Treffer 1 - 20 von 42

2

Penetration Testing with Shellcode
Megahed, Hamza ; Megahed, Hamza ; Megahed, Hamza ; et al.

E-Ressource
Zu den Favoriten
3

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

E-Ressource
Zu den Favoriten
4

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

E-Ressource
Zu den Favoriten
5

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

E-Ressource
Zu den Favoriten
6

Penetration Testing with Shellcode
Hamza Megahed ; Hamza Megahed ; Hamza Megahed ; et al.
2018

E-Ressource
Zu den Favoriten
8

In-Memory Shellcode Runner Detection in Internet of Things (IoT) Networks: A Lightweight Behavioral and Semantic Analysis Framework.
Dora, Jean Rosemond ; Hluchý, Ladislav ; Staňo, Michal
Sensors (14248220). Sep2025, Vol. 25 Issue 17, p5425. 23p.

INTERNET of things MALWARE CYBERTERRORISM GRAPH neural networks
Fachzeitschrift
Zu den Favoriten
9

Hands-On Penetration Testing on Windows
Bramwell, Phil ; Bramwell, Phil ; Bramwell, Phil ; et al.

E-Ressource
Zu den Favoriten
10

Dieses Ergebnis kann Gästen nicht angezeigt werden.

11

Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes.
Huang, Gang-Cheng ; Chang, Ko-Chin ; Lai, Tai-Hung
Sensors (14248220). Jan2025, Vol. 25 Issue 2, p460. 22p.

FOUNTAINS ENCODING
Fachzeitschrift
Zu den Favoriten
13

The Effect of Penetration Testing in Testing Security Holes on Websites (Case Study: Population and Civil Registration Office Kediri City) ; Pengaruh Penetration Testing Dalam Menguji Celah Keamanan Pada Website (Studi Kasus: Dinas Kependudukan dan Pencatatan Sipil Kota Kediri)
Yudo, Yudo Bismo Utomo
MULTINETICS ; Vol. 10 No. 2 (2024): MULTINETICS Nopember (2024); 121-128 ; 2443-2334 ; 2443-2245 ; 10.32722/multinetics.v10i2

Penetration Testing Website Security Holes Celah Keamanan
Fachzeitschrift
Zu den Favoriten
14

Offensive Shellcode from Scratch
Pillay, Rishalin ; Pillay, Rishalin ; Pillay, Rishalin ; et al.

E-Ressource
Zu den Favoriten
15

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

E-Ressource
Zu den Favoriten
16

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

E-Ressource
Zu den Favoriten
17

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

E-Ressource
Zu den Favoriten
18

Hands-On Penetration Testing on Windows
Phil Bramwell ; Phil Bramwell ; Phil Bramwell ; et al.
2018

E-Ressource
Zu den Favoriten
19

Chapter 8 - Writing Shellcode I
In Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals 2005:333-364

Buch
Zu den Favoriten
20

An Efficient Dynamic Detection Method for Various x86 Shellcodes.
Fujii, Takayoshi ; Yoshioka, Katsunari ; Shikata, Junji ; et al.
2012 IEEE/IPSJ 12th International Symposium on Applications & the Internet; 1/ 1/2012, p284-289, 6p

Konferenz
Zu den Favoriten

Filter