Please open Telegram to view this post
VIEW IN TELEGRAM
#Video #ReverseEngineering #Linux
Linux Reverse Engineering Tutorial With GDB
🌐 Download Link
🦅 کانال بایت امن | گروه بایت امن
_
Linux Reverse Engineering Tutorial With GDB
🌐 Download Link
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Video #ReverseEngineering #IDA
Live Debug iOS Apps with IDA Pro
🌐 Download Link
🦅 کانال بایت امن | گروه بایت امن
_
Live Debug iOS Apps with IDA Pro
🌐 Download Link
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #Exploiting
Security Sift Windows Exploit Development
Part 1: The Basics
Part 2: Intro to Stack Based Overflows
Part 3: Changing Offset and Rebased Modules
Part 4: Locating Shellcode with Jumps
Part 5: Locating Shellcode with Egghunting
Part 6: SEH Exploits
Part 7: Unicode Buffer Overflows
🌐 Website
🦅 کانال بایت امن | گروه بایت امن
_
Security Sift Windows Exploit Development
Part 1: The Basics
Part 2: Intro to Stack Based Overflows
Part 3: Changing Offset and Rebased Modules
Part 4: Locating Shellcode with Jumps
Part 5: Locating Shellcode with Egghunting
Part 6: SEH Exploits
Part 7: Unicode Buffer Overflows
🌐 Website
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #Exploiting
Windows Exploit Development Tutorial Series
Windows Heap Exploitation
Linux Exploit Development Tutorial Series
🌐 Website
🦅 کانال بایت امن | گروه بایت امن
_
Windows Exploit Development Tutorial Series
Windows Heap Exploitation
Linux Exploit Development Tutorial Series
🌐 Website
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #Exploiting
Corelan Exploit writing tutorial
part 1 : Stack Based Overflows
part 2 : Stack Based Overflows – jumping to shellcode
part 3 : SEH Based Exploits
part 3b : SEH Based Exploits – just another example
part 4 : From Exploit to Metasploit – The basics
part 5 : How debugger modules & plugins can speed up basic exploit development
part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
part 7 : Unicode – from 0x00410041 to calc
part 8 : Win32 Egg Hunting
part 9 : Introduction to Win32 shellcoding
part 10 : Chaining DEP with ROP – the Rubik’s[TM] Cube
part 11 : Heap Spraying Demystified
🌐 Website
🦅 کانال بایت امن | گروه بایت امن
_
Corelan Exploit writing tutorial
part 1 : Stack Based Overflows
part 2 : Stack Based Overflows – jumping to shellcode
part 3 : SEH Based Exploits
part 3b : SEH Based Exploits – just another example
part 4 : From Exploit to Metasploit – The basics
part 5 : How debugger modules & plugins can speed up basic exploit development
part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
part 7 : Unicode – from 0x00410041 to calc
part 8 : Win32 Egg Hunting
part 9 : Introduction to Win32 shellcoding
part 10 : Chaining DEP with ROP – the Rubik’s[TM] Cube
part 11 : Heap Spraying Demystified
🌐 Website
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareAnalysis #Assembly
مجموعه آموزش Assembly Language - Basic Malware Reverse Engineering توسط Kevin M. Thomas که در لینکدین به اشتراک گذاشته شده به زودی به صورت PDF در کانال قرار خواهد گرفت.
🌐 Website
🦅 کانال بایت امن | گروه بایت امن
_
مجموعه آموزش Assembly Language - Basic Malware Reverse Engineering توسط Kevin M. Thomas که در لینکدین به اشتراک گذاشته شده به زودی به صورت PDF در کانال قرار خواهد گرفت.
🌐 Website
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareAnalysis
Malware Analysis Tutorials: a Reverse Engineering Approach
Tutorial 1- A Reverse Engineering Approach (Lesson 1: VM Based Analysis Platform)
Tutorial 2- Introduction to Ring3 Debugging
Tutorial 3- Int 2D Anti-Debugging .
...
Tutorial 33: Evaluation of Automated System I (Anubis)
Tutorial 34: Evaluation of Automated Tools CWSandBox, PeID, and Other Unpacking Tools
🌐 Website
🦅 کانال بایت امن | گروه بایت امن
_
Malware Analysis Tutorials: a Reverse Engineering Approach
Tutorial 1- A Reverse Engineering Approach (Lesson 1: VM Based Analysis Platform)
Tutorial 2- Introduction to Ring3 Debugging
Tutorial 3- Int 2D Anti-Debugging .
...
