Tags in Blog

DeepToad

Fuzzy hashing

IDAPro

Malware

Malware Tricks I | 02 Dec 2009

Oracle

PIN

Reverse Engineering

abstract syntax tree

antiemulation

ast checkers

bindiff

bug finding tools

c/c++

callgraph

clang

control flow graph

diffing

exploiting techniques

ida

obfuscated

pdf

pyew

python

source diff

static analysis

tools

vulnerabilities