A technical walkthrough of the development of a Type-2 Hypervisor using AMD SVM for introspection and advanced hooking.
A practical analysis of RFID card security and its vulnerabilities.
A hands-on analysis on how to intercept and hook a .data pointer in a Windows kernel mode driver.