Tutorial 33: Evaluation of Automated System I (Anubis)
Tutorial 34: Evaluation of Automated Tools CWSandBox, PeID, and Other Unpacking Tools
🌐 Website
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #ReverseEngineering
Reverse Engineering Malware 101
Introduction
1) Fundamentals
2) Malware Techniques
3) RE Tools
S4) Triage Analysis
5) Static Analysis
6) Dynamic Analysis
🌐 Website
🦅 کانال بایت امن | گروه بایت امن
_
Reverse Engineering Malware 101
Introduction
1) Fundamentals
2) Malware Techniques
3) RE Tools
S4) Triage Analysis
5) Static Analysis
6) Dynamic Analysis
🌐 Website
_
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareReport
📗Stuxnet
➖By: AmrThabet
➖Pages: 29
➖Language: EN
➖Pub Date: 2011
🦅 کانال بایت امن | گروه بایت امن
_
📗Stuxnet
➖By: AmrThabet
➖Pages: 29
➖Language: EN
➖Pub Date: 2011
_
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareAnalysis
📗Introduction to Malware Analysis Techniques
➖By: Florian H¨aber
➖Pages: 74
➖Language: EN
➖Pub Date: 2015
🦅 کانال بایت امن | گروه بایت امن
_
📗Introduction to Malware Analysis Techniques
➖By: Florian H¨aber
➖Pages: 74
➖Language: EN
➖Pub Date: 2015
_
Please open Telegram to view this post
VIEW IN TELEGRAM
SAR-PR-2015-01_@securebyte.rar
499.5 KB
#Article #MalwareAnalysis
📗Introduction to Malware Analysis Techniques
🦅 کانال بایت امن | گروه بایت امن
_
📗Introduction to Malware Analysis Techniques
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#eBook #Cryptography
📗Crypto101
➖By: Laurens Van Houtven
➖Pages: 253
➖Publisher: crypto101
➖Pub Date: 2013-2017
🦅 کانال بایت امن | گروه بایت امن
_
📗Crypto101
➖By: Laurens Van Houtven
➖Pages: 253
➖Publisher: crypto101
➖Pub Date: 2013-2017
_
Please open Telegram to view this post
VIEW IN TELEGRAM
📗در این کتاب شما هر آنچه که نیاز خواهید داشت در مورد مباحث زیر یاد خواهید گرفت.
▪️Block Ciphers
▪️Stream
▪️Ciphers
▪️Hash Functions
▪️Message Authentication Codes
▪️Public Key Encryption
▪️Key Agreement Protocols
▪️Signature Algorithms
🦅 کانال بایت امن | گروه بایت امن
_
▪️Block Ciphers
▪️Stream
▪️Ciphers
▪️Hash Functions
▪️Message Authentication Codes
▪️Public Key Encryption
▪️Key Agreement Protocols
▪️Signature Algorithms
_
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
#eBook #Cryptography
📗A Graduate Course in Applied Cryptography
➖By: Dan Boneh
➖Pages: 580
➖Pub Date: 2016
🦅 کانال بایت امن | گروه بایت امن
_
📗A Graduate Course in Applied Cryptography
➖By: Dan Boneh
➖Pages: 580
➖Pub Date: 2016
_
Please open Telegram to view this post
VIEW IN TELEGRAM
استاد دانشگاه استنفورد Dan Boneh یکی از نویسندگان این کتاب هست که در زمینه رمزنگاری فعال هستند . مباحثی که در بخش اول کتاب یاد خواهید گرفت :
▪️Encryption
▪️Stream ciphers
▪️Block ciphers
▪️Chosen plaintext attacks
▪️Message integrity
▪️Message integrity from universal hashing
▪️Message integrity from collision resistant hashing
▪️Authenticated encryption
🦅 کانال بایت امن | گروه بایت امن
_
▪️Encryption
▪️Stream ciphers
▪️Block ciphers
▪️Chosen plaintext attacks
▪️Message integrity
▪️Message integrity from universal hashing
▪️Message integrity from collision resistant hashing
▪️Authenticated encryption
_
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #ReverseEngineering #Android
Technotalkative Android reverse engineering
Part 1 – Reverse engineering using Androguard
Part 2 – Deep analysis using Androguard tools
Part 3 – Reverse engineering using other tools
Part 4 – Online tools for Reverse Engineering and Malware Analysis
Part 5 – Reverse Engineering using Virtual Machine
🌐 Website
🦅 کانال بایت امن | گروه بایت امن
_
Technotalkative Android reverse engineering
Part 1 – Reverse engineering using Androguard
Part 2 – Deep analysis using Androguard tools
Part 3 – Reverse engineering using other tools
Part 4 – Online tools for Reverse Engineering and Malware Analysis
Part 5 – Reverse Engineering using Virtual Machine
🌐 Website
_
Please open Telegram to view this post
VIEW IN TELEGRAM