- Analysis of a LoadLibraryA Stack String Obfuscation Technique with Radare2 & x86dbg https://www.archcloudlabs.com/projects/loadlibrary-analysis/ 6 comments reverseengineering
Linked pages
- x64dbg http://x64dbg.com/ 53 comments
- x86 calling conventions - Wikipedia https://en.wikipedia.org/wiki/X86_calling_conventions 19 comments
- PE Format - Win32 apps | Microsoft Learn https://learn.microsoft.com/en-us/windows/win32/debug/pe-format#import-lookup-table 7 comments
- Process Explorer - Sysinternals | Microsoft Learn https://learn.microsoft.com/en-us/sysinternals/downloads/process-explorer 2 comments
Related searches:
Search whole site: site:www.archcloudlabs.com
Search title: Analysis of a LoadLibraryA Stack String Obfuscation Technique with Radare2 & x86dbg · Arch Cloud Labs
See how to search.