3 minReverse Engineering Malware: Getting Started with Ghidra, Part 1Welcome back, my aspiring cyber warriors! There are a number of excellent tools available to use in the field of reverse engineering (see...
3 minReverse Engineering Malware: Reversing and Disassembly ToolsWelcome back, my aspiring malware analysts! In previous tutorials here, I have demonstrated the power of such reversing and disassembly...
5 minReverse Engineering Malware, Part 5: OllyDbg BasicsIn this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and...