Binary Analysis & Malware#
Table of Contents#
Resources#
[ h ][ g ][ w ] GNU Debugger (GDB)
[ h ][ g ][ w ] gdbinit
[ h ][ g ][ w ] McSema
[ h ][ g ][ w ] Python Exploit Development Assistance (PEDA) for GDB
[ h ][ g ][ w ] pwndbg
YouTube#
more
Texts#
Andriesse, Dennis. (2018). Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly. No Starch Press.
Eagle, Chris. The IDA Pro Book. No Starch Press.
Sanders, Hillary & Joshua Saxe. (2018). Malware Data Science: Attack Detection and Attibution. No Starch Press.
Sikorski, Michael & Andrew Honig. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press.
Terms#
[ w ] Adware
[ w ] Anti Virus
[ w ] Binary File
[ w ] Botnet
[ w ] Cryptovirology
[ w ] Decompiler
[ w ] Denial of Service (DoS)
[ w ] Disassembler
[ w ] Debug Symbol
[ w ] Debugger
[ w ] Hex Editor
[ w ] Keystroke Logging
[ w ] Kleptography
[ w ] Malware
[ w ] Malware Analysis
[ w ] Malware Research
[ w ]
objdump
[ w ] Ransomware
[ w ] Reverse Engineering
[ w ] Rogue Security Software
[ w ] Rootkit
[ w ] Scareware
[ w ] Spyware
[ w ] Trojan
[ w ] Virus
[ w ] Wiper
[ w ] Worm
[ w ] Zombie