Treffer 1 - 20 von 42

2

Penetration Testing with Shellcode
Megahed, Hamza ; Megahed, Hamza ; Megahed, Hamza ; et al.

E-Ressource
Zu den Favoriten
3

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

E-Ressource
Zu den Favoriten
4

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

E-Ressource
Zu den Favoriten
5

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

E-Ressource
Zu den Favoriten
6

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

E-Ressource
Zu den Favoriten
8

In-Memory Shellcode Runner Detection in Internet of Things (IoT) Networks: A Lightweight Behavioral and Semantic Analysis Framework.
Dora, Jean Rosemond ; Hluchý, Ladislav ; Staňo, Michal
Sensors (14248220). Sep2025, Vol. 25 Issue 17, p5425. 23p.

INTERNET of things MALWARE CYBERTERRORISM GRAPH neural networks
Fachzeitschrift
Zu den Favoriten
9

Hands-On Penetration Testing on Windows
Bramwell, Phil ; Bramwell, Phil ; Bramwell, Phil ; et al.

E-Ressource
Zu den Favoriten
10

Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes.
Huang, Gang-Cheng ; Chang, Ko-Chin ; Lai, Tai-Hung
Sensors (14248220). Jan2025, Vol. 25 Issue 2, p460. 22p.

FOUNTAINS ENCODING
Fachzeitschrift
Zu den Favoriten
11

Dieses Ergebnis kann Gästen nicht angezeigt werden.

13

The Effect of Penetration Testing in Testing Security Holes on Websites (Case Study: Population and Civil Registration Office Kediri City) ; Pengaruh Penetration Testing Dalam Menguji Celah Keamanan Pada Website (Studi Kasus: Dinas Kependudukan dan Pencatatan Sipil Kota Kediri)
Yudo, Yudo Bismo Utomo
MULTINETICS ; Vol. 10 No. 2 (2024): MULTINETICS Nopember (2024); 121-128 ; 2443-2334 ; 2443-2245 ; 10.32722/multinetics.v10i2

Penetration Testing Website Security Holes Celah Keamanan
Fachzeitschrift
Zu den Favoriten
14

Offensive Shellcode from Scratch
Pillay, Rishalin ; Pillay, Rishalin ; Pillay, Rishalin ; et al.

E-Ressource
Zu den Favoriten
15

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

E-Ressource
Zu den Favoriten
16

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

E-Ressource
Zu den Favoriten
17

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

E-Ressource
Zu den Favoriten
18

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

E-Ressource
Zu den Favoriten
19

Chapter 8 - Writing Shellcode I
In Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals 2005:333-364

Buch
Zu den Favoriten
20

An Efficient Dynamic Detection Method for Various x86 Shellcodes.
Fujii, Takayoshi ; Yoshioka, Katsunari ; Shikata, Junji ; et al.
2012 IEEE/IPSJ 12th International Symposium on Applications & the Internet; 1/ 1/2012, p284-289, 6p

Konferenz
Zu den Favoriten

Filter