reverse_engineering
Topic | Replies | Views | Activity | |
---|---|---|---|---|
X86 - the 32 bit assembly workflows you need in Information Security for Malware Analysis and Exploit Development
It's not about reading CISC, it's about the flows In Exploit Development and Malware Analysis, it’s not about reading assembly. It’s about understanding and directing the control flow. That is valuable. Who needs all the… |
![]() ![]() ![]() |
2 | 4971 | August 26, 2021 |
C++ Reverse Engineering - concepts and tools - Ghidra and WinDbg Preview |
![]() ![]() |
1 | 7721 | April 29, 2021 |
Ghidra Wiki |
![]() ![]() |
1 | 24546 | April 29, 2021 |
What happened at Elbsides (BSides in Hamburg) 2019 |
![]() ![]() |
1 | 632 | April 29, 2021 |
Malware Analysis & Forensics: Analyze Malicious Documents |
![]() ![]() |
1 | 6532 | April 29, 2021 |
Malware Analysis workflows: know your volatile memory-forensics, get the job done, and have fun with RAM |
![]() ![]() |
1 | 658 | April 29, 2021 |
Malware Analysis - basic code analysis with BinNavi |
![]() ![]() |
1 | 1895 | April 29, 2021 |
Development environment for BinNavi - with a package manager (Windows) |
![]() ![]() |
1 | 2113 | April 29, 2021 |