By ro0ted | March 4, 2015 - 12:20 | Posted in /b/ | 16 Comments
#ro0ted #OpNewblood What the blackhats don’t want you to know: Preview of protecting against debugging

Create your own TLS callback – https://twitter.com/ro0ted/

I’ll explain more. Haven’t been feeling so well think I’m getting sick…so I’ll explain detailed information next tut on what you can do with this.

source:

https://cyberguerrilla.org/paste/?9fd3528405e19fc2#riEqLbBhV7lXTtoiI5FZ3cN/1HswBOqM4wKwCZlp2XE=

 

Used in conjunction with your own work:

Untitled

ro0ted

 

 

 

 

 


 

 

(In order)

Why am I teaching Reverse Engineering to inexperienced new Anons in OpNewblood?

Whitehat Lab

ASM Programming

Introduction Part 1 Ollydbg 

Introduction Part 2 Using Ollydbg and Tracing Botnets

Analyzing Botnets

 Introduction Part 3 Ollydbg: Cheating a Crackme

Introduction Part 4 Ollydbg: Your first Patch

Encryption 101

Cuckoo Sandbox: Automated Malware Analysis also known as Malwr.com

Introduction to Honeydrive: A Brief Walk Through

Installing Kippo the SSH Honeypot on a VPS Part 1: How to set it up

Resource Hacker

Dll Injection the Easy Way

Visual Basic Binaries Walk Through Part 1

Ollydbg on Steroids

Creating Patchers Part 1

Have you supported the gas mask campaign over the years?

Crack to win a gas mask gift pack

How to edit a register me crack me Pre Part 1

Unwinding Delphi Binaries Walk Through if not Preview

Cracking Delphi Part 2

Reversing Timed Trials: Ollydbg Tricks Part 3

Analyzing Adware

(Visited 329 times, 1 visits today)


  • You can follow any responses to this entry through the RSS 2.0 feed.
  • Both comments and pings are currently closed.