|
You are here |
intezer.com | ||
| | | | |
www.cs.virginia.edu
|
|
| | | | | [AI summary] This text provides a comprehensive guide to x86 assembly language programming, focusing on the calling conventions, register usage, and stack management in the context of the x86 architecture. It covers the following key topics: | |
| | | | |
www.malwaretech.com
|
|
| | | | | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b... | |
| | | | |
shellsharks.com
|
|
| | | | | An introduction to x86 Intel assembly. | |
| | | | |
nora.codes
|
|
| | | [AI summary] The article explains the concept of 'unsafe' in Rust, clarifying that it allows specific low-level operations while maintaining overall memory safety through the language's type system and safe abstractions. | ||