Cracking nuts & malware analysis
Deciphering the inner workings of compiled languages in detail. Disassembling binaries to solve crackmes at the assembly level, using as basic tools as possible.
And inspecting several malware samples in the wild, a typical pattern arises, making analysing other samples easier with experience. Knowing these common behaviours gives an idea of what to look for on the defensive side.
Notes on techniques
Coding for better understanding of concepts, and for some hands-on.
- Introduction
- ELF x86 0 protection
- ELF x86 basic
- PE x86 0 protection
- ELF C++ 0 protection
- Godot 0 protection
- PE x86 0 protection
- ELF MIPS basic crackme
- ELF x64 golang basic
- ELF x86 fake instructions
- ELF x86 ptrace
- Godot bytecode
- WASM introduction
- ELF ARM basic crackme
- Godot mono
- PYC bytecode
- ELF x86 no software breakpoints
- ELF ARM crackme 1337
- ELF x86 crackpass
- ELF x86 exploitme
- ELF x86 random crackme
- GB basic Game Boy crackme
- APK anti-debug