A forum for reverse engineering, OS internals and malware analysis 

Discussion on reverse-engineering and debugging.
Forum Statistics Last post
4 Replies 
 17832 Views
 by Buster_BSA
 Tue Dec 18, 2012 9:36 am
2 Replies 
 6068 Views
 by EP_X0FF
 Wed Dec 12, 2012 10:09 am
ASLR definition in windows 8
by _MAX_  - Sat Nov 10, 2012 12:42 am
2 Replies 
 5752 Views
 by rkhunter
 Mon Dec 10, 2012 5:58 pm
problem eith Ndrclientcall2 API
by borgir  - Sun Dec 09, 2012 12:59 pm
0 Replies 
 4182 Views
 by borgir
 Sun Dec 09, 2012 12:59 pm
0 Replies 
 4499 Views
 by rkhunter
 Sat Dec 01, 2012 10:44 am
Load ntoskrnl in userspace
by _MAX_  - Fri Nov 23, 2012 1:13 am
17 Replies 
 21193 Views
 by EP_X0FF
 Sat Nov 24, 2012 4:31 pm
Patching HalDispatchTable
by _MAX_  - Wed Nov 21, 2012 4:20 pm
4 Replies 
 7640 Views
 by _MAX_
 Thu Nov 22, 2012 7:48 pm
Entry Point from Kernel mode
by utsav.0202  - Fri Nov 16, 2012 12:12 pm
9 Replies 
 12130 Views
 by rossetoecioccolato
 Mon Nov 19, 2012 11:50 pm
6 Replies 
 9877 Views
 by R136a1
 Sat Nov 17, 2012 4:04 pm
Forensic tools and scripts for malware analysis
by rinn  - Thu Nov 15, 2012 3:11 pm
0 Replies 
 4448 Views
 by rinn
 Thu Nov 15, 2012 3:11 pm
How to get FSD dispatch function original address?
by myid  - Sun Nov 11, 2012 4:00 pm
7 Replies 
 9119 Views
 by myid
 Mon Nov 12, 2012 10:26 am
6 Replies 
 8442 Views
 by gfgqtmakia
 Thu Nov 08, 2012 4:47 pm
How to get SHADOW SSDT information via use WINDBG?
by myid  - Tue Nov 06, 2012 8:53 pm
1 Replies 
 4482 Views
 by kmd
 Wed Nov 07, 2012 7:23 am
help inside the PEB cave
by hanan  - Fri Oct 19, 2012 1:23 pm
4 Replies 
 6985 Views
 by SomeUnusedName
 Fri Oct 26, 2012 9:10 am
How is this information retrieved
by _Lynn  - Tue Oct 09, 2012 2:01 pm
4 Replies 
 6636 Views
 by everdox
 Tue Oct 23, 2012 6:08 pm
Size of Data base?
by Thanat0S  - Fri Sep 28, 2012 9:11 am
1 Replies 
 4250 Views
 by kmd
 Mon Oct 08, 2012 6:40 am
Ransom - Lock screen
by Buster_BSA  - Sat Oct 06, 2012 10:33 pm
7 Replies 
 9041 Views
 by EP_X0FF
 Sun Oct 07, 2012 6:07 pm
Reverse delphi based Malware (RAT)
by hanan  - Thu Sep 27, 2012 7:58 am
3 Replies 
 5865 Views
 by Apocalypse
 Fri Sep 28, 2012 1:41 pm
0 Replies 
 3931 Views
 by Brian
 Fri Sep 21, 2012 4:43 pm
Learn how to reverse-engineer
by WojciechBusz  - Tue Sep 18, 2012 12:06 pm
0 Replies 
 4300 Views
 by WojciechBusz
 Tue Sep 18, 2012 12:06 pm
How to patch a Driver?
by Thanat0S  - Mon Sep 03, 2012 11:13 pm
3 Replies 
 5609 Views
 by feryno
 Mon Sep 17, 2012 8:13 am
how to debugging a driver without symbols
by Thanat0S  - Mon Sep 03, 2012 6:37 am
3 Replies 
 5710 Views
 by xdeadcode
 Tue Sep 04, 2012 7:37 pm
Windows Kernel Intel x64 SYSRET Vulnerability
by SUPERIOR  - Tue Aug 28, 2012 6:49 pm
0 Replies 
 3996 Views
 by SUPERIOR
 Tue Aug 28, 2012 6:49 pm
how to use !chkimg to find the hooker
by fire_the_hole  - Thu Aug 23, 2012 6:53 am
1 Replies 
 4287 Views
 by SomeUnusedName
 Thu Aug 23, 2012 1:15 pm
what's the principle of "bu"?
by fire_the_hole  - Sat Aug 18, 2012 3:38 am
7 Replies 
 8771 Views
 by SomeUnusedName
 Thu Aug 23, 2012 1:07 pm
  • 1
  • 4
  • 5
  • 6
  • 7
  • 8
  • 10