TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
Close
AUTHOR
share
facebook
twitter
LinkedIn
facebook
Ajay Yadav
India
Dec 13 2007
Reverse Engineering, Penetration Testing, Exploit Development, Sy
.NET (45%)
Azure (14%)
C# (8%)
Others (33%)
NA
rank
3.1
m
read
10.7
k
Reputation
Platinum
Member
19
Likes
Ajay Yadav's Top Articles
Applied C#.NET Socket Programming
Oct 20, 2014
320.3k
18
Invoking Java Code in C#.NET
Oct 29, 2014
266.2k
8
File Handling In C# .NET
Feb 11, 2015
234.9k
3
Session Fixation Vulnerability Detection in ASP.Net
Nov 06, 2014
164.6k
22
Overview of ADO.NET Architecture
Feb 25, 2015
150.3k
9
Executing Assembly Code in C#
Nov 10, 2014
131.6k
7
.Net Penetration Testing: Cheat Sheet
Oct 25, 2014
101.8k
2
Introduction to Microsoft Azure
Jan 21, 2015
76.5k
15
.NET Binary Patching, Reversing With Reflexil
Oct 31, 2014
63.6k
4
Overview of Arrays in C#
Feb 26, 2015
63k
12
Protection Against Buffer Overflow Attack in .NET
Oct 22, 2014
61.3k
2
Bypassing Obfuscation: Ciphered Code Reverse Engineering
Nov 11, 2014
58k
0
COM in .NET
Nov 05, 2014
56.8k
2
MSIL Programming: Part 1
Nov 15, 2014
54.2k
6
Applied Reverse Engineering With IDA Pro
Nov 13, 2014
53.3k
3
Exploiting by Information Disclosure in ASP.Net
Nov 06, 2014
50k
0
C# Core Programming Constructs
Dec 12, 2014
49.6k
3
Anti-Reverse Engineering (Assembly Obfuscation)
Nov 10, 2014
43.6k
7
.NET Binary Reverse Engineering: Part 1
Oct 23, 2014
42.8k
3
Exploiting Windows Server Reverse Shell
Dec 04, 2014
39.5k
0
Secure Socket Layer in .NET
Oct 27, 2014
38.7k
5
Binary Cracking and Byte Patching With IDA Pro
Nov 19, 2014
36.3k
4
Code Injections: Injecting Spyware in EXE
Nov 01, 2014
35.7k
9
Managed C++/CLI Programming: Part 1
Nov 04, 2014
35.2k
8
Applied Reverse Engineering With OllyDbg
Oct 27, 2014
33.1k
2
Disassembling With Reflector: Part 1
Nov 09, 2014
30.7k
0
LINQ Programming: Language Integrated Query
Nov 05, 2014
30.6k
12
Vulnerable Encoded URLs
Nov 22, 2014
29.8k
7
ADO.NET Overview
Dec 09, 2014
27.1k
5
.NET Assembly Internals: Part 1
Nov 06, 2014
26.7k
2
Patching .NET Binary Code by CFF Explorer
Nov 03, 2014
25.8k
1
Java Bytecode Reverse Engineering
Nov 09, 2014
24.5k
0
Native Image Generation in Managed Code
Nov 01, 2014
23.4k
1
Web Spoofing Attack
Nov 27, 2014
23.3k
5
Remoting Technology: Distributed Computing
Nov 04, 2014
23.3k
4
.NET Reverse Engineering: Part 2
Oct 26, 2014
22.9k
8
Native Assembly Programming in .NET
Nov 07, 2014
22k
7
Demystifying Iron Ruby in .NET
Oct 18, 2014
21.9k
9
Managed C++/CLI Programming: Part 2
Nov 04, 2014
21.7k
3
Bug Fixing: .NET Reverse Engineering: Part 4
Oct 26, 2014
20.9k
2
Multithreading in Detail
Feb 10, 2015
20.6k
3
CODE : : BLOCK, An Open Source IDE For C/C++ Programming
Jan 06, 2015
19.7k
2
.NET Application Domain Internals
Feb 10, 2015
18.3k
3
MSIL Programming: Part 2
Nov 16, 2014
18.1k
4
.NET Reverse Engineering: Part 3
Oct 26, 2014
17.3k
2
C# Interactive Compiler Development
Oct 30, 2014
16.9k
1
Understanding Lambda Expressions
Nov 15, 2014
16.7k
6
Introduction to Microsoft Azure: Part 2
Jan 25, 2015
16.3k
2
The Mechanics of Metasploit
Nov 24, 2014
15.9k
2
Password Discovery and Patching by Disassembling
Feb 25, 2015
14.9k
4
1
-
50
of
74
<<
1
2
>>
contributions
Articles
[74]
Resources
[0]
Featured
[9]
Downloads
[0]
Forums
[19]
videos
[0]
blogs
[0]
News
[0]
EBooks
[0]
Ideas
[1]
interview questions
[0]