
Level: Intermediate
Duration: 64 hours
Table of Content:
- Mapped Files
- DLLs
- Registry
- IPC
- Services
- COM
- Code Injection and Hooking
- Networking
- Security
- Exceptions
A blog about malware analysis, reverse engineering, programming and Windows internals.
Level: Intermediate
Duration: 64 hours
Table of Content: