Linking pages
- 2013 Top Security Tools as Voted by ToolsWatch.org Readers – ToolsWatch.org http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ 32 comments
- GitHub - Penetrum-Security/Security-List: Penetrum LLC opensource security tool list. https://github.com/Penetrum-Security/Security-List 23 comments
- 2014 Top Security Tools as Voted by ToolsWatch.org Readers – ToolsWatch.org http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 16 comments
- Windows DLL Proxying/Hijacking – Dev Blog https://cihansol.com/blog/index.php/2021/09/14/windows-dll-proxying-hijacking/ 9 comments
- Reverse Engineering Resources-Beginners to intermediate Guide/Links | by Bbinfosec | Medium https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed 8 comments
- DLL Hijacking for Code Execution - Cra0 - Software Engineer https://cra0.net/blog/posts/dll-hijacking-for-code-execution/ 7 comments
- Reverse Engineering Tools Review https://www.pelock.com/articles/reverse-engineering-tools-review 2 comments
- GitHub - V1V1/OffensiveAutoIt: Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/) https://github.com/V1V1/OffensiveAutoIt 2 comments
- yarGen - A Generator for Yara Rules (for malware researchers) http://www.kitploit.com/2015/07/yargen-generator-for-yara-rules-for.html 0 comments
- cpplinks/executables.md at master · MattPD/cpplinks · GitHub https://github.com/MattPD/cpplinks/blob/master/executables.md 0 comments
- How to Get and Set Up a Free Windows VM for Malware Analysis https://zeltser.com/free-malware-analysis-windows-vm/ 0 comments
- GitHub - clouded-eas/bookmarks: all things awesome security https://github.com/easeip/bookmarks 0 comments
- GitHub - rshipp/awesome-malware-analysis: Defund the Police. https://github.com/rshipp/awesome-malware-analysis 0 comments