diff --git a/README.md b/README.md index 3bab702..6dee476 100644 --- a/README.md +++ b/README.md @@ -91,6 +91,7 @@ Malware analysis is a vital skill in the fight against cyber threats. It involve ## Reverse Engineering Reverse engineering involves dissecting software to understand its design and functionality. Essential for malware analysis and exploit development. +<<<<<<< HEAD ### **Books** - [Implementing Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Implementing%20Reverse%20Engineering%20The%20Real%20Practice%20of%20X86%20Internals%2C%20Code%20Calling%20Conventions%2C%20Ransomware%20Decryption%2C...%20%28Jitender%20Narula%29.pdf) - [practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20reverse%20engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20reversing%20tools%2C%20and%20obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%20etc.%29%20%28Z-Library%29.pdf) @@ -107,6 +108,12 @@ Reverse engineering involves dissecting software to understand its design and fu - [Reversing Hero](https://reversinghero.com) - [Microcorruption](https://microcorruption.com) +======= +### **Recommended Books** +1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20Reverse%20Engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20Reversing%20Tools%2C%20and%20Obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%29.pdf) +2. [The IDA Pro Book MISSING]() +3. [GhidraBook](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf) +>>>>>>> dde0fa4178410a6e02bec2a0a5f5783cf0bd7ab8 --- ## Binary Exploitation