| 
					2019-06-28 12:39:53				 | 
				
					 Reverse Engineering Can I speak with the kernel?
				 | 
				
					5				 | 
			
						
				| 
					2018-10-25 15:42:16				 | 
				
					 Reverse Engineering Mars Reloaded
				 | 
				
					18				 | 
			
						
				| 
					2018-08-05 18:29:27				 | 
				
					 The NC8 Reverse Engineering Track NC8 MAINFRAME MANAGEMENT INTERFACE Part 4
				 | 
				
					15				 | 
			
						
				| 
					2018-08-03 16:21:36				 | 
				
					 The NC8 Reverse Engineering Track NC8 MAINFRAME MANAGEMENT INTERFACE Part 2 Flag 3
				 | 
				
					10				 | 
			
						
				| 
					2018-07-25 13:14:05				 | 
				
					 The NC8 Reverse Engineering Track NC8 MAINFRAME MANAGEMENT INTERFACE Part 2 Flag 2
				 | 
				
					7				 | 
			
						
				| 
					2018-07-24 16:44:50				 | 
				
					 The NC8 Reverse Engineering Track NC8 MAINFRAME MANAGEMENT INTERFACE Part 2 Flag 1
				 | 
				
					3				 | 
			
						
				| 
					2018-07-23 17:49:41				 | 
				
					 The NC8 Reverse Engineering Track NC8 MAINFRAME MANAGEMENT INTERFACE Part 1
				 | 
				
					7				 | 
			
						
				| 
					2015-01-18 16:16:06				 | 
				
					 SQL Injection Most basic SQLi pattern.
				 | 
				
					1				 | 
			
						
				| 
					2015-01-12 16:20:28				 | 
				
					 Cryptography Some martian message
				 | 
				
					1				 | 
			
						
				| 
					2015-01-12 16:15:42				 | 
				
					 JavaScript Why not?
				 | 
				
					2				 | 
			
						
				| 
					2015-01-12 16:06:33				 | 
				
					 JavaScript Then obfuscation is more secure
				 | 
				
					1				 | 
			
						
				| 
					2015-01-12 16:01:52				 | 
				
					 JavaScript Hashing is more secure
				 | 
				
					1				 | 
			
						
				| 
					2015-01-12 16:00:33				 | 
				
					 JavaScript Client side validation is bad!
				 | 
				
					1				 | 
			
						
				| 
					2015-01-12 14:45:43				 | 
				
					 Reverse Engineering Introduction to MIPS
				 | 
				
					3				 | 
			
						
				| 
					2015-01-12 14:32:37				 | 
				
					 Reverse Engineering Need a client
				 | 
				
					6				 | 
			
						
				| 
					2015-01-12 08:03:35				 | 
				
					 Reverse Engineering Introduction to ARM
				 | 
				
					4				 | 
			
						
				| 
					2015-01-12 06:57:36				 | 
				
					 Reverse Engineering RingZer0 Authenticator
				 | 
				
					5				 | 
			
						
				| 
					2014-07-10 15:26:38				 | 
				
					 Reverse Engineering Back to our roots
				 | 
				
					5				 | 
			
						
				| 
					2014-07-10 01:42:10				 | 
				
					 Reverse Engineering Wrong byte!
				 | 
				
					4				 | 
			
						
				| 
					2014-07-10 00:35:32				 | 
				
					 Reverse Engineering Kernel introduction
				 | 
				
					3				 | 
			
						
				| 
					2014-05-21 16:06:44				 | 
				
					 Reverse Engineering I never forget the Nintendo 64
				 | 
				
					3				 | 
			
						
				| 
					2014-05-09 13:54:36				 | 
				
					 Reverse Engineering Windows API for the win
				 | 
				
					4				 | 
			
						
				| 
					2014-05-09 08:28:25				 | 
				
					 Reverse Engineering Can you see through the star
				 | 
				
					2				 | 
			
						
				| 
					2014-05-09 08:17:05				 | 
				
					 Reverse Engineering Windows x86 reversing is cool
				 | 
				
					3				 | 
			
						
				| 
					2014-05-09 08:01:10				 | 
				
					 Reverse Engineering Crack Me 1
				 | 
				
					3				 | 
			
						
				| 
					2014-05-09 07:27:53				 | 
				
					 Reverse Engineering Time to learn x86 ASM & gdb
				 | 
				
					2				 |