Reversing Malware Part 1: The Basics
Videos from Reverse Engineering Linux 32-bit Applications
-
Kernel Flaws Part 2: 32-bit System Calls -
You are watching this now -
Reversing Malware Part 2: First Steps -
Reversing Malware Part 3: Symbols and Libraries