Reversinglabs - blog.reversinglabs.com

General Information:

Latest News:

Constant Insecurity: Things you didn’t know about (PE) Portable Executable file format 2 Jul 2011 | 10:53 pm

One constant challenge of modern security will always be the difference between published and implemented specifications. Evolving projects, by their very nature, open up a host of exploit areas and i...

Reversing software compressions: Tale of dragons and men who slay them 2 Jul 2011 | 10:50 pm

Reverse engineering compressed binaries has been a necessity for more than a two decades now, and we as reverse engineers are always on a lookout for newest and fastest ways of accomplishing our goal....

Reverse engineering software protections 2 Jul 2011 | 10:46 pm

Learn how to do in depth analysis of compressed and encrypted binary files. Attendees will receive hands-on experience working with the tools designed to do static and dynamic analysis of the PECOFF f...

Constant Insecurity: Things you didn’t know about (PE) Portable Executable file format 2 Jul 2011 | 10:09 pm

One constant challenge of modern security will always be the difference between published and implemented specifications. Evolving projects, by their very nature, open up a host of exploit areas and i...

Reversing software compressions: Tale of dragons and men who slay them 2 Jul 2011 | 05:52 pm

Reverse engineering compressed binaries has been a necessity for more than a two decades now, and we as reverse engineers are always on a lookout for newest and fastest ways of accomplishing our goal....

Reverse engineering software protections 2 Jul 2011 | 05:30 pm

Learn how to do in depth analysis of compressed and encrypted binary files. Attendees will receive hands-on experience working with the tools designed to do static and dynamic analysis of the PECOFF f...

Introducing TitaniumCore2 4 May 2011 | 02:59 am

After almost nine months of complete silence we are proud to present the reason for our disappearance. Its called TitaniumCore2 and it has been designed to identify, verify and unpack any binary co...

Introducing TitaniumCore2 3 May 2011 | 10:22 pm

After almost nine months of complete silence we are proud to present the reason for our disappearance. Its called TitaniumCore2 and it has been designed to identify, verify and unpack any binary conte...

Combat reverse engineering 7 Sep 2010 | 05:55 am

Reverse engineering is the only weapon of choice when it comes to malware unpacking and analysis. It gives us an inside look into the malware creations and enables us to understand their ins and outs....

Combat reverse engineering 6 Sep 2010 | 07:49 pm

Reverse engineering is the only weapon of choice when it comes to malware unpacking and analysis. It gives us an inside look into the malware creations and enables us to understand their ins and outs....

Related Keywords:

rlpack, nyxengine, rl depacker 1.5, rl!depacker, rl!depacker 1.5, unpack aplib, rl!depacker v1.5, plugin nirvana blackhat, beroexepacker, mew packer

Recently parsed news:

Recent searches: