Walkthrough of detecting VMware through ACPI checks in user mode, and mitigating the checks in VMware.| Reverse Engineering
Here’s a little trick we’d like to share in the end-of-year rush:| Silent Signal Techblog
Last year we published a proof-of-concept tool to demonstrate bypasses against security products that still rely on the obsolete MD5 cryptographic hash function.| Silent Signal Techblog