added sections

This commit is contained in:
ch0ic3 2024-12-18 06:38:16 -08:00
commit 369d9c09ef

View File

@ -91,6 +91,7 @@ Malware analysis is a vital skill in the fight against cyber threats. It involve
## Reverse Engineering ## Reverse Engineering
Reverse engineering involves dissecting software to understand its design and functionality. Essential for malware analysis and exploit development. Reverse engineering involves dissecting software to understand its design and functionality. Essential for malware analysis and exploit development.
<<<<<<< HEAD
### **Books** ### **Books**
- [Implementing Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Implementing%20Reverse%20Engineering%20The%20Real%20Practice%20of%20X86%20Internals%2C%20Code%20Calling%20Conventions%2C%20Ransomware%20Decryption%2C...%20%28Jitender%20Narula%29.pdf) - [Implementing Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Implementing%20Reverse%20Engineering%20The%20Real%20Practice%20of%20X86%20Internals%2C%20Code%20Calling%20Conventions%2C%20Ransomware%20Decryption%2C...%20%28Jitender%20Narula%29.pdf)
- [practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20reverse%20engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20reversing%20tools%2C%20and%20obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%20etc.%29%20%28Z-Library%29.pdf) - [practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20reverse%20engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20reversing%20tools%2C%20and%20obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%20etc.%29%20%28Z-Library%29.pdf)
@ -107,6 +108,12 @@ Reverse engineering involves dissecting software to understand its design and fu
- [Reversing Hero](https://reversinghero.com) - [Reversing Hero](https://reversinghero.com)
- [Microcorruption](https://microcorruption.com) - [Microcorruption](https://microcorruption.com)
=======
### **Recommended Books**
1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20Reverse%20Engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20Reversing%20Tools%2C%20and%20Obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%29.pdf)
2. [The IDA Pro Book MISSING]()
3. [GhidraBook](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf)
>>>>>>> dde0fa4178410a6e02bec2a0a5f5783cf0bd7ab8
--- ---
## Binary Exploitation ## Binary Exploitation