πŸ“Š
RE & For & Crypto
test
Reverse Engineering
Reverse Engineering
  • About
  • Basic
    • Evasion Techniques
    • Assembler
      • IDE
      • Asm Language
  • PWN
    • ΠœΠ°Ρ‚Π΅Ρ€ΠΈΠ°Π»Ρ‹ (эксплоиты с CTF ΠΈ Ρ‡ΡŒΠΈ-Ρ‚ΠΎ Π·Π°ΠΌΠ΅Ρ‚ΠΊΠΈ)
    • ВСория
      • Π’Π΅Ρ…Π½ΠΈΠΊΠ° Blind ROP
      • ΠšΡƒΡ€ΡΡ‹
      • Vulnerabilities
      • Π€ΡƒΠ½ΠΊΡ†ΠΈΠΈ
        • C++ memory corruption examples
        • snprintf
        • strncmp
    • Tools
      • ROP
  • Tools
    • By Languages
      • Go
      • Lua
      • Rust
      • Adobe Flash Player Apps (SWF)
    • Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ ΠΎ Π±ΠΈΠ½Π°Ρ€Π½ΠΎΠΌ Ρ„Π°ΠΉΠ»Π΅
    • ΠžΡ‚Π»Π°Π΄Ρ‡ΠΈΠΊΠΈ
    • ВрСйсСры
    • ΠŸΠ°ΠΊΠ΅Ρ€Ρ‹
    • Fuzzers
    • Editors
    • DBI
    • Sandbox
      • PyREBox
    • Decompilers & Disassemblers
      • RetDec
      • Capstone
      • Hopper
      • IDA
        • Some Tips & Tricks
        • IDA Python
      • dnSpy
      • Snowman
      • Analys Go Binaries
      • Ghidra
      • Radare2
    • Binary Parsing
      • LIEF
      • Yara
      • Angr
    • Steganography
    • Other
    • ΠžΠ±Ρ„ΡƒΡΠΊΠ°Ρ‚ΠΎΡ€Ρ‹
  • Windows
    • ASLR/DEP
    • Π Π°Π·Π»ΠΈΡ‡Π½Ρ‹Π΅ Π½Π΅Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚ΠΈΡ€ΠΎΠ²Π°Π½Π½Ρ‹Π΅ структуры
    • Windows API Hook
  • Firmware
    • OWASP Testing methodology
  • MacOS
    • Как ΡƒΠ²ΠΈΠ΄Π΅Ρ‚ΡŒ Π»ΠΎΠ³ΠΈ прилоТСния
    • Код ядра
Powered by GitBook
On this page
  1. Basic
  2. Assembler

Asm Language

PreviousIDENextΠœΠ°Ρ‚Π΅Ρ€ΠΈΠ°Π»Ρ‹ (эксплоиты с CTF ΠΈ Ρ‡ΡŒΠΈ-Ρ‚ΠΎ Π·Π°ΠΌΠ΅Ρ‚ΠΊΠΈ)

Last updated 5 years ago

ΠžΠΏΠΊΠΎΠ΄Ρ‹ x86

Π‘ΠΏΡ€Π°Π²ΠΎΡ‡Π½ΠΈΠΊ Intel ΠΊΠΎΠΌΠ°Π½Π΄ -

ΠšΠΎΠΌΠ°Π½Π΄Ρ‹ AT&T:

http://www.mathemainzel.info/files/x86asmref.html
http://asmworld.ru/spravochnik-komand/
http://web.cse.ohio-state.edu/~reeves.92/CSE2421au12/SlidesDay38.pdf
https://habrahabr.ru/post/146080/