πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Dynamic Binary Instrumentation

Focus Area: πŸ”¬ Reverse Engineering
10
Total Entries
11
Contributors

Top Contributors

Achute Sharma(1) Anto Joseph(1) Aseem Jakhar(1) Ayan Saha(1) Dhruv Soi(1)

All Entries (10 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-10-23Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswas#darkwidow#windows#exploit-delivery+4
2023-09-23TalkNullcon Android-SigMorph: Covert Communication Exploiting Android Signing Schemes Presentation Video Ayan Saha, Achute Sharma#android#application-pentesting#static-analysis+1
2020-09-18TalkC0c0n Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Video Kaustubh Padwad#red-teaming#security-assessment#iot-device-management+4
2017-10-19TalkHacklu Bug hunting using symbolic virtual machines! Video Anto Joseph#bug-hunting#binary-analysis#fuzzing+2
2015-08-01TalkC0c0n Reversing and Deciphering the Cyber Espionage Malware Communications Monnappa K A#reverse-engineering#decipher#malware-research+3
2015-02-06TalkNullcon Generic Executable Unpacking using Dynamic Binary Instrumentation Presentation Shubham Bansal#blueteam#dynamic-binary-instrumentation#executable-analysis+1
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soi#red-teaming#exploit-kit#malware-distribution+4
2011-02-25TalkNullcon Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) Presentation Whitepaper Sunil Kumar#dynamic-binary-instrumentation#code-analysis#dynamic-analysis+3
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakhar#linux#red-teaming#malware-research+2
2006-09-21TalkHitbsecconf Finding Secrets in ISAPI Presentation Nish Bhalla#secure-coding#reverse-engineering#application-pentesting+4