You are here |
www.jaybosamiya.com | ||
| | | |
malwaretech.com
|
|
| | | | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b... | |
| | | |
goggleheadedhacker.com
|
|
| | | | This article goes over how to use r2pipe to automate reverse engineering tasks. It will step throug creating a radare2 plugin to deobfuscate strings in a malware sample. | |
| | | |
www.sonatype.com
|
|
| | | | Crypto stealers are posing as IP checker utilities on npm, targeting Windows, Linux and macOS users with new open source malware campaigns. | |
| | | |
www.unindented.org
|
|
| | Starting with macOS Catalina, Apple switched the default shell from Bash to Zsh. Also, the built-in version of Bash is horribly outdated. No bueno. |