http://www.woodmann.com/forum/archive/index.php/f-2.html

  1. Anybody has used Microsoft Base Smart Card CSP yet?
  2. Achilles Heel in the Philosophy of Prometheus Boundless Security Paper
  3. Tough .NET protection
  4. Use flair tool
  5. PEB.Ldr - Unlinking an entry
  6. ARTEam: ActiveMark 62 and 63 Superior Inline Patching Method by SSlEvIN
  7. ResumeThread & WaitForSingleObject in combination leads to a problem...
  8. declspec (naked) usage in dll
  9. Control an application behavior
  10. FlexLM on PA-Risc CPU ...
  11. Help on SetWindowsHookEx
  12. Code Section Modified after ZwMapViewOfSection
  13. LINK: Bypassing Patch Guard 3
  14. JDK classloader signature vs. JRE classloader signature
  15. help on finding kernel32.dll
  16. IDT
  17. Delphi Big Lib Signature Problem
  18. Help on IDT
  19. ARTeam: Generating Keys For TimePassages (EN/SP) by Nacho-Dj
  20. [help]function size
  21. a question from those who know how to develop drivers
  22. ARTeam: Signing Applications in ezMode for Symbian, by argv
  23. ARTeam: Primer on Reverse Engineering Symbian 3rd Applications v10, by argv
  24. good news for dk2/dk3 fans (deskey)
  25. ARTeam: searching for symbian reversers
  26. Wibu Gold Rolex Watch for Sale!
  27. Xenocode unpack
  28. assembler loader problem
  29. MACAddress
  30. FS Register
  31. Not quite hooking...
  32. reversing Qt programs
  33. Help discovering elements used to create a serial number
  34. Help about such a strange SEH trick
  35. Exotic Malware ?
  36. LINK: How to get the address of KeServiceDescriptorTableShadow
  37. Writing A Book On Computer Viruses
  38. Injecting Browser Helper Objects Remotely
  39. custom message on deletion of file...
  40. Accessing "in Use" Files == ?
  41. Some interesting papers and presentations from the 2008 CARO Workshop
  42. ARTeam: Primer on Reversing Jailbroken iPhone Native Applications v1.0
  43. ARTeam: Symbian Unleashed IDS Files For IDA Pro, EPOC6 && EPOC9 from argv
  44. Implementing Custom Subsystem == ?
  45. creating win32 api == ?
