Explore >> Select a destination


You are here

www.jaybosamiya.com
| | malwaretech.com
11.7 parsecs away

Travel
| | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b...
| | goggleheadedhacker.com
14.2 parsecs away

Travel
| | This article goes over how to use r2pipe to automate reverse engineering tasks. It will step throug creating a radare2 plugin to deobfuscate strings in a malware sample.
| | www.sonatype.com
13.9 parsecs away

Travel
| | Crypto stealers are posing as IP checker utilities on npm, targeting Windows, Linux and macOS users with new open source malware campaigns.
| | www.unindented.org
75.8 parsecs away

Travel
| Starting with macOS Catalina, Apple switched the default shell from Bash to Zsh. Also, the built-in version of Bash is horribly outdated. No bueno.