malware analysis
Learn everything about malware analysis through professional tutorials, in-depth technical guides, cybersecurity research, networking concepts, reverse engineering insights, and practical programming examples available on TabCode.Net.
-
CHFI Certification: Digital Forensics Guide
Learn about CHFI certification: digital evidence, disk & memory forensics, network tracking, mobile forensics, and career benefits.- x32x01
- Thread
- Replies: 0
- Forum: General PC Hacking Forum
- chfi certification computer forensic investigation cybercrime analysis digital forensics ec council certification evidence collection incident response malware analysis memory forensics network forensics
-
Why Pentesters Must Learn Assembly Language
Learn why assembly is essential for pentesters: reverse engineering, crash analysis, shellcode, and low-level security techniques for x86, ARM, MIPS, and IoT.- x32x01
- Thread
- Replies: 0
- Forum: General PC Hacking Forum
- assembly language binary exploitation control flow analysis debugging tools low level security malware analysis memory management reverse engineering shellcode analysis x86 64 architecture
-
Excel Exploit Spreads Fileless Remcos RAT
Hackers use Excel exploits and phishing emails to spread fileless Remcos RAT malware using PowerShell, memory injection, and stealth tactics.- x32x01
- Thread
- Replies: 0
- Forum: General PC Hacking Forum
- cve-2017-0199 endpoint detection excel exploit fileless malware malware analysis mshta abuse office phishing attack powershell obfuscation process hollowing remcos rat
-
Secret History of Windows Task Manager Code
Explore the secret history of Windows Task Manager, its real source code, WinMain flow, performance graphs, and Windows internals.- x32x01
- Thread
- Replies: 0
- Forum: General Programming Languages Forum
- cpu usage graphs gdi programming malware analysis performance monitoring reverse engineering system programming win32 programming windows internals windows source code windows task manager