├── LICENSE ├── README.md ├── assets ├── laptop-4152330_1920.jpg └── laptop-4152330_640.jpg ├── gitbook ├── .gitignore ├── README.md ├── SUMMARY.md ├── chapters │ ├── assembly │ │ └── x86_assembly.md │ ├── debugging │ │ ├── rb_windbg.md │ │ └── windows-debugging-internals.md │ ├── malware_analysis │ │ ├── dynamic_malware_analysis.md │ │ ├── memory_dump_analysis.md │ │ └── smc_malware_analysis.md │ ├── pe │ │ └── pe_file_format.md │ ├── solutions │ │ ├── crash_dump_analysis.md │ │ ├── file_identification_analysis_i.md │ │ ├── file_identification_analysis_ii.md │ │ ├── malware_anti_analysis.md │ │ ├── md5_code_section.md │ │ ├── simple_process_injection.md │ │ ├── stuxnet_memory_image.md │ │ ├── win32_api_counting.md │ │ └── zeus_memory_image.md │ └── windows │ │ ├── api_hooking.md │ │ └── platform_overview.md └── images │ ├── api_hooking_detours.png │ ├── api_hooking_example.png │ ├── aspack_dbg1.png │ ├── aspack_dbg2.png │ ├── aspack_ida1.png │ ├── aspack_ida2.png │ ├── aspack_ida3.png │ ├── aspack_scylla.png │ ├── be2_driver_vt.png │ ├── cff1.png │ ├── crashdump_neohex1.png │ ├── fileid_ida1.png │ ├── fileid_ida2.png │ ├── ida_main.png │ ├── pe101.svg │ ├── pe_headers_basic.png │ ├── pe_headers_cff.png │ ├── peid1.png │ ├── peid2.png │ ├── peid_sample2.png │ ├── pi_dump_file.png │ ├── pi_hidump.png │ ├── pi_ida_sol.png │ ├── pi_memory.png │ ├── pi_wpm.png │ ├── rbwindbg_sample.png │ ├── sandboxie_bsa.png │ ├── sandboxie_bsa_fakenet.png │ ├── smc1.png │ ├── smc10.png │ ├── smc11.png │ ├── smc2.png │ ├── smc3.png │ ├── smc4.png │ ├── smc5.png │ ├── smc6.png │ ├── smc7.png │ ├── smc8.png │ ├── smc9.png │ ├── stuxnet_Driver.png │ ├── stuxnet_VT.png │ ├── upx_before_oep.png │ ├── upx_disasm1.png │ ├── upx_disasm2.png │ ├── upx_ollydump.png │ ├── upx_scylla.png │ ├── upx_unpack1.png │ ├── upx_unpacked.png │ ├── win32_api.png │ ├── windows_arch.png │ ├── winmd5.png │ ├── x86_arch.png │ ├── x86_cpu_rings.png │ ├── x86_mm.png │ └── zeus_VT.png └── presentations ├── pdf ├── 001_Intro_RE.pdf ├── 002_A_Intro_Win32_Core_Platform.pdf ├── 003_B_Win32_API_Hooking.pdf ├── 004_Intro_PortalExecutable.pdf ├── 005_A_Intro_X86_ASM.pdf ├── 008_B_Malware_Analysis_Memory_Forensics.pdf ├── 009_A_Packers_Crypters.pdf ├── ASPAck229_Manual_Unpacking.pdf ├── HackIM2014_RE_Hard_SMC.pdf └── Windows_Process_Injection.pdf └── ppt └── EMPTY /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/LICENSE -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/README.md -------------------------------------------------------------------------------- /assets/laptop-4152330_1920.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/assets/laptop-4152330_1920.jpg -------------------------------------------------------------------------------- /assets/laptop-4152330_640.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/assets/laptop-4152330_640.jpg -------------------------------------------------------------------------------- /gitbook/.gitignore: -------------------------------------------------------------------------------- 1 | _book 2 | -------------------------------------------------------------------------------- /gitbook/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/README.md -------------------------------------------------------------------------------- /gitbook/SUMMARY.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/SUMMARY.md -------------------------------------------------------------------------------- /gitbook/chapters/assembly/x86_assembly.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/assembly/x86_assembly.md -------------------------------------------------------------------------------- /gitbook/chapters/debugging/rb_windbg.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/debugging/rb_windbg.md -------------------------------------------------------------------------------- /gitbook/chapters/debugging/windows-debugging-internals.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/debugging/windows-debugging-internals.md -------------------------------------------------------------------------------- /gitbook/chapters/malware_analysis/dynamic_malware_analysis.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/malware_analysis/dynamic_malware_analysis.md -------------------------------------------------------------------------------- /gitbook/chapters/malware_analysis/memory_dump_analysis.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/malware_analysis/memory_dump_analysis.md -------------------------------------------------------------------------------- /gitbook/chapters/malware_analysis/smc_malware_analysis.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/malware_analysis/smc_malware_analysis.md -------------------------------------------------------------------------------- /gitbook/chapters/pe/pe_file_format.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/pe/pe_file_format.md -------------------------------------------------------------------------------- /gitbook/chapters/solutions/crash_dump_analysis.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/solutions/crash_dump_analysis.md -------------------------------------------------------------------------------- /gitbook/chapters/solutions/file_identification_analysis_i.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/solutions/file_identification_analysis_i.md -------------------------------------------------------------------------------- /gitbook/chapters/solutions/file_identification_analysis_ii.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/solutions/file_identification_analysis_ii.md -------------------------------------------------------------------------------- /gitbook/chapters/solutions/malware_anti_analysis.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /gitbook/chapters/solutions/md5_code_section.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/solutions/md5_code_section.md -------------------------------------------------------------------------------- /gitbook/chapters/solutions/simple_process_injection.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/solutions/simple_process_injection.md -------------------------------------------------------------------------------- /gitbook/chapters/solutions/stuxnet_memory_image.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/solutions/stuxnet_memory_image.md -------------------------------------------------------------------------------- /gitbook/chapters/solutions/win32_api_counting.