Index

July 23rd, 2017

[07-21-2017] Bypassing Product Key Authentication (1/2)

[03-11-2017] Game Hacking (3/3): Putting Everything Together

[02-25-2017] Game Hacking (2/3): The Easy Way

[02-19-2017] Game Hacking (1/3): The Hard Way

[12-23-2015] Heap Tracking

[12-14-2015] Runtime DirectX Hooking

[09-09-2015] Hekate: x86/x64 Winsock Inspection/Modification (Alpha dev release)

[08-20-2015] Manually Enumerating Process Modules

[08-12-2015] Stealth Techniques: Hiding Files in the Registry

[07-23-2015] Common Types of Disassemblers

[07-08-2015] Code Snippet: Safe Objects

[06-15-2015] Syscall Hooking Under WoW64: Implementation (2/2)

[06-05-2015] Syscall Hooking Under WoW64: Introduction (1/2)

[05-17-2015] Nop Hopping: Hiding Functionality in Alignment

[05-10-2015] Debugging Injected DLLs

[04-24-2015] Code Snippets: FindWindowLike

[04-16-2015] Everything up on Github

[04-13-2015] Reverse Engineering Vectored Exception Handlers: Implementation (3/3)

[04-11-2015] Reverse Engineering Vectored Exception Handlers: Functionality (2/3)

[04-08-2015] Reverse Engineering Vectored Exception Handlers: Structures (1/3)

[03-28-2015] Thoughts on Modern C++

[03-26-2015] Malware Techniques: Code Streaming

[01-15-2015] Virtual Method Table (VMT) Hooking

[12-20-2014] Writing a Primitive Debugger: Part 5 (Miscellaneous)

[12-11-2014] Writing a Primitive Debugger: Part 4 (Symbols)

[12-05-2014] Writing a Primitive Debugger: Part 3 (Call Stack, Registers, Contexts)

[12-04-2014] Twitter Time

[12-02-2014] Writing a Primitive Debugger: Part 2 (Breakpoints/Stepping)

[11-27-2014] Writing a Primitive Debugger: Part 1 (Basics)

[06-10-2014] Monitoring APIs with RPC and Protocol Buffers

[05-04-2014] An Experiment In Performing Remote Calls on x64

[05-02-2014] Messing with MSN Internet Games (2/2)

[04-30-2014] Updated Email

[04-30-2014] Messing with MSN Internet Games (1/2)

[04-22-2014] C++11-style Observer

[12-06-2013] Calling Undocumented APIs in the Windows Kernel

[07-23-2011] Upcoming Plans

[07-23-2011] Messing with Protocols: Applications (3/3)

[06-01-2011] Messing with Protocols: Reverse Engineering (2/3)

[05-27-2011] Messing with Protocols: Preliminary (1/3)

[05-26-2011] Quick Post: Auto-updating with Signature Scanning

[04-23-2011] Writing a File Infector/Encrypter: Full Source Code and Remarks (4/4)

[04-23-2011] Writing a File Infector/Encrypter: Writing the Compiled Stub (3/4)

[04-23-2011] Writing a File Infector/Encrypter: PE File Modification/Section Injection (2/4)

[04-23-2011] Writing a File Infector/Encrypter: Background (1/4)

[04-17-2011] Extending External Window Functionality

[03-25-2011] Follow-up: Memory Breakpoints

[03-21-2011] Hardware Breakpoints and Structured/Vectored Exception Handling

[03-19-2011] [Release] Age of Empires II: The Conquerors Expansion Stat Hack (Undetected)

[02-21-2011] API Hooking Through Near Call Replacement

[02-14-2011] Running a (32-bit) Process in the Context of Another

[02-04-2011] Game Hacking: Age of Empires II (Part 2/?)

[02-01-2011] Game Hacking: Age of Empires II (Part 1/?)

[01-23-2011] Steganography with Magic Squares

[01-13-2011] Analyzing An Application Challenge

[01-06-2011] The Beginning…

Comments are closed.