TECHNICAL Reverse Analysis on Windows - A First Look Dig deep into advanced debugging with Visual Studio and x64dbg: breaking and modifying game rules on Windows, and mastering single-step analysis and instruction edits for optimized code execution.
TECHNICAL Reverse Analysis on Windows - Hands-on 1 fairycn explores the intricate process of bypassing battery detection during BIOS upgrades on the Thankpad T430I using Windows 10, diving deep into reverse analysis with tools like x64dbg and gleaning insights from real-world troubleshooting challenges.
TECHNICAL x64dbg usage log: start debugging and modify a program Explore the comprehensive guide by fairycn on how to master x64dbg on Windows 11, from installation to advanced debugging techniques, ensuring effective program modifications and insightful CPU disassembly analysis.
TECHNICAL Reverse Analysis under Linux - A First Look Dive into the intricacies of reverse analysis on Linux with fairycn, mastering tools like gcc, edb-debugger, and ghidra in UOS Home Edition 21.3, while delving into command parsing, debugging, and decompilation techniques.
TECHNICAL Featured A Guide to Malware Analysis: Day 4 Security researcher fairycn reveals how to conduct malware analysis and mitigate malware threats from Word Macro viruses to Linux viruses, as well as exploit overflow vulnerabilities.
TECHNICAL A Guide to Malware Analysis: Day 3 Get deeper into malware analysis with security researcher fairycn and learn about dll injection, how to use the Huorong System Diagnostics Toolkit for monitoring, and how malware leverages networks for remote attacks.
TECHNICAL A Guide to Malware Analysis: Day 2 On day two of Malware Analysis, fairycn unveils program static analysis, string checking, PE structure, and linking methods, including tools and techniques for shelling, obfuscation, and anti-obfuscation.
TECHNICAL Featured A Guide to Malware Analysis: Day 1 Security researcher fairycn delivers a comprehensive guide to malware analysis, explaining how to understand and prevent computer viruses.
INFOSEC Communicate with AI to learn Malware analysis techniques V1.0 Discover the ultimate malware analysis guide! Follow our comprehensive roadmap, including book recommendations, video tutorials, and top tools, all backed by AI communication, to excel in the world of malware analysis and become a skilled malware analyst.
CYBERSEC Getting Started with WiFi Security Testing Learn the steps on how to get started with WiFi security testing using Kali Linux and a NIC.