_this blog is a work in progress_
Intentionally left blank for now
Malware Evasion through Injection - part 1
Malware Evasion through Injection - part 2
Reverse Engineering Section:
Reverse Engineering Primer - part 1
Dissecting a PE File - part 1
Dissecting a PE File - part 2
Dissecting an ELF Binary - part 1
Malware Analysis Section
Linux Kernel Debugging
Last updated 2 years ago