Update README.md

This commit is contained in:
ch0ic3 2024-12-18 14:40:02 +00:00
parent 369d9c09ef
commit 00c1de6aad

View File

@ -91,7 +91,7 @@ Malware analysis is a vital skill in the fight against cyber threats. It involve
## Reverse Engineering ## Reverse Engineering
Reverse engineering involves dissecting software to understand its design and functionality. Essential for malware analysis and exploit development. Reverse engineering involves dissecting software to understand its design and functionality. Essential for malware analysis and exploit development.
<<<<<<< HEAD
### **Books** ### **Books**
- [Implementing Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Implementing%20Reverse%20Engineering%20The%20Real%20Practice%20of%20X86%20Internals%2C%20Code%20Calling%20Conventions%2C%20Ransomware%20Decryption%2C...%20%28Jitender%20Narula%29.pdf) - [Implementing Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Implementing%20Reverse%20Engineering%20The%20Real%20Practice%20of%20X86%20Internals%2C%20Code%20Calling%20Conventions%2C%20Ransomware%20Decryption%2C...%20%28Jitender%20Narula%29.pdf)
- [practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20reverse%20engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20reversing%20tools%2C%20and%20obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%20etc.%29%20%28Z-Library%29.pdf) - [practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20reverse%20engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20reversing%20tools%2C%20and%20obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%20etc.%29%20%28Z-Library%29.pdf)
@ -113,7 +113,7 @@ Reverse engineering involves dissecting software to understand its design and fu
1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20Reverse%20Engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20Reversing%20Tools%2C%20and%20Obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%29.pdf) 1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20Reverse%20Engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20Reversing%20Tools%2C%20and%20Obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%29.pdf)
2. [The IDA Pro Book MISSING]() 2. [The IDA Pro Book MISSING]()
3. [GhidraBook](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf) 3. [GhidraBook](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf)
>>>>>>> dde0fa4178410a6e02bec2a0a5f5783cf0bd7ab8
--- ---
## Binary Exploitation ## Binary Exploitation