Add reversing and malware analysis items

This commit is contained in:
Nick Raienko 2014-08-04 22:36:04 +03:00
parent 8eee9bb43f
commit c37e731f70

View File

@ -30,6 +30,11 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
* [Wireshark](http://www.wireshark.org/) - A network protocol analyzer for Unix and Windows.
* [Network Tools](http://network-tools.com/) - Different network tools: pink, lookup, whois, etc.
#### Reverse Engineering
* [IDA Pro](https://www.hex-rays.com/products/ida/) - A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger.
* [WDK/WinDbg](http://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg.
* [OllyDbg](http://www.ollydbg.de/) - An x86 debugger that emphasizes binary code analysis
#### Hex editors
* [HexEdit.js](http://hexed.it/) - Browser-based hex editing.
@ -78,6 +83,14 @@ A collection of awesome penetration testing resources, tools, confs, books, maga
* [Nmap Network Scanning by Gordon Fyodor Lyon, 2009](http://nmap.org/book/)
* [Wireshark Network Analysis by by Laura Chappell, Gerald Combs, 2012](http://www.wiresharkbook.com/)
#### Reverse Engineering
* [The IDA Pro Book by Chris Eagle, 2011](http://www.nostarch.com/idapro2.htm)
* [Practical Reverse Engineering by Bruce Dang and others, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-1118787315.html)
#### Malware Analysis
* [Practical Malware Analysis by Michael Sikorski, Andrew Honig, 2012](http://www.nostarch.com/malware)
* [The Art of Memory Forensics by Michael Hale Ligh and others, 2014](http://wiley.com/WileyCDA/WileyTitle/productCd-1118825098.html)
#### Windows
* [Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu](http://technet.microsoft.com/en-us/sysinternals/bb963901.aspx)