|
You are here |
volatility-labs.blogspot.com | ||
| | | | |
intezer.com
|
|
| | | | | This deep dive aims to guide you through .NET reverse engineering, equipping you with the essential knowledge to analyze .NET malware. | |
| | | | |
blog.dingusxmcgee.com
|
|
| | | | | Picking up where we left off, from Part 1. | |
| | | | |
www.malwaretech.com
|
|
| | | | | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b... | |
| | | | |
krinkinmu.github.io
|
|
| | | I'm continuing my exploration of the AArch64 architecture and this time I will touch on the AArch64 priviledge levels. Note that AArch64 priviledge model is not exactly the same as the previous iterations of ARM. While there are plenty of similarities, and there is a level of backward compatibility, at the same time, there are some differences as well. So do not assume that things covered here will work the same way for all ARMs. Finally, I assume that you're familiar with general GNU Assembler synatax or willing to figure things out as you go. Familiarity with ARM assmebly language will help, though I try to explain all the things I use. As always the code is available on GitHub. | ||