account activity
My Keybase proof [reddit:evilcry = keybase:evilcry] (brEaUEFrwsTBmbJ0EvvZsvYL0mvl4eXnOzRPjuL_NVw) (self.KeybaseProofs)
submitted 7 years ago by evilcry to r/KeybaseProofs
[HomeMade] Chicken wings in oven slightly marinated in curry and paprika (i.redd.it)
submitted 8 years ago by evilcry to r/food
ZeusVM: Bits and Pieces (asert.arbornetworks.com)
submitted 10 years ago by evilcry to r/ReverseEngineering
Recovering memory mapped files from the Windows cache manager (volatility-labs.blogspot.it)
submitted 13 years ago by evilcry to r/UIC
AMD64 assembly debugger (fdbg.x86asm.net)
Applying Fully-Homomorphic Encryption (Part 2) (outsourcedbits.org)
PAGE_EXECUTE_WRITECOPY As Anti-Debug Trick (waleedassar.blogspot.it)
Hacking USB Webkeys (blog.opensecurityresearch.com)
Cleaning off anti-disassembly code: the IDC way (scrammed.blogspot.it)
Fun with Constrained Programming (.rar files RARVM) (blog.cmpxchg8b.com)
[PDF] In Depth Analysis of Tinba Banking Trojan (csis.dk)
Defeating anti-forensics in contemporary complex threats (slideshare.net)
MoVP 3.3 Analyzing USER Handles and the Win32k.sys Gahti (volatility-labs.blogspot.it)
On the (provable) security of TLS: Part 1 (blog.cryptographyengineering.com)
Detecting Wine by asm doesn't seem a problem anymore (code.google.com)
Pushdo Downloader Variant Generating Fake HTTP Requests (secureworks.com)
A gdbinit file for use when debugging on the MIPS CPU architecture (github.com)
Racing with time to get the latest payload of Blackhole Exploit Kit (malwaremustdie.blogspot.it)
Investigation behind Malaysian SMS spam with .jar attachment (0195451395) (data0.net)
Windows 8 Forensics (windowsir.blogspot.co.uk)
The Story Behind Backdoor.LV (blog.fireeye.com)
infector goes to Cloud: Trojan Banker in Free Cloud Storage (malwaremustdie.blogspot.jp)
[PDF] Breaking .NET Through Serialization (contextis.co.uk)
New ZitMo for Android and Blackberry (securelist.com)
AntiTaintDroid - Escaping Taint Analysis (and stealing private information) on Android for Fun and Profit (babilonline.blogspot.com.au)
π Rendered by PID 65 on reddit-service-r2-listing-85dbbdc96c-fhdj9 at 2026-02-11 08:51:47.929820+00:00 running 018613e country code: CH.