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/solutions/win32_api_counting.md -------------------------------------------------------------------------------- /gitbook/chapters/solutions/zeus_memory_image.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/solutions/zeus_memory_image.md -------------------------------------------------------------------------------- /gitbook/chapters/windows/api_hooking.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/windows/api_hooking.md -------------------------------------------------------------------------------- /gitbook/chapters/windows/platform_overview.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/chapters/windows/platform_overview.md -------------------------------------------------------------------------------- /gitbook/images/api_hooking_detours.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/api_hooking_detours.png -------------------------------------------------------------------------------- /gitbook/images/api_hooking_example.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/api_hooking_example.png -------------------------------------------------------------------------------- /gitbook/images/aspack_dbg1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/aspack_dbg1.png -------------------------------------------------------------------------------- /gitbook/images/aspack_dbg2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/aspack_dbg2.png -------------------------------------------------------------------------------- /gitbook/images/aspack_ida1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/aspack_ida1.png -------------------------------------------------------------------------------- /gitbook/images/aspack_ida2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/aspack_ida2.png -------------------------------------------------------------------------------- /gitbook/images/aspack_ida3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/aspack_ida3.png -------------------------------------------------------------------------------- /gitbook/images/aspack_scylla.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/aspack_scylla.png -------------------------------------------------------------------------------- /gitbook/images/be2_driver_vt.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/be2_driver_vt.png -------------------------------------------------------------------------------- /gitbook/images/cff1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/cff1.png -------------------------------------------------------------------------------- /gitbook/images/crashdump_neohex1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/crashdump_neohex1.png -------------------------------------------------------------------------------- /gitbook/images/fileid_ida1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/fileid_ida1.png -------------------------------------------------------------------------------- /gitbook/images/fileid_ida2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/fileid_ida2.png -------------------------------------------------------------------------------- /gitbook/images/ida_main.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/ida_main.png -------------------------------------------------------------------------------- /gitbook/images/pe101.svg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/pe101.svg -------------------------------------------------------------------------------- /gitbook/images/pe_headers_basic.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/pe_headers_basic.png -------------------------------------------------------------------------------- /gitbook/images/pe_headers_cff.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/pe_headers_cff.png -------------------------------------------------------------------------------- /gitbook/images/peid1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/peid1.png -------------------------------------------------------------------------------- /gitbook/images/peid2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/peid2.png -------------------------------------------------------------------------------- /gitbook/images/peid_sample2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/peid_sample2.png -------------------------------------------------------------------------------- /gitbook/images/pi_dump_file.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/pi_dump_file.png -------------------------------------------------------------------------------- /gitbook/images/pi_hidump.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/pi_hidump.png -------------------------------------------------------------------------------- /gitbook/images/pi_ida_sol.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/pi_ida_sol.png -------------------------------------------------------------------------------- /gitbook/images/pi_memory.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/pi_memory.png -------------------------------------------------------------------------------- /gitbook/images/pi_wpm.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/pi_wpm.png -------------------------------------------------------------------------------- /gitbook/images/rbwindbg_sample.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/rbwindbg_sample.png -------------------------------------------------------------------------------- /gitbook/images/sandboxie_bsa.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/sandboxie_bsa.png -------------------------------------------------------------------------------- /gitbook/images/sandboxie_bsa_fakenet.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/sandboxie_bsa_fakenet.png -------------------------------------------------------------------------------- /gitbook/images/smc1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc1.png -------------------------------------------------------------------------------- /gitbook/images/smc10.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc10.png -------------------------------------------------------------------------------- /gitbook/images/smc11.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc11.png -------------------------------------------------------------------------------- /gitbook/images/smc2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc2.png -------------------------------------------------------------------------------- /gitbook/images/smc3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc3.png -------------------------------------------------------------------------------- /gitbook/images/smc4.