|
You are here |
ivyfanchiang.ca | ||
| | | | |
www.shogunlab.com
|
|
| | | | | Welcome to the second part in a tutorial series on reverse engineering Windows binaries with Ghidra! In this post, we'll be building on the concepts we learned in Part 0 and introduce some new topics | |
| | | | |
blog.quarkslab.com
|
|
| | | | | [AI summary] The blog post discusses the implementation of a hooking mechanism for Go programs, focusing on the challenges of intercepting function calls and managing concurrency issues. The approach involves modifying the execution flow of Go functions by inserting custom assembly code to handle stack pivoting, ABI switching, and register saving. This allows for the integration of C functions within Go code while addressing platform-specific limitations and concurrency problems. The post highlights the complexity of working with Go's internal structures and the benefits of using Go for hooking, as it simplifies the manipulation of Go types and data structures. | |
| | | | |
www.malwaretech.com
|
|
| | | | | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b... | |
| | | | |
lenholgate.com
|
|
| | | |||