Windows Malware Analysis Procedure

This article records the procedure of analyzing Windows software and malware. You can also use the methods to crack a software, since all are about binary.

Read More

leetcode note -- 1

In order to understand more about the Arlgorithm and Data Structure, I start my leetcode journey from today. I will mainly focus on the medium to hard questions. Python and C will be used.

Read More

Idapython Plugins

I often use IDA Pro to do analysis, so I developed some plugins. They’re recored here:
//idapython plugin

Read More

in memory of "iOS kernel heap review 5-10"

This article is originally from Stefan Esser’s iOS10 kernel Heap Revisited. I record it with my understandings and for future reference.

Read More

Break out iOS/OS X sandbox[Study Notes]

I read Ian Beer’s article about break safari’s sandbox on OS X(link,link). Here I do a summery and also include sandbox security on iOS, and the fuzzing methods on both system.

Read More

Hello World

Welcome to Hexo! This is your very first post. Check documentation for more info. If you get any problems when using Hexo, you can find the answer in troubleshooting or you can ask me on GitHub.

Read More