Who might benefit from reading this blog:

  1. Reverse engineers/security researchers
  2. Windows developers
  3. Computer security enthusiasts
  4. General developers interested in the inner workings of things

This blog is not recommended if you are:

  1. Looking to develop malicious code or perform anything criminal

Any code contained within this blog relevant to malware or evasion techniques is ensured to be detectable prior to posting.

  1. earthwithus
    August 5th, 2014 at 14:25 | #1

    A really good page with nice interesting information.
    A little bit “unsorted” though.
    But still a good information source, also, because it deals with up to date windows versions and especially undocumented api calls.
    I would prefer to see more of this stuff.
    Keep on.
    PS.:( no, my addy does not imply gamehacking).

    Best regards.

  1. No trackbacks yet.