📔
eCPPTv2 Notes
Ctrlk
  • About
  • 1-System Security
    • Architecture Fundamentals
    • Assembler Debuggers and Tool Arsenal
    • Buffer Overflow
    • Shellcoding
    • Cryptography and Password Cracking
    • MALWARE
      • Techniques Used by Malware
      • How Malware Spreads
      • Samples
      • References
  • 2-Network Security
  • 3-Powershell for Pentesters
Powered by GitBook
On this page
  1. 1-System Security
  2. MALWARE

References

1- Practical Malware Analysis

2- Reversing: Secrets of Reverse Engineering

PreviousSamplesNext2-Network Security

Last updated 4 years ago

Was this helpful?

Was this helpful?