From f70b3fd2c1bffdbdc4e1892c84cd6daf9d6b4e02 Mon Sep 17 00:00:00 2001 From: ch0ic3 Date: Wed, 18 Dec 2024 14:46:39 +0000 Subject: [PATCH] Update README.md --- README.md | 21 +++++---------------- 1 file changed, 5 insertions(+), 16 deletions(-) diff --git a/README.md b/README.md index 26b9a65..f6eba6e 100644 --- a/README.md +++ b/README.md @@ -92,16 +92,6 @@ Malware analysis is a vital skill in the fight against cyber threats. It involve Reverse engineering involves dissecting software to understand its design and functionality. Essential for malware analysis and exploit development. -<<<<<<< HEAD -======= -### **Books** -- [Implementing Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Implementing%20Reverse%20Engineering%20The%20Real%20Practice%20of%20X86%20Internals%2C%20Code%20Calling%20Conventions%2C%20Ransomware%20Decryption%2C...%20%28Jitender%20Narula%29.pdf) -- [practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20reverse%20engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20reversing%20tools%2C%20and%20obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%20etc.%29%20%28Z-Library%29.pdf) -- [Reverse Engineering for beginners](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Reverse%20Engineering%20for%20Beginners%28Understanding%20Assembly%20Language%29%20%28Dennis%20Yurichev%29%20%28Z-Library%29.pdf) -- [Reverse Engineering of object oriented code](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Reverse%20Engineering%20of%20Object%20Oriented%20Code%20%28Paolo%20Tonella%2C%20Alessandra%20Potrich%29%20%28Z-Library%29.pdf) -- [The Ghidra Book](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf) -- [X86 Software Reverse-Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/x86%20Software%20Reverse-Engineering%2C%20Cracking%20-%20Stephanie%20Domas.pdf) ->>>>>>> 00c1de6aad3781fe810c8b2c53b5e5627802088a ### **Recommended Tools** - [IDA Free](https://hex-rays.com/ida-free/) - [Ghidra](https://ghidra-sre.org/) @@ -111,10 +101,9 @@ Reverse engineering involves dissecting software to understand its design and fu - [Reversing Hero](https://reversinghero.com) - [Microcorruption](https://microcorruption.com) -======= + ### **Recommended Books** 1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20Reverse%20Engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20Reversing%20Tools%2C%20and%20Obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%29.pdf) -<<<<<<< HEAD - [The IDA Pro Book MISSING]() - [Implementing Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Implementing%20Reverse%20Engineering%20The%20Real%20Practice%20of%20X86%20Internals%2C%20Code%20Calling%20Conventions%2C%20Ransomware%20Decryption%2C...%20%28Jitender%20Narula%29.pdf) @@ -123,10 +112,10 @@ Reverse engineering involves dissecting software to understand its design and fu - [Reverse Engineering of object oriented code](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Reverse%20Engineering%20of%20Object%20Oriented%20Code%20%28Paolo%20Tonella%2C%20Alessandra%20Potrich%29%20%28Z-Library%29.pdf) - [The Ghidra Book](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf) - [X86 Software Reverse-Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/x86%20Software%20Reverse-Engineering%2C%20Cracking%20-%20Stephanie%20Domas.pdf) -======= -2. [The IDA Pro Book MISSING]() -3. [GhidraBook](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf) ->>>>>>> 00c1de6aad3781fe810c8b2c53b5e5627802088a + +- [The IDA Pro Book MISSING]() + + ---