MYWOT
Child safety
Confidence
Trustworthiness
Confidence
MALICIOUS CONTENT INDICATORS
Zubcic.re most likely does not offer any malicious content.
Secure connection support
HTTP
Zubcic.re has not yet implemented SSL encryption.
ADULT CONTENT INDICATORS
Zubcic.re most likely does not offer any adult content.
Popular pages
-
Blog | Tomislav Zubcic's blog
A blog about reverse engineering, security research and development. The home of x86obf, an executable protector and code virtualizer.
-
How to encrypt strings in your applications | Tomislav Zubcic's blog
May 27, 2015, 3:09 pm I have seen many examples and available solutions for string encryption, but they mostly force you to bloat your code with a lo...
-
Experimenting with Z3 - Proving opaque predicates | Tomislav Zubcic's blog
Opaque predicates are often used for code obfuscation as they are complicating code analysis, especially when it's done statically.
-
Experimenting with Z3 - Dead code elimination | Tomislav Zubcic's blog
Garbage instructions are often used for code obfuscation as they are complicating code analysis, especially when it's done statically. This article demonstrates how such instructions can be eliminated...
-
Parsed metasploit windows syscall table | Tomislav Zubcic's blog
August 7, 2009, 3:00 pm Someone on game-deception is working on something based on this, so I shared what I did a while ago, but also posting it here...
-
VM Code protection benchmark | Tomislav Zubcic's blog
December 6, 2013, 3:07 pm After having seen a discussion on /r/ReverseEngineering/ regarding the amount of executed instructions in applications prot...