|
You are here |
www.basicinputoutput.com | ||
| | | | |
www.malwaretech.com
|
|
| | | | | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b... | |
| | | | |
blog.securityinnovation.com
|
|
| | | | | Connected devices make up one of the largest attack surfaces. Learn how researchers extract firmware for analysis by reverse engineering updater apps. | |
| | | | |
malwaretech.com
|
|
| | | | | Today during RSA Conference, the National Security Agency release their much hyped Ghidra reverse engineering toolkit. Described as "A software reverse engineering (SRE) suite of tools", Ghidra sounded like some kind of disassembler framework.Prior to release, my expectation was something more than Binary Ninja, but lacking debugger integration. I figured the toolkit would be ideal for those interested in reversing, but who lack the funding for an IDA licence. | |
| | | | |
hiltmon.com
|
|
| | | [AI summary] The post discusses increasing the file descriptor ulimit on macOS to prevent resource starvation in development environments, providing a script to adjust system limits permanently. | ||