|
You are here |
ivyfanchiang.ca | ||
| | | | |
intezer.com
|
|
| | | | | This deep dive aims to guide you through .NET reverse engineering, equipping you with the essential knowledge to analyze .NET malware. | |
| | | | |
www.malwaretech.com
|
|
| | | | | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b... | |
| | | | |
www.shogunlab.com
|
|
| | | | | Welcome to the second part in a tutorial series on reverse engineering Windows binaries with Ghidra! In this post, we'll be building on the concepts we learned in Part 0 and introduce some new topics | |
| | | | |
mem2019.github.io
|
|
| | | Last weekend we played Hack.lu CTF and got 5th place. I am quite busy recently so I only solved one challenge: Stonks Socket, and I think it is quite interes... | ||