Explore >> Select a destination


You are here

www.basicinputoutput.com
| | www.malwaretech.com
1.5 parsecs away

Travel
| | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b...
| | blog.securityinnovation.com
2.3 parsecs away

Travel
| | Connected devices make up one of the largest attack surfaces. Learn how researchers extract firmware for analysis by reverse engineering updater apps.
| | malwaretech.com
1.8 parsecs away

Travel
| | Today during RSA Conference, the National Security Agency release their much hyped Ghidra reverse engineering toolkit. Described as "A software reverse engineering (SRE) suite of tools", Ghidra sounded like some kind of disassembler framework.Prior to release, my expectation was something more than Binary Ninja, but lacking debugger integration. I figured the toolkit would be ideal for those interested in reversing, but who lack the funding for an IDA licence.
| | hiltmon.com
30.3 parsecs away

Travel
| [AI summary] The post discusses increasing the file descriptor ulimit on macOS to prevent resource starvation in development environments, providing a script to adjust system limits permanently.