  46. Executable being rebased like a dll?
  47. The VMware VIX API
  48. CSP patching problem
  49. ARTeam eZine Issue III
  50. Arteam: Improved Disasm Dll (olly Engine), by CondZero
  51. ARTeam: AMDUMPV6.2 V2.0 by CondZero
  52. Reversing Windows hook chains
  53. win32 c processor only needed
  54. Overshadow: A Virtualization-Based Approach to Retrofitting Protection ..
  55. Weird dll hook thanks to Vista SP1
  56. hooking KiFastCallEntry
  57. Home made Java Virtual Machine
  58. Code Injection: Injecting an Entire C Compiled Application
  59. Hooking a member function from an injected DLL?
  60. SEH in Vista with ASLR?
  61. Reprise SW
  62. Vista x64 SP1 tcpip.sys runtime patching
  63. Question concerning .NET file format...
  64. Small Ndis miniport driver sample
  65. Vista Problem
  66. API Hooking
  67. Antidebuglib
  68. Enumerating 32-bit modules from an x64 application
  69. Crackz Nolan God help me out :P
  70. ARTeam: ArmaGeddon v1.0 Conceptual overview tool for unpacking Armadillo by CondZero
  71. using HID device in Driver and strange device corruption
  72. Binary radix tries
  73. Objective C
  74. assgin custom callback function to an edit field
  75. NASM - GUI related question
  76. Native NT Toolkit, First part (NDK headers) now available on Google Code
  77. .NET hooking
  78. NEW '_time' obfuscation area in FLEXlm v10
  79. Two VM detection methods, reported by Sirmabus
  80. Reversing C++
  81. ARTeam: Cracking & Unpacking ECompXL Packer V1 For Symbian Part3 by argv
  82. COM Interface problem!
  83. ARTeam: Cracking & Unpacking eCompXL packer V1 for Symbian Part2 by argv
  84. (x<<13) | (x>>3)
  85. ARTeam: Special Issue for SecuRom 7.30.0014 Take2 VM Analysis, deroko, 2kAD
  86. InTether Protection System Reversing...Reversing Kernel Code
  87. ARTeam: Cracking & Unpacking eCompXL packer V1 for Symbian
  88. Tool for check a valid PE Win32 File...
  89. ARTeam:ActiveMark62 Inline Patching by SSlEvIN (video tut)
  90. Run-time resolution of C++ virtual function addresses
  91. new ROCKEY?
  92. Reverse Engineering 'Reversity' Training Sessions - Free/Open
  93. Collection of anti debug tricks
  94. xml embed references. halp! :(
  95. LINK: Grafting Compiled Code: The Ultimate in Code Reuse
  96. HaspHL- Time Emulation Hangup
  97. need some help on a project...
  98. x64 and GetThreadContext() problems
  99. ARTeam: Macrovision InstallShield 2008 -Professional Edition [Short take] by condzero
  100. ARTeam: Notes on Reversing and Cracking Java Target Part 3 by ThunderPwr
  101. ARTeam: Boonty InSecure – Safecast 2.60.030 / FLEXnet dll Injection Method
  102. .NET strong name signature.
  103. brief insight into secu vm
  104. ARTeam: Notes on Reversing and cracking Java Target Part2
  105. Decompiling
  106. Reverse Engineering at University
  107. ARTeam: Dumping & Analysis ActiveMark V6.2x by Condzero
  108. ARTeam: Special Issue For SecuRom 7.30.0014 Complete Owning, AnonymouS, Human, derok
  109. Windows Anti-Debug Reference, nice collection of anti-debug tricks
  110. A question about creating process
  111. VM Snapshot Comparison to detect hidden files
  112. Modifying an online game
  113. HASP4 TIMEHASP confusion
  114. ARTeam: Notes on Reversing and Cracking Java Target
  115. Cracking .NET Applications "Step-By-Step"
  116. Arteam Collection, 220mb Of Tutorials And Tools, by scherzocrk
  117. FlexLm signatures file v9.2 or v10
  118. ARTeam: Reversing Of A Protection Scheme Based On Drivers: Sandboxie by Shub
  119. ARTeam: Symbian Symphony For 4 Crackmes And A Commercial Program, by Shub-Nigurrath
  120. Intel VT-x technology
  121. Looking for sentinel superpro 7.3 ida signature
  122. [ARTeam] generic unpacker source
  123. Keylok II Emu stuff
  124. Entropy
  125. ARTeam: AsProtect VM analyze
  126. HASPHL2006-7 & SENTEMUL2007
  127. Mysteries of win32k & GDI
  128. Virit antivirus?
  129. sentinel superpro
  130. New WIBU Envelope v5.20
  131. MIPS Decoding and Disassembly
  132. Emulator for old Hardlock algo.?
  133. Seedval Flexlm v11
  134. StrongNameIdentityPermission
  135. CGI
  136. ASM to C?
  137. Recovering seeds vendor daemon
  138. HASP HL - envelope problem
  139. Sentdos, dongle dos application
  140. Critical Section in ASM? Howto?
  141. Virtual Debugging in VMware
  142. Sentinel RMS
  143. unknown sentinel spro api
  144. Alexander Sotirov security vulnerabilities video
  145. How does AVP scan this virus "Backdoor.Win32.CFour"?
  146. A nasty id/pass scheme
  147. MFC question
  148. Obfuscation on Windows as well as on Linux
  149. License sheme
  150. haSploGer - Hasp4 / HaspHL Loger by Xyrurg && sataron
  151. Differences in 32-bit exception handling on 32- and 64-bit host OS
  152. Recognize any of these functions?
  153. GetProcAddress for win32api func
  154. Test for stack or heap
  155. Windows Inner working.
  156. Windows Research Kernel
  157. IDA introduces full decompilation (to source code, yes)
  158. Generating Virtual Machine Code
  159. Different papers about SMC, polymorph code and anti trace code...
  160. understanding disassembler lc_init
  161. AVPX 3.30 by z0mbie
  162. FlexLM makekey
  163. Need help circumventing WinAPI
  164. Universal HASP Dump->To->Reg converter
  165. Change application icon
  166. Compiling FlexLm sdk
  167. ntoskrnl symbols foobared ?
