Kernel Flaws Part 1: How Linux API Functions are Called
Videos from Reverse Engineering Linux 32-bit Applications
-
You are watching this now -
Kernel Flaws Part 2: 32-bit System Calls -
Reversing Malware Part 1: The Basics -
Reversing Malware Part 2: First Steps