-
Learn A Lot From Cornucopia (ASE 2022): A Case
This is to inspect the internal part of Cornucopia, from the perspective of code implementation. Introduce CornucopiaAs docum... -
Docker Tips
Follow this to get a good command of Docker usage. Basic CommandsThe Reference documentation | Docker Docs gives the most com... -
IDAPython note
IDAPython is an IDA plugin which makes it possible to write scripts for IDA in the Python programming language. IDAPython pro... -
Deploy Some LLMs
Large Language Models (LLMs) are neural networks with many parameters (typically billions or more) that are trained on large ... -
Binary Code Similarity Detection Papers (Part2)
Additional list in alphabetical order, including what I’ve read. A Large-Scale Empirical Analysis of the Vulnerabilities Intr... -
Binary SCA (Software Composition Analysis) Related Tools
Software Composition Analysis (SCA) for binary helps a lot for vulnerability discovery and program analysis, related fields i... -
LLVM Commands
Here are collections of LLVM commands about compilation using clang and some graph structure geneartion. LLVM CompilationTo w... -
Go Phishing!
This article shows methods of phishing, including setting up a phishing mail server, preparing malware (PE) which deceives th... -
Binary Code Similarity Detection Papers
There is a repo called Awesome Binary Similarity that helps collecting papers. Here comes my list (including what I’ve read) ... -
Bypass Anti-Virus
Techniques of bypassing antivirus are developing rapidly, and this article shows some practical tools/tips. GeneralActua...
|