Jump to content
Tuts 4 You
Sign in to follow this  

Identifying Malicious Code Through Reverse Engineering

Recommended Posts


Thanks for sharing.

First part about assembly is done very very good.

Topics about windows internals and reversing concepts are not so detailed as i would like, but i guess it would be impossible to cover everything in great detail.

  • Like 1

Share this post

Link to post

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  
  • Create New...