Showing 1 - 20 of 42

2

Penetration Testing with Shellcode
Megahed, Hamza ; Megahed, Hamza ; Megahed, Hamza ; et al.

Electronic Resource
Save to List
3

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

Electronic Resource
Save to List
4

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

Electronic Resource
Save to List
5

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

Electronic Resource
Save to List
6

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

Electronic Resource
Save to List
8

In-Memory Shellcode Runner Detection in Internet of Things (IoT) Networks: A Lightweight Behavioral and Semantic Analysis Framework.
Dora, Jean Rosemond ; Hluchý, Ladislav ; Staňo, Michal
Sensors (14248220). Sep2025, Vol. 25 Issue 17, p5425. 23p.

INTERNET of things MALWARE CYBERTERRORISM GRAPH neural networks
Academic journal
Save to List
9

Hands-On Penetration Testing on Windows
Bramwell, Phil ; Bramwell, Phil ; Bramwell, Phil ; et al.

Electronic Resource
Save to List
10

This result is not available to guest users.

11

Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes.
Huang, Gang-Cheng ; Chang, Ko-Chin ; Lai, Tai-Hung
Sensors (14248220). Jan2025, Vol. 25 Issue 2, p460. 22p.

FOUNTAINS ENCODING
Academic journal
Save to List
13

The Effect of Penetration Testing in Testing Security Holes on Websites (Case Study: Population and Civil Registration Office Kediri City) ; Pengaruh Penetration Testing Dalam Menguji Celah Keamanan Pada Website (Studi Kasus: Dinas Kependudukan dan Pencatatan Sipil Kota Kediri)
Yudo, Yudo Bismo Utomo
MULTINETICS ; Vol. 10 No. 2 (2024): MULTINETICS Nopember (2024); 121-128 ; 2443-2334 ; 2443-2245 ; 10.32722/multinetics.v10i2

Penetration Testing Website Security Holes Celah Keamanan
Academic journal
Save to List
14

Offensive Shellcode from Scratch
Pillay, Rishalin ; Pillay, Rishalin ; Pillay, Rishalin ; et al.

Electronic Resource
Save to List
15

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

Electronic Resource
Save to List
16

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

Electronic Resource
Save to List
17

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

Electronic Resource
Save to List
18

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

Electronic Resource
Save to List
19

Chapter 8 - Writing Shellcode I
In Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals 2005:333-364

Book
Save to List
20

An Efficient Dynamic Detection Method for Various x86 Shellcodes.
Fujii, Takayoshi ; Yoshioka, Katsunari ; Shikata, Junji ; et al.
2012 IEEE/IPSJ 12th International Symposium on Applications & the Internet; 1/ 1/2012, p284-289, 6p

Conference
Save to List

Filter