Chapter2c
Chapter2b
Chapter2a
Chapter1c
Nasm Tutorial
Design and Implementation of Token Stealing Kernel Shellcode for Windows 8
FTP Exploits By Ankit Fadia
Binary Obfuscation from the Top Down: Obfuscation Executables without Writing Assembly
On the Critical Path of (Parallel) Computations Mihai Budiu March 30, 2005.
Link list/file stamps/clusters Odds and ends remaining for test 2.
Reverse Engineering 101
Compiler Constructie - Activatierecords en Intermediaire Code