Looking for public offerings? Get notified
Training: | Advanced Software Protection - Attacks and Defense |
Location: | In-person / Remote |
Length: | 4 days (flexible) |
Training: | An Analytical Approach to Modern Binary Deobfuscation |
Location: | In-person / Remote |
Length: | 4 days (flexible) |
Hands-on binary (de)obfuscation (updated '24)
06/2024 | EuskalHack
Symbolic execution for security researchers (updated)
10/2023 | Navaja Negra
Symbolic execution for security researchers
06/2023 | EuskalHack
Tales of software protection: cryptography and obfuscation, better together
03/2023 | RootedCON
Hands-on binary (de)obfuscation (updated '23)
02/2023 | h-c0n
Hands-on binary (de)obfuscation
06/2022 | RingZer0
Code obfuscation through Mixed Boolean-Arithmetic expressions
02/2022 | h-c0n
Code obfuscation through Mixed Boolean-Arithmetic expressions
11/2021 | Intent Summit
A review of modern code deobfuscation techniques
07/2022 | HITB Lockdown 002
Code emulation for reverse engineers: A deep dive into radare2's ESIL
05/2020 | RuhrSec
Overcoming fear: reversing with radare2
02/2020 | h-c0n
A journey through ESIL
09/2019 | r2con
Overcoming fear: reversing with radare2
05/2019 | HITB SecConf Amsterdam
Stack machines unchained: code emulation with ESIL
04/2019 | Overdrive Conference
Introducing radare2 for humans
09/2018 | r2con
Playing with binary formats
04/2018 | Overdrive Conference
Brief introduction to reverse engineering using radare2
04/2018 | NcNLabs
Hacking tokens: a massive POC
03/2018 | RootedCON
IoT, S stands for security
02/2018 | HackDay UDG
Introduction to RE and stego using r2
12/2017 | HackDay UDG
Auditing WiFi networks
04/2017 | Matefest-Infofest UB
All the slides and materials authored are under CC-BY-4.0 unless stated otherwise.
You can find a copy of the license at LICENSE.md for your convenience.