Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (2014)

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (2014)

Introduction

Chapter 1. x86 and x64

Chapter 2. ARM

Chapter 3. The Windows Kernel

Chapter 4. Debugging and Automation

Chapter 5. Obfuscation

Appendix. Sample Names and Corresponding SHA1 Hashes



All materials on the site are licensed Creative Commons Attribution-Sharealike 3.0 Unported CC BY-SA 3.0 & GNU Free Documentation License (GFDL)

If you are the copyright holder of any material contained on our site and intend to remove it, please contact our site administrator for approval.

© 2016-2026 All site design rights belong to S.Y.A.