#931
|
|||
|
|||
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and ..
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation by Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse
—---------------- Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. —------------— 2014 | English| PDF & EPUB | 383 pages | 8,47 MB Code:
hxxps://anonfiles.com/F9p35c43uc/Practical_Reverse_Engineering_x86_zip Last edited by beachsun; 07-04-2021 at 23:32. Reason: Set Post Title |
The Following 2 Users Say Thank You to beachsun For This Useful Post: | ||
chessgod101 (07-05-2021), mavermaver (09-27-2021) |
#932
|
|||
|
|||
Operating System From 0 to 1 by Do Hoang Tu
Very Interesting one.
Operating System From 0 to 1 by Do Hoang Tu ----------------------------------------- This book helps you gain the foundational knowledge required to write an operating system from scratch. Hence the title, 0 to 1. After completing this book, at the very least you will learn: How to write an operating system from scratch by reading hardware datasheets. In the real world, it works like that. You won’t be able to consult Google for a quick answer. A big picture of how each layer of a computer is related to the other, from hardware to software. Write code independently. It’s pointless to copy and paste code. Real learning happens when you solve problems on your own. Some examples are given to kick start, but most problems are yours to conquer. However, the solutions are available online for you to examine after giving it a good try. Linux as a development environment and how to use common tools for low-level programming. x86 assembly in-depth. How a program is structured so that an operating system can run. How to debug a program running directly on hardware with gdb and QEMU. Linking and loading on bare metal x86_64, with pure C. No standard library. No runtime overhead. --------------------------- 2017 | English | PDF | 311 pages | 6,02 MB Code:
hxxps://anonfiles.com/x0r95548ua/OPERATING_SYSTEMS_FROM_0_TO_1_pdf |
The Following 3 Users Say Thank You to beachsun For This Useful Post: | ||
#933
|
|||
|
|||
Programming Linux Anti-Reversing Techniques by Jacob Baines
Programming Linux Anti-Reversing Techniques by Jacob Baines
—--------------------------------------- Programming Linux Anti-Reversing Techniques teaches the reader how to code and analyze well known anti-reversing techniques for Linux. The book shows how a reverse engineer analyzes a binary using tools like IDA, Radare2, GDB, readelf, and more. The code is presented to the reader ready to compile and analyze on their own. —------------------------------— 2016 | English | PDF & EPUB & MOBI| 268 pages | 2,96 MB Code:
https://anonfiles.com/5du4544aub/Programming_Linux_Anti-Reversing_Techniques_rar |
The Following User Says Thank You to beachsun For This Useful Post: | ||
DominicCummings (09-12-2021) |
#934
|
|||
|
|||
Learning Malware Analysis by Monnappa K A
Learning Malware Analysis by Monnappa K A : 2018
This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents. Code:
hxxps://anonfiles.com/R82fZ2Hfuc/Learning_Malware_Analysis_zip |
The Following 2 Users Say Thank You to runio For This Useful Post: | ||
mavermaver (09-27-2021), traf0 (09-19-2021) |
#935
|
|||
|
|||
BIOS Disassembly Ninjutsu Uncovered
Darmawan Salihun, 2006 ----------------------------------------- Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer defense—and the exploitation of embedded x86 BIOS are also covered. This book is primarily oriented toward system programmers and computer security experts. In addition, electronic engineers, pc technicians and computer enthusiasts can also benefit a lot from this book. Furthermore, due to heavy explanation of applied computer architecture (x86 architecture) and compression algorithm, computer science students might also find it useful. However, nothing prevents any people who is curious about BIOS technology to read this book and get benefit from it. ----------------------------------------- 2006 | English | PDF | 579 pages | 11.7 MB Code:
hxxps://www.upload.ee/files/13492943/BIOS_Disassembly.zip.html pwd,EXETOOLS |
The Following User Says Thank You to sobinary For This Useful Post: | ||
mavermaver (09-27-2021) |
#936
|
|||
|
|||
Can anybody found this old book ? Or download from web archive ? https://archive.org/details/win32networkprog00davi/mode/2up
|
#937
|
|||
|
|||
@morgot
Not exactly what you were looking for but maybe it's enough for you. Here's an offline version of the reader (with only that book-page-pictures): Code:
https://anonfiles.com/VdN0U2Jcu1/win32networkprog00davi_rar Regards, Tony
__________________
Want to learn unpacking ... but I'm too stupid Last edited by tonyweb; 09-27-2021 at 00:32. |
The Following 2 Users Say Thank You to tonyweb For This Useful Post: | ||
mavermaver (09-27-2021), morgot (09-27-2021) |
#938
|
|||
|
|||
Practical Reverse Engineering
Practical Reverse Engineering x86, x64, ARM, Windows® Kernel,
Reversing Tools, and Obfuscation |
The Following User Says Thank You to ian For This Useful Post: | ||
darsy (10-14-2021) |
#939
|
|||
|
|||
Teach Yourself Windows 95 Programming in 21 Days
Anyone has this?
