to read about people responsible for this crap getting busted or locked up.
PR: 3

Alexa site popularity graph