secret club
Hypervisors for Memory Introspection and Reverse Engineering
‘Reflections on Trusting Trust’, but completely by accident this time
Ring Around The Regex: Lessons learned from fuzzing regex libraries (Part 2)
Ring Around The Regex: Lessons learned from fuzzing regex libraries (Part 1)
RISC-Y Business: Raging against the reduced machine
Abusing undocumented features to spoof PE section headers
Bootkitting Windows Sandbox
Improving MBA Deobfuscation using Equality Saturation
Earn $200K by fuzzing for a weekend: Part 2
Earn $200K by fuzzing for a weekend: Part 1