Search

3 min read
Reverse Engineering Malware: Reversing and Disassembly Tools
Welcome back, my aspiring malware analysts! In previous tutorials here, I have demonstrated the power of such reversing and disassembly...
4,557 views

5 min read
Reverse Engineering Malware, Part 5: OllyDbg Basics
In this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and...
29,955 views