Hey vulnerability-researcher,
Here are some tips for documenting the reversing work you are doing.
version 1 Jan 19, 2016.
| Blackhat USA 2016 presentations | |
| http://owasp.org/index.php/iran | |
| Twitter : https://twitter.com/owaspiran | |
| Telegram : https://telegram.me/irOWASP | |
| https://www.blackhat.com/docs/us-16/materials/us-16-Molinyawe-Shell-On-Earth-From-Browser-To-System-Compromise.pdf |
| $Source = @" | |
| using System; | |
| using System.IO; | |
| using System.Text; | |
| using System.IO.Compression; | |
| using System.Collections.Generic; | |
| using System.Runtime.InteropServices; | |
| using System.Security.Cryptography; |
| #!/usr/bin/python | |
| # -*- coding: utf-8 -*- | |
| # Author: Francesco "dfirfpi" Picasso | |
| # ---------------------------------------------------------------------------- | |
| import ctypes | |
| import struct | |
| import sys | |