Click here to Skip to main content
15,887,135 members

Articles by Dan Sporici (Article: 1, Technical Blogs: 12)

Article: 1, Technical Blogs: 12

RSS Feed

Average article rating: 5.00

Security
27 Aug 2019   Updated: 27 Aug 2019   Rating: 5.00/5    Votes: 5   Popularity: 3.49
Licence: CPOL    Views: 7,181     Bookmarked: 7   Downloaded: 0
Please Sign up or sign in to vote.
This article discusses the idea of Hot Patching C/C++ functions using Intel Pin in order to remove known vulnerabilities

Average blogs rating: 4.70

All Topics
18 Oct 2013   Updated: 18 Oct 2013   Rating: 4.67/5    Votes: 3   Popularity: 2.23
Licence: CPOL    Views: 18,820     Bookmarked: 5   Downloaded: 0
Please Sign up or sign in to vote.
A simple way to protect your application from any so-called "cracker", without involving obfuscation.
2 Aug 2014   Updated: 2 Aug 2014   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: CPOL    Views: 18,471     Bookmarked: 6   Downloaded: 0
Please Sign up or sign in to vote.
This is a simple method to extract a certain frame (or all of them) from a GIF, using C#.
Programming Languages
C#
17 Oct 2013   Updated: 19 Oct 2013   Rating: 4.27/5    Votes: 9   Popularity: 4.07
Licence: CPOL    Views: 50,788     Bookmarked: 22   Downloaded: 0
Please Sign up or sign in to vote.
C# detect if debugger is attached
3 Nov 2013   Updated: 3 Nov 2013   Rating: 4.76/5    Votes: 10   Popularity: 4.76
Licence: CPOL    Views: 32,813     Bookmarked: 33   Downloaded: 0
Please Sign up or sign in to vote.
C# create secure desktop (anti-keylogger)
26 Jan 2014   Updated: 27 Jan 2014   Rating: 5.00/5    Votes: 10   Popularity: 4.77
Licence: CPOL    Views: 87,604     Bookmarked: 23   Downloaded: 0
Please Sign up or sign in to vote.
This article is about how to get the memory dump of a process, by checking almost all memory addresses that can store data.
8 Sep 2014   Updated: 8 Sep 2014   Rating: 5.00/5    Votes: 8   Popularity: 4.52
Licence: CPOL    Views: 16,233     Bookmarked: 16   Downloaded: 0
Please Sign up or sign in to vote.
Calling a C# method from C/C++ (native process)
18 Oct 2013   Updated: 18 Oct 2013   Rating: 4.82/5    Votes: 18   Popularity: 6.05
Licence: CPOL    Views: 165,995     Bookmarked: 39   Downloaded: 0
Please Sign up or sign in to vote.
This article aims to show you how to read/write a process' memory using C# and some methods found in kernel32.dll.
19 Sep 2016   Updated: 22 Sep 2016   Rating: 4.49/5    Votes: 18   Popularity: 5.53
Licence: CPOL    Views: 25,953     Bookmarked: 31   Downloaded: 297
Please Sign up or sign in to vote.
C# Prevent decompilation by decrypting source at runtime
18 Oct 2013   Updated: 18 Oct 2013   Rating: 4.57/5    Votes: 5   Popularity: 3.20
Licence: CPOL    Views: 14,912     Bookmarked: 12   Downloaded: 0
Please Sign up or sign in to vote.
How to protect the password inside a textbox
18 Oct 2013   Updated: 18 Oct 2013   Rating: 4.40/5    Votes: 4   Popularity: 2.65
Licence: CPOL    Views: 16,300     Bookmarked: 9   Downloaded: 0
Please Sign up or sign in to vote.
ASCII Art tutorial
14 Dec 2013   Updated: 14 Dec 2013   Rating: 4.67/5    Votes: 3   Popularity: 2.23
Licence: CPOL    Views: 69,874     Bookmarked: 20   Downloaded: 0
Please Sign up or sign in to vote.
How to protect a file with a password (any file type) without using ZIP or any other archivers
Python
30 Jul 2019   Updated: 13 Aug 2019   Rating: 0.00/5    Votes: 0   Popularity: 0.00
Licence: CPOL    Views: 5,780     Bookmarked: 3   Downloaded: 0
Please Sign up or sign in to vote.
A short trick to bypass both ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention) in order to obtain a shell in a buffer-overflow vulnerable binary

Average tips rating:

No tips have been posted.

Average reference rating:

No reference articles have been posted.

Average project rating:

No projects have been posted.
Student
Romania Romania
Master's student @ ACS / UPB (Advanced Cybersecurity), Graduate Teaching Assistant, Junior Security Researcher. Also, webmaster of coding.vision