more changes

This commit is contained in:
ch0ic3 2024-12-18 06:43:02 -08:00
parent 369d9c09ef
commit 34e05f3bf3

View File

@ -91,14 +91,7 @@ Malware analysis is a vital skill in the fight against cyber threats. It involve
## Reverse Engineering
Reverse engineering involves dissecting software to understand its design and functionality. Essential for malware analysis and exploit development.
<<<<<<< HEAD
### **Books**
- [Implementing Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Implementing%20Reverse%20Engineering%20The%20Real%20Practice%20of%20X86%20Internals%2C%20Code%20Calling%20Conventions%2C%20Ransomware%20Decryption%2C...%20%28Jitender%20Narula%29.pdf)
- [practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20reverse%20engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20reversing%20tools%2C%20and%20obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%20etc.%29%20%28Z-Library%29.pdf)
- [Reverse Engineering for beginners](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Reverse%20Engineering%20for%20Beginners%28Understanding%20Assembly%20Language%29%20%28Dennis%20Yurichev%29%20%28Z-Library%29.pdf)
- [Reverse Engineering of object oriented code](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Reverse%20Engineering%20of%20Object%20Oriented%20Code%20%28Paolo%20Tonella%2C%20Alessandra%20Potrich%29%20%28Z-Library%29.pdf)
- [The Ghidra Book](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf)
- [X86 Software Reverse-Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/x86%20Software%20Reverse-Engineering%2C%20Cracking%20-%20Stephanie%20Domas.pdf)
### **Recommended Tools**
- [IDA Free](https://hex-rays.com/ida-free/)
- [Ghidra](https://ghidra-sre.org/)
@ -111,9 +104,15 @@ Reverse engineering involves dissecting software to understand its design and fu
=======
### **Recommended Books**
1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20Reverse%20Engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20Reversing%20Tools%2C%20and%20Obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%29.pdf)
2. [The IDA Pro Book MISSING]()
3. [GhidraBook](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf)
>>>>>>> dde0fa4178410a6e02bec2a0a5f5783cf0bd7ab8
- [The IDA Pro Book MISSING]()
- [Implementing Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Implementing%20Reverse%20Engineering%20The%20Real%20Practice%20of%20X86%20Internals%2C%20Code%20Calling%20Conventions%2C%20Ransomware%20Decryption%2C...%20%28Jitender%20Narula%29.pdf)
- [practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20reverse%20engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20reversing%20tools%2C%20and%20obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%20etc.%29%20%28Z-Library%29.pdf)
- [Reverse Engineering for beginners](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Reverse%20Engineering%20for%20Beginners%28Understanding%20Assembly%20Language%29%20%28Dennis%20Yurichev%29%20%28Z-Library%29.pdf)
- [Reverse Engineering of object oriented code](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Reverse%20Engineering%20of%20Object%20Oriented%20Code%20%28Paolo%20Tonella%2C%20Alessandra%20Potrich%29%20%28Z-Library%29.pdf)
- [The Ghidra Book](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf)
- [X86 Software Reverse-Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/x86%20Software%20Reverse-Engineering%2C%20Cracking%20-%20Stephanie%20Domas.pdf)
---
## Binary Exploitation