  168. Driver installation Programically???Is it possible?
  169. Seed Key and Algorithms
  170. HASP calls
  171. remove bug problem
  172. [ARTeam-Tool] ARTeam UFD Password Revealer v1.0
  173. flelxlm 9.5-what's use of vendor_info and dist_info
  174. Arteam: Primer on Reversing Symbian S60 Applications
  175. Calcseed ! CrackZ !
  176. [ARTeam] TheMida r0 exploit
  177. [ARTUT] A Security Aspect Of USB Flash Drives
  178. Detouring DriverEntry / Self Debugging
  179. Building a Sentinel Pro Clone
  180. BlackBerry OS
  181. news: intercepting cellphone calls with service sms
  182. verisign tech reports
  183. How to load and then patch in 16 bit environments?
  184. Good old fashioned overlaying
  185. USING OLLYBONE IN WINDBG (experimental method)
  186. Windows User Mode Debugging Internals
  187. F*&king .NET
  188. Attaching / Detaching "on the Fly"
  189. ARTeam eZine #2
  190. A question from who played with GINA
  191. ARTeam Special Issue: Primer on Reversing .NET Applications
  192. UNIQUE PROJECT...Looking for the BEST of the BEST to help!
  193. Weird tamper detection
  194. Algorithm Help
  195. Confusing code snippet
  196. Realtime systems and OS dependency
  197. Virtual Machine RE-building
  198. Speed up cracking process?
  199. AntiRootkit.com site
  200. Wininternals's Link
  201. I want to find out loaded DLL-name.
  202. Article: Software Security Through Targetted Diversification
  203. Deskey Dongle
  204. ARTeam: new tute on Removing Sentinel SuperPro dongle
  205. Problem reversing a call to function
  206. flexlm vendor_keys problem
  207. Hardlock Dump/Emulate
  208. who knows how to generates the VENDOR_INFO string from the license key?
  209. Inside Windows Rootkits
  210. Nice .net debugging tut
  211. eEye Research - Really Cool!!!
  212. Question: Trying to learn from a program called 'X'
  213. Reversing client-server application
  214. PEB ProcessHeaps element
  215. LINK: Pseudo unpacking stubs
  216. Well, I'm an idiot...
  217. Opcode Operand Sizes
  218. sentinel sdk documentation
  219. Ring 0 anti-debugger code in Daemon Tools?
  220. new uninformed released
  221. Vista Protected Applications
  222. Remotesoft's Salamander 1.1.6.0 (Native Compiling)
  223. A call for cooperation - AV
  224. Compiling code in memory
  225. Reverse Engineering Libraries
  226. Vendors Custom Decryption
  227. Software Key's Protection Plus
  228. LINK: Microsoft HotPatching Article
  229. Reverse Engineering Team Recruiting
  230. Singnatures signed by Verisign
  231. Fastread dumping error.
  232. SafeKey's *.FST data files format
  233. CrypKey in a .dll from Vise installer.
  234. ARTeam: New tutorials and the eZine Issue #1 (!!)
  235. Matt Pietrek's new article on debugging on x64
  236. Dynamical byte manipulation of win32 executables
  237. C/C++ source for parsing PE header?
  238. DeviceIoControl problem
  239. One final masm question about register parsing
  240. Having a keygen compilation hex error......
  241. Base-85
  242. New Syser Debugger 1.3 Release
  243. Exports and kernel32.dll under w9x
  244. Olly: adapting menu-bar buttons...
  245. TLS callbacks
  246. getting IDT
  247. OllyDbg and Sysenter
  248. other serial input methods to break on?
  249. Need some advice, Stuck with algoithm to my reverse keycode
  250. writing a new driver for a certain protection

Reply via email to