Exetools

Exetools (https://forum.exetools.com/index.php)
-   General Discussion (https://forum.exetools.com/forumdisplay.php?f=2)
-   -   eBOOKS (POST ALL HERE) (https://forum.exetools.com/showthread.php?t=3440)

beachsun 07-04-2021 23:20

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and ..
 
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation by Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse
—----------------
Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.

The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.
—------------—
2014 | English| PDF & EPUB | 383 pages | 8,47 MB


Code:

hxxps://anonfiles.com/F9p35c43uc/Practical_Reverse_Engineering_x86_zip

beachsun 07-04-2021 23:25

Operating System From 0 to 1 by Do Hoang Tu
 
Very Interesting one.


Operating System From 0 to 1 by Do Hoang Tu
-----------------------------------------
This book helps you gain the foundational knowledge required to write an operating system from scratch. Hence the title, 0 to 1.
After completing this book, at the very least you will learn:
How to write an operating system from scratch by reading hardware datasheets. In the real world, it works like that. You won’t be able to consult Google for a quick answer.
A big picture of how each layer of a computer is related to the other, from hardware to software.
Write code independently. It’s pointless to copy and paste code. Real learning happens when you solve problems on your own. Some examples are given to kick start, but most problems are yours to conquer. However, the solutions are available online for you to examine after giving it a good try.
Linux as a development environment and how to use common tools for low-level programming.
x86 assembly in-depth.
How a program is structured so that an operating system can run.
How to debug a program running directly on hardware with gdb and QEMU.
Linking and loading on bare metal x86_64, with pure C. No standard library. No runtime overhead.
---------------------------
2017 | English | PDF | 311 pages | 6,02 MB


Code:

hxxps://anonfiles.com/x0r95548ua/OPERATING_SYSTEMS_FROM_0_TO_1_pdf

beachsun 07-04-2021 23:31

Programming Linux Anti-Reversing Techniques by Jacob Baines
 
Programming Linux Anti-Reversing Techniques by Jacob Baines
—---------------------------------------
Programming Linux Anti-Reversing Techniques teaches the reader how to code and analyze well known anti-reversing techniques for Linux. The book shows how a reverse engineer analyzes a binary using tools like IDA, Radare2, GDB, readelf, and more. The code is presented to the reader ready to compile and analyze on their own.
—------------------------------—
2016 | English | PDF & EPUB & MOBI| 268 pages | 2,96 MB




Code:

https://anonfiles.com/5du4544aub/Programming_Linux_Anti-Reversing_Techniques_rar

runio 09-18-2021 02:05

Learning Malware Analysis by Monnappa K A
 
Learning Malware Analysis by Monnappa K A : 2018

This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.

Code:

hxxps://anonfiles.com/R82fZ2Hfuc/Learning_Malware_Analysis_zip

sobinary 09-23-2021 00:45

BIOS Disassembly Ninjutsu Uncovered
Darmawan Salihun, 2006
-----------------------------------------
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer defense—and the exploitation of embedded x86 BIOS are also covered. This book is primarily oriented toward system programmers and computer security experts. In addition, electronic engineers, pc technicians and computer enthusiasts can also benefit a lot from this book. Furthermore, due to heavy explanation of applied computer architecture (x86 architecture) and compression algorithm, computer science students might also find it useful. However, nothing prevents any people who is curious about BIOS technology to read this book and get benefit from it.
-----------------------------------------
2006 | English | PDF | 579 pages | 11.7 MB

Code:

hxxps://www.upload.ee/files/13492943/BIOS_Disassembly.zip.html

pwd,EXETOOLS


morgot 09-26-2021 05:02

Can anybody found this old book ? Or download from web archive ? https://archive.org/details/win32networkprog00davi/mode/2up

tonyweb 09-27-2021 00:15

@morgot
Not exactly what you were looking for but maybe it's enough for you.

Here's an offline version of the reader (with only that book-page-pictures):
Code:

https://anonfiles.com/VdN0U2Jcu1/win32networkprog00davi_rar
Simply open win32networkprog00davi.html file.

Regards,
Tony

ian 10-12-2021 20:15

Practical Reverse Engineering
 
Practical Reverse Engineering x86, x64, ARM, Windows® Kernel,
Reversing Tools, and Obfuscation


Roy25 10-15-2021 14:14

Teach Yourself Windows 95 Programming in 21 Days
 
Anyone has this?

Teach Yourself Windows 95 Programming in 21 Days (h**ps://w*w.amazon.com/Teach-Yourself-Windows-Programming-Days/dp/0672305313)

I know its an old book, and other older/newer variants are available, but I am specifically looking for this book.

DARKER 11-03-2021 15:31

Igor’s tip of the week: Season 01 (Ida tips)

For over a year now, our colleague Igor has been disseminating his deep knowledge of IDA & decompilers through “Igor’s tip of the week” blog posts. Those have received critical acclaim, and we’ve received a lot of very positive feedback during that time. This motivated us to find a way to improve the accessibility to this resource.

Today, Igor is taking a well-deserved holiday, so we took that opportunity to compile a first “season” of his precious tips (52 of them!), categorized by high-level topics.

Read more and download pdf:
Code:

https://hex-rays.com/blog/igors-tip-of-the-week-season-01

EddyCZ 11-11-2021 21:53

The very big folder of my books what i collected
 
There is link on my home server up to 50/mbs

http://109.164.100.56:7070/O2hUA

Password:

Code:

C`~K4HMN@8#m$D+^
The books list

http://109.164.100.56/90aa99b55e0d4034/books_list.txt

Spiderz_Soft 12-26-2021 15:08

GHIDRA. The Complete Guide (2021)

The Ghidra platform, the culmination of over a decade at the NSA, was designed to address some of the agency's most challenging reverse engineering challenges. Once the source code of this tool, previously intended for internal use only, was released, one of the world's best disassemblers and intuitive decompilers ended up in the hands of all cybersecurity professionals, and this book is the only guide to help you master this tool.

Designed for both beginners and advanced users alike, this book will help you get ready for the RE challenge and parse files like the pros.

GHIDRA. The Complete Guide (2021) in Russian Language:

https://cloud.mail.ru/public/8gyY/dBi3cs72H

deepzero 01-26-2022 18:05

Not exactly free, but Humblebundle is again offering a security/hacking bundle:

https://www.humblebundle.com/books/cybersecurity-2022-wiley-books?

Mahmoudnia 02-14-2022 15:07

C How to Program, 9/e

By: Paul Deitel
Pages: 838
Publisher: Pearson
Pub Date: 2022
ISBN : ‎9780137398393

Link
HTML Code:

https://gofile.io/d/Zvig2F
Password
HTML Code:

@securebyte

Mahmoudnia 02-14-2022 15:09

Windows Kernel Programming, Second Edition

By: Pavel Yosifovich
Pages: 348
Publisher: Leanpub
Pub Date: 2022

Link
HTML Code:

https://gofile.io/d/0hDptB
Password
HTML Code:

@securebyte


All times are GMT +8. The time now is 18:08.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX