Tags in Blog

DeepToad

Fuzzy hashing

IDAPro

Malware

Malware Tricks I | 02 Dec 2009

Oracle

PIN

Reverse Engineering

abstract syntax tree

antiemulation

ast checkers

bindiff

bug finding tools

c/c++

callgraph

cfg hash

clang

control flow graph

control flow graph hash

diaphora

diffing

exploiting techniques

function hash

graph hash

ida

obfuscated

pdf

program diffing

pyew

python

source diff

static analysis

tools

vulnerabilities