Git Product home page Git Product logo

reverse-engineering-tutorial's Introduction

Reverse Engineering Tutorial

A comprehensive reverse engineering tutorial covering x86, x64 and ARM architectures.

Lesson 1: Assembly Language - Basic Malware Reverse Engineering (Part 1: Goals)

This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language.

-> Click HERE to read the article on LinkedIn.

Lesson 2: Assembly Language - Basic Malware Reverse Engineering (Part 2: Techniques)

This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis.

-> Click HERE to read the article on LinkedIn.

Lesson 3: Assembly Language - Basic Malware Reverse Engineering (Part 3: Types Of Malware)

This tutorial will address the basic forms of malware and how they work in simple terms.

-> Click HERE to read the article on LinkedIn.

Lesson 4: Assembly Language - Basic Malware Reverse Engineering (Part 4: x86 Assembly Intro)

This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors.

-> Click HERE to read the article on LinkedIn.

Lesson 5: Assembly Language - Basic Malware Reverse Engineering (Part 5: Binary Number System)

This tutorial will address the very basics of the binary number system.

-> Click HERE to read the article on LinkedIn.

Lesson 6: Assembly Language - Basic Malware Reverse Engineering (Part 6: Hexadecimal Number System)

This tutorial will address the very basics of the hexidecimal number system.

-> Click HERE to read the article on LinkedIn.

Lesson 7: Assembly Language - Basic Malware Reverse Engineering (Part 7: Transistors And Memory)

This tutorial will address the basics of transistors and memory.

-> Click HERE to read the article on LinkedIn.

Lesson 8: Assembly Language - Basic Malware Reverse Engineering (Part 8 - Bytes, Words, Double Words, etc...)

This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions.

-> Click HERE to read the article on LinkedIn.

License

Apache License, Version 2.0

reverse-engineering-tutorial's People

Contributors

mytechnotalent avatar

Stargazers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.