Teach Yourself Windows 95 Programming in 21 Days (h**ps://w*w.amazon.com/Teach-Yourself-Windows-Programming-Days/dp/0672305313) I know its an old book, and other older/newer variants are available, but I am specifically looking for this book. |
#940
|
|||
|
|||
Igor’s tip of the week: Season 01 (Ida tips)
For over a year now, our colleague Igor has been disseminating his deep knowledge of IDA & decompilers through “Igor’s tip of the week” blog posts. Those have received critical acclaim, and we’ve received a lot of very positive feedback during that time. This motivated us to find a way to improve the accessibility to this resource. Today, Igor is taking a well-deserved holiday, so we took that opportunity to compile a first “season” of his precious tips (52 of them!), categorized by high-level topics. Read more and download pdf: Code:
https://hex-rays.com/blog/igors-tip-of-the-week-season-01 |
#941
|
|||
|
|||
The very big folder of my books what i collected
There is link on my home server up to 50/mbs
http://109.164.100.56:7070/O2hUA Password: Code:
C`~K4HMN@8#m$D+^ http://109.164.100.56/90aa99b55e0d4034/books_list.txt Last edited by EddyCZ; 11-11-2021 at 21:55. Reason: Addd books lists |
The Following User Gave Reputation+1 to EddyCZ For This Useful Post: | ||
Mahmoudnia (11-12-2021) |
The Following 4 Users Say Thank You to EddyCZ For This Useful Post: | ||
darkBLACK (01-14-2022), Mahmoudnia (11-12-2021), MarcElBichon (11-12-2021), tonyweb (12-15-2021) |
#942
|
|||
|
|||
GHIDRA. The Complete Guide (2021)
The Ghidra platform, the culmination of over a decade at the NSA, was designed to address some of the agency's most challenging reverse engineering challenges. Once the source code of this tool, previously intended for internal use only, was released, one of the world's best disassemblers and intuitive decompilers ended up in the hands of all cybersecurity professionals, and this book is the only guide to help you master this tool. Designed for both beginners and advanced users alike, this book will help you get ready for the RE challenge and parse files like the pros. GHIDRA. The Complete Guide (2021) in Russian Language: https://cloud.mail.ru/public/8gyY/dBi3cs72H |
#943
|
||||
|
||||
Not exactly free, but Humblebundle is again offering a security/hacking bundle:
https://www.humblebundle.com/books/cybersecurity-2022-wiley-books? |
#944
|
||||
|
||||
C How to Program, 9/e
By: Paul Deitel Pages: 838 Publisher: Pearson Pub Date: 2022 ISBN : 9780137398393 Link HTML Code:
https://gofile.io/d/Zvig2F HTML Code:
@securebyte |
#945
|
||||
|
||||
Windows Kernel Programming, Second Edition
By: Pavel Yosifovich Pages: 348 Publisher: Leanpub Pub Date: 2022 Link HTML Code:
https://gofile.io/d/0hDptB HTML Code:
@securebyte |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
ebooks | conan981 | General Discussion | 0 | 07-07-2006 22:36 |
some ebooks | fulone | General Discussion | 1 | 05-20-2004 21:22 |