TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Malware Analysis and Reverse Engineering Course

344 点作者 posthumangr大约 5 年前

5 条评论

deevnullx大约 5 年前
Looks like the course got a huge rewrite this year, especially the addition of Ghidra. Very interesting to see that, usually I just recommend RPISEC&#x27;s course[0] but the Ghidra inclusion is huge. Great stuff.<p>[0] <a href="https:&#x2F;&#x2F;github.com&#x2F;RPISEC&#x2F;Malware" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;RPISEC&#x2F;Malware</a>
JohnnyHerz大约 5 年前
Great Content! but the lectures OMG...<p>The Lecturer is brutal. the &quot;Umm&quot; rate in his talks is inexcusable for a professional public speaker, which is what I classify any &quot;teacher&quot; as. Makes the lectures impossible for me to listen to.
评论 #22490686 未加载
评论 #22493505 未加载
评论 #22499519 未加载
GEBBL大约 5 年前
Some of this stuff is like black magic to me! Absolutely brilliant to see this in the public domain.
badrabbit大约 5 年前
Looks like strictly static analysis? I am personally very interested in using dynamic analysis to guide static analysis efforts. When I do run into malware I need to know its harmful effects and persistence mechanisms (!) immediately so I can do IR. That&#x27;s a different purpose than research or countermeasure development.
ColanR大约 5 年前
Typo in the first paragraph: undergrarduate