πŸ“”
eCPPTv2 Notes
search
⌘Ctrlk
πŸ“”
eCPPTv2 Notes
  • About
  • 1-System Security
    • Architecture Fundamentals
    • Assembler Debuggers and Tool Arsenal
    • Buffer Overflow
    • Shellcoding
    • Cryptography and Password Cracking
    • MALWARE
      • Techniques Used by Malware
      • How Malware Spreads
      • Samples
      • References
  • 2-Network Security
  • 3-Powershell for Pentesters
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 1-System Securitychevron-right
  2. MALWARE

References

1- Practical Malware Analysisarrow-up-right

2- Reversing: Secrets of Reverse Engineeringarrow-up-right

PreviousSampleschevron-leftNext2-Network Securitychevron-right

Last updated 5 years ago