• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

Udemy Mastering Reverse Engineering & Malware Analysis | REMASM+ (1 Viewer)

Currently reading:
 Udemy Mastering Reverse Engineering & Malware Analysis | REMASM+ (1 Viewer)

Recently searched:

carxproveteran

Member
Amateur
LV
10
Joined
Apr 7, 2023
Threads
9,742
Likes
959
Awards
14
Credits
14,177©
Cash
0$
Image

Mastering Reverse Engineering & Malware Analysis | REMASM+
Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra,x86-64, IDA Pro, IDA Free, Assembly and NASM


Current Price: Free
Discount: 100% off

Original Price: $19.99

What you will learn:​

The theory behind disassembly and its role in reverse engineering.
The four stages of binary analysis: Preprocessing, Compilation, Assembly, and Linking.
The compilation process breakdown and the purpose of each phase.
Working with symbolic information in stripped and not stripped binaries.
How binary executables load and execute.
Installation and basics of Ghidra, a tool for reverse engineering.
Installing the Java Development Kit (JDK) for Ghidra.
Navigating and utilizing Ghidra for project analysis.
Real-world malware analysis using Ghidra.
Practical reverse engineering skills through hands-on malware analysis.
Writing a 64-bit assembly program to display Hello


 

NHTB0T

Member
LV
1
Joined
Jul 18, 2024
Threads
10
Likes
16
Awards
5
Credits
1,326©
Cash
0$
Image

Mastering Reverse Engineering & Malware Analysis | REMASM+
Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra,x86-64, IDA Pro, IDA Free, Assembly and NASM


Current Price: Free
Discount: 100% off

Original Price: $19.99

What you will learn:​

The theory behind disassembly and its role in reverse engineering.
The four stages of binary analysis: Preprocessing, Compilation, Assembly, and Linking.
The compilation process breakdown and the purpose of each phase.
Working with symbolic information in stripped and not stripped binaries.
How binary executables load and execute.
Installation and basics of Ghidra, a tool for reverse engineering.
Installing the Java Development Kit (JDK) for Ghidra.
Navigating and utilizing Ghidra for project analysis.
Real-world malware analysis using Ghidra.
Practical reverse engineering skills through hands-on malware analysis.
Writing a 64-bit assembly program to display Hello


*** Hidden text: cannot be quoted. ***
good
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom