ghostinthehive as a ghost in the hive
  • af6897cafc3603a5642fa4c5a1170473
  • Reverse Engineering
    • Reverse Engineering
      • Disassemble that binary
      • C Code constructs and Assembly Primer
      • Dissecting a PE File
      • Dissecting a PE File Format Data Directories p1 Imports Exports
      • Dissecting an ELF File
  • Windows and Malware
    • Windows Internals
      • Windows APIs
      • Malware Unpacking
      • Malware Evasion through Injection pt1
      • Malware Evasion through Injection pt2
      • Malware Evasion: Anti Analysis
    • Malware Analysis
      • Unpacking Dridex
      • Unpacking SmokeLoader
      • Unpacking Ramnit
      • Unpacking Parallax
      • Unpacking Osiris
      • Unpacking Zloader
      • Heaven's gate and all the goodies
  • Debugging the Linux Kernel with Qemu and GDB
Powered by GitBook
On this page
  • [ Infocard ]
  • Almost Fully Documented Blogs:

af6897cafc3603a5642fa4c5a1170473

_this blog is a work in progress_

Last updated 1 year ago

Intentionally left blank for now


Almost Fully Documented Blogs:

  • Reverse Engineering Section:

  • Malware Analysis Section

[ Infocard ]
Malware Evasion through Injection - part 1
Malware Evasion through Injection - part 2
Reverse Engineering Primer - part 1
Dissecting a PE File - part 1
Dissecting a PE File - part 2
Dissecting an ELF Binary - part 1
Linux Kernel Debugging
Page cover image