|
You are here |
www.basicinputoutput.com | ||
| | | | |
opguides.info
|
|
| | | | | Chapter 35 - Reverse Engineering # Software # Anyone know of good resources for learning binary reversing? Not particular tools necessarily, but like theory and how to think @XMPPwocky on Twitter An Opinionated Guide on How To Reverse Engineer Software is decent. for me personally: know some assembly, and in particular make sure you know the calling conventions for your platform. when starting out, do it on binaries you can actually run in a debugger and see whats actually happening at runtime. | |
| | | | |
www.malwaretech.com
|
|
| | | | | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b... | |
| | | | |
syprog.blogspot.com
|
|
| | | | | Source code for this article may be found here . The problem of software security has already been raised in my previous articles more ... | |
| | | | |
blog.skylight.io
|
|
| | | One of the coolest features of Rust is how it automatically manages resources for you, while still guaranteeing both safety (no segfaults) and high performance. Because Rust is a different kind of programming language, it might be difficult to understand what I mean, so let me be perfectly clear: * In | ||