Reverse Engineering and More (@re_and_more) 's Twitter Profile
Reverse Engineering and More

@re_and_more

RE and More by Alexey Kleymenov (re-and-more.com). Private classes and group workshops in malware analysis and reverse engineering. #infosec #malware

ID: 1273897211424911360

linkhttps://re-and-more.com calendar_today19-06-2020 08:36:57

688 Tweet

14,14K Takipçi

528 Takip Edilen

Reverse Engineering and More (@re_and_more) 's Twitter Profile Photo

RE tip of the day: At runtime, Windows Loader parses the import directory to get all the required imports by their names/ordinals, loads the corresponding DLLs into the process's address space and writes the imports' addresses into the IAT. #infosec #malware #reverseengineering

RE tip of the day: At runtime, Windows Loader parses the import directory to get all the required imports by their names/ordinals, loads the corresponding DLLs into the process's address space and writes the imports' addresses into the IAT.
#infosec #malware #reverseengineering