Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.
Get Feedermodexp.wordpress.com
Get the latest updates from modexp directly as they happen.
Follow now 99 followers
Last updated about 2 months ago
about 2 months ago
Introduction Executing PE files in-memory is something we can trace back to...
8 months ago
Table Of Contents Introduction Affine Transformation Linear Congruential Generator (LCG) Inversive Congruential...
9 months ago
Introduction Back in October 2018, I wanted to write ARM assembly on...
10 months ago
Introduction Constructing your own hash algorithm is controversial because there will always...
10 months ago
Introduction Malware like OceanLotus have used RSA-256 to hide strings. Darkhotel used...
10 months ago
Introduction Not sure if the title is an accurate description, but when...
11 months ago
Table Of Contents Introduction Symmetric vs Asymmetric Encryption with RSA Digital Signatures...
about 1 year ago
Introduction This is a quick follow up post to Data Masking that...
about 2 years ago
Introduction Ken Johnson (otherwise known as Skywing) first talked about the KiUserExceptionDispatcher...
about 2 years ago
Introduction Compressed, encrypted, and random data all contain a high amount of...
almost 3 years ago
Introduction Concise Binary Object Representation (CBOR), the binary equivalent to JavaScript Object...
almost 3 years ago
Introduction There are more than four ways to mask data, but these...