Home
Tools
Malybuzz
peepdf
Pub
Advisories
Exploits
Articles
Presentations
Var
Scripts
About
Home
»
Feed aggregator
»
Sources
ADD / XOR / ROL
A blog about reverse engineering, mathematics, politricks and some more ...
URL:
http://addxorrol.blogspot.com/
Updated:
4 min 34 sec ago
Search this site:
Scripts
Exploits
Malware
Fraud
Feodo
Reversing
Mobile
Conferences
Specifications
Social Networking
Tatanga
NFC
Botnet
Black Hat
Botnets
ZeuS
Malcode
peepdf
Shellcode
Exploit kits
Javascript
Spam
Security
Research
Tools
Citadel
Vulnerabilities
PDF
Analysis
Python
more tags
Latest blog posts
Dridex spam campaign using PDF as infection vector
Adding a scoring system in peepdf
Travelling to the far side of Andromeda at Botconf 2015
Black Hat Arsenal peepdf challenge solution
Black Hat Arsenal peepdf challenge
peepdf news: GitHub, Google Summer of Code and Black Hat
Andromeda/Gamarue bot loves JSON too (new versions details)
Quick analysis of the CVE-2013-2729 obfuscated exploits
Dissecting SmokeLoader (or Yulia's sweet ass proposition)
Released peepdf v0.3
more
Security Posts
Infocon: green
Struts "devmode": Still a problem ten years later?, (Tue, Apr 23rd)
Suspected CoralRaider continues to expand victimology using three information stealers
Día del libro en @0xWord: Cupón 10% descuento DIALIBRO2024" por el #Diadellibro2024
Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak
ISC Stormcast For Tuesday, April 23rd, 2024 https://isc.sans.edu/podcastdetail/8950, (Tue, Apr 23rd)
Windows vulnerability reported by the NSA exploited to install Russian malware
Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme
The Next US President Will Have Troubling New Surveillance Powers
Introduction to Software Composition Analysis and How to Select an SCA Tool
5 reasons to strive for better disclosure processes
3 healthcare organizations that are building cyber resilience
5 ways to strengthen healthcare cybersecurity
Android Malware Vultur Expands Its Wingspan
Cybersecurity Concerns for Ancillary Strength Control Subsystems
Update on Naked Security
more