Jump to content
Tuts 4 You

Identifying Malicious Code Through Reverse Engineering


Recommended Posts

  • 1 month later...

Thanks for sharing.

First part about assembly is done very very good.

Topics about windows internals and reversing concepts are not so detailed as i would like, but i guess it would be impossible to cover everything in great detail.

  • Like 1
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Create New...