Skip to content
Ethical Hacking Tutorials | Learn How to Hack | Hacking Tricks | Penetration Testing Lab
  • Home
  • Ethical Hacking
  • Hacking News
  • Hacking Tutorials

Category: Ollydbg

OllyDbg 2.01 alpha 4 Released

August 5, 2011 Ethical Hacking

 This is the last alpha release. This is the official change log:  Patch manager, similar to 1.10– Shortcut editor, supports weird things like Ctrl+Win+$ etc. Now you can customize and share your shortcuts. I haven’t tested it on Win7, please report any found bugs and incompatibilities!– Instant .udd file loading. In the previous versions I’ve […]

 Hacking Tools, Ollydbg, Reverse Engineering, Reverse Engineering Tools

Latest Hacking News

The Russian created Clubhouse for Android...
The Russian created Clubhouse for Android...
Tuesday, February 23
Malwarebytes Report Confirms the Change in ...
Malwarebytes Report Confirms the Change in ...
Tuesday, February 23
Alert for Smart Phone Users, How Their...
Alert for Smart Phone Users, How Their...
Tuesday, February 23
Chinese Hackers Cloned Exploit Tool...
Chinese Hackers Cloned Exploit Tool...
Tuesday, February 23
Fraudsters are Exploiting Google Apps to...
Fraudsters are Exploiting Google Apps to...
Monday, February 22
A Crypto Mining Botnet is Abusing Bitcoin...
A Crypto Mining Botnet is Abusing Bitcoin...
Thursday, February 25
Experts listed the methods used by...
Experts listed the methods used by...
Wednesday, February 24
Bitcoin Slips 17% to $45,000 as Caution...
Bitcoin Slips 17% to $45,000 as Caution...
Wednesday, February 24
Russia Accused by Ukraine for Major Cyber...
Russia Accused by Ukraine for Major Cyber...
Wednesday, February 24
FedEx and DHL Express Hit with Phishing...
FedEx and DHL Express Hit with Phishing...
Wednesday, February 24
The Russian created Clubhouse for Android...
The Russian created Clubhouse for Android...
Tuesday, February 23
Malwarebytes Report Confirms the Change in ...
Malwarebytes Report Confirms the Change in ...
Tuesday, February 23
Alert for Smart Phone Users, How Their...
Alert for Smart Phone Users, How Their...
Tuesday, February 23
Chinese Hackers Cloned Exploit Tool...
Chinese Hackers Cloned Exploit Tool...
Tuesday, February 23
Fraudsters are Exploiting Google Apps to...
Fraudsters are Exploiting Google Apps to...
Monday, February 22
A Crypto Mining Botnet is Abusing Bitcoin...
A Crypto Mining Botnet is Abusing Bitcoin...
Thursday, February 25
Experts listed the methods used by...
Experts listed the methods used by...
Wednesday, February 24
Bitcoin Slips 17% to $45,000 as Caution...
Bitcoin Slips 17% to $45,000 as Caution...
Wednesday, February 24
Russia Accused by Ukraine for Major Cyber...
Russia Accused by Ukraine for Major Cyber...
Wednesday, February 24
FedEx and DHL Express Hit with Phishing...
FedEx and DHL Express Hit with Phishing...
Wednesday, February 24

Become a Fan

Recent Posts

  • Anonymous hacking using VPN and TOR
  • Java Vulnerable Lab – Learn to Hack and secure Java based Web Applications
  • Evil Twin and Fake Wireless Access Point Hacks: What They Are, How To Defend
  • BTS PenTesting Lab – a vulnerable web application to learn common vulnerabilities
  • Javascript static analysis with IronWASP-Lavakumar, nullcon Goa 2012
Proudly powered by WordPress | Theme: FlyMag by Themeisle.
  • Follow on Twitter
  • Facebook