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc4.png -------------------------------------------------------------------------------- /gitbook/images/smc5.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc5.png -------------------------------------------------------------------------------- /gitbook/images/smc6.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc6.png -------------------------------------------------------------------------------- /gitbook/images/smc7.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc7.png -------------------------------------------------------------------------------- /gitbook/images/smc8.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc8.png -------------------------------------------------------------------------------- /gitbook/images/smc9.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/smc9.png -------------------------------------------------------------------------------- /gitbook/images/stuxnet_Driver.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/stuxnet_Driver.png -------------------------------------------------------------------------------- /gitbook/images/stuxnet_VT.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/stuxnet_VT.png -------------------------------------------------------------------------------- /gitbook/images/upx_before_oep.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/upx_before_oep.png -------------------------------------------------------------------------------- /gitbook/images/upx_disasm1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/upx_disasm1.png -------------------------------------------------------------------------------- /gitbook/images/upx_disasm2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/upx_disasm2.png -------------------------------------------------------------------------------- /gitbook/images/upx_ollydump.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/upx_ollydump.png -------------------------------------------------------------------------------- /gitbook/images/upx_scylla.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/upx_scylla.png -------------------------------------------------------------------------------- /gitbook/images/upx_unpack1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/upx_unpack1.png -------------------------------------------------------------------------------- /gitbook/images/upx_unpacked.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/upx_unpacked.png -------------------------------------------------------------------------------- /gitbook/images/win32_api.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/win32_api.png -------------------------------------------------------------------------------- /gitbook/images/windows_arch.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/windows_arch.png -------------------------------------------------------------------------------- /gitbook/images/winmd5.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/winmd5.png -------------------------------------------------------------------------------- /gitbook/images/x86_arch.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/x86_arch.png -------------------------------------------------------------------------------- /gitbook/images/x86_cpu_rings.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/x86_cpu_rings.png -------------------------------------------------------------------------------- /gitbook/images/x86_mm.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/x86_mm.png -------------------------------------------------------------------------------- /gitbook/images/zeus_VT.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/gitbook/images/zeus_VT.png -------------------------------------------------------------------------------- /presentations/pdf/001_Intro_RE.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/presentations/pdf/001_Intro_RE.pdf -------------------------------------------------------------------------------- /presentations/pdf/002_A_Intro_Win32_Core_Platform.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/presentations/pdf/002_A_Intro_Win32_Core_Platform.pdf -------------------------------------------------------------------------------- /presentations/pdf/003_B_Win32_API_Hooking.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/presentations/pdf/003_B_Win32_API_Hooking.pdf -------------------------------------------------------------------------------- /presentations/pdf/004_Intro_PortalExecutable.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/presentations/pdf/004_Intro_PortalExecutable.pdf -------------------------------------------------------------------------------- /presentations/pdf/005_A_Intro_X86_ASM.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/presentations/pdf/005_A_Intro_X86_ASM.pdf -------------------------------------------------------------------------------- /presentations/pdf/008_B_Malware_Analysis_Memory_Forensics.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/presentations/pdf/008_B_Malware_Analysis_Memory_Forensics.pdf -------------------------------------------------------------------------------- /presentations/pdf/009_A_Packers_Crypters.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/presentations/pdf/009_A_Packers_Crypters.pdf -------------------------------------------------------------------------------- /presentations/pdf/ASPAck229_Manual_Unpacking.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/presentations/pdf/ASPAck229_Manual_Unpacking.pdf -------------------------------------------------------------------------------- /presentations/pdf/HackIM2014_RE_Hard_SMC.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/presentations/pdf/HackIM2014_RE_Hard_SMC.pdf -------------------------------------------------------------------------------- /presentations/pdf/Windows_Process_Injection.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abhisek/reverse-engineering-and-malware-analysis/HEAD/presentations/pdf/Windows_Process_Injection.pdf -------------------------------------------------------------------------------- /presentations/ppt/EMPTY: -------------------------------------------------------------------------------- 1 | --------------------------------------------------------------------------------