Windows x86-64 System Call Table (XP/2003/Vista/7/8/10/11 and Server)

Protected Mode Segmentation as a powerful anti-debugging measure

Windows System Call Table

Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking

Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking

Results of my recent PostScript Charstring security research unveiled