reverse engineering

  1. iMaredd

    RED GATE SMARTASSEMBLY | OBFUSCATION | FUD | SOFTWARE ASSEMBLY | REVERSE ENGINEERING

    Hidden content
  2. RX19

    ⭐ [NEW] ⭐ Reverse Engineering For Free now 2024 ⭐

    Hidden content
  3. RX19

    ⭐ [NEW] ⭐ Reverse Engineering Resources 2024 ⭐ RX | SVR

    Hidden content
  4. Sauron

    Reverse Engineering Windows Applications [ru]

    Reverse engineering is considered one of the most complex areas in information security (IS). In the book, the author offers to lift the veil of secrecy over this topic and, using practical examples, consider how applications work under Windows OS, as well as understand how to exploit buffer...
  5. Sauron

    REVERSE ENGINEERING AND EXPLOIT DEVELOPMENT

    Hidden content
  6. Sauron

    Rootkits and bootkits. Reverse Engineering Malware and Next Generation Threats [RU]

    Rootkits and bootkits. Reverse Engineering Malware and Next Generation Threats [RU] : This book is dedicated to the detection, analysis and reverse engineering of malware. The first part describes examples of rootkits that show how an attacker sees the operating system from the inside and...
  7. Sauron

    Mobile App Reverse Engineering

    Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world’s evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to...
  8. Sauron

    Blue Fox: Arm Assembly Internals and Reverse Engineering

    Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including...
  9. ASMODEUS

    Reverse Engineering 3: x64dbg Graphical Static Analysis

    If you had always wanted to learn how to reverse engineer a program and understand how it works from the inside out, then this is the course for you. Except for IDA Pro, many other debuggers out there are not capable of performing graphical representation of a disassembled software. x64dbg...
  10. ASMODEUS

    Reverse Engineering 4: Software Protection

    Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to...
  11. Sauron

    Reverse Engineering 4 - Software Protection

    Hidden content
  12. Sauron

    Reverse Engineering Tutorials

    What is Reverse Engineering? Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia So here we go: Tutorials...
  13. Mr.Robot

    (GUIDE)REVERSE ENGINEERING FOR EVERYONE

    Reverse Engineering For Everyone You can learn about reverse engineering. enjoy Hidden content
  14. Sauron

    Reverse Engineering Course The Ultimate Training

    What We’ll Do/Learn: This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations...
  15. Sauron

    Reverse Engineering For Beginners With Resources

    Hidden content
  16. Sauron

    Learn Reverse Engineering With Android Malware Analysis

    What you’ll learn Learn how Android applications are developed Learn how to reverse engineer Android applications and malware Learn how to extract applications and malware from a running device Gain access to premium cheat sheets, study guides, and books Develop your skills with challenges that...
Top