[Tut/Sources] References to poly/meta/permutation

June 23, 2009 0 Comments 0 tags

Articles: Polymorphic engines – Trigger – SLAM #4 Code: http://vx.netlux.org/lib/static/vdat/tupoleng.htm Polymorphism ant Intel instruction format – LiTlLe VxW – 29A #7 Code: http://vx.netlux.org/29a/29a-7/Articles/29A-7.027 Guide to improving Polymorphic Engines – Rogue

China’s ‘Green Dam-Youth Escort’ Software

June 20, 2009 0 Comments 0 tags

Green Dam Youth Escort is the censor ware developed and distributed by Chinese government to filter ‘harmful’ content. Here are some details about the working of the software. ‘Green Dam-Youth

Hackers

May 19, 2009 0 Comments 0 tags

Many peoples ask me, what is hacker? I want to be hacker? What What and How How…. Read it. It’s Hacker Attitude. The Hacker Attitude Hackers solve problems and build

Hackers launch phishing attack on Facebook users

May 15, 2009 0 Comments 0 tags

We have been written many articles about phishing attack on Websites but Now, Hackers launched an attack on Facebook’s 200 million users on Thursday, successfully gathering passwords from some of

[Crimeware] Researches and Reversing about Eleonore Exploit Pack

May 13, 2009 0 Comments 0 tags

A very nice paper about eleonore exploit pack by Evilcry /*##############################################*/ Hi, Today we will see how works Eleonore Exploit Pack directly from an infected website. Essentially Eleonore Exploit Pack

Extensive SQL Injection Tutorial

May 13, 2009 0 Comments 0 tags

( This is one of the most extensive and most usefull tutorials about this subject I’ve seen read this and you’ll be sure to get a beter understanding! ) TABLE

Security/Hacking Tools & Utilities

May 10, 2009 0 Comments 0 tags

1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series.Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing.