<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>malware analysis on </title>
    <link>https://b1872f9d.camati-site.pages.dev/tags/malware-analysis/</link>
    <description>Recent content in malware analysis on </description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 08 Sep 2024 23:08:50 -0300</lastBuildDate><atom:link href="https://b1872f9d.camati-site.pages.dev/tags/malware-analysis/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Case Study 01 - Malware analysis</title>
      <link>https://b1872f9d.camati-site.pages.dev/posts/case-study-01/</link>
      <pubDate>Sun, 08 Sep 2024 23:08:50 -0300</pubDate>
      
      <guid>https://b1872f9d.camati-site.pages.dev/posts/case-study-01/</guid>
      <description>Malware analysis Since I started to learn about how computer works and how can we program it to do what we want, one thing has catch my attention: The assembly language and the power of reverse engineering. Reversing engineer something and having the knowledge of how it works internally so we can use this knowledge in our own projects or for our own understanding, is the clearly definition to &amp;ldquo;hack&amp;rdquo; something.</description>
    </item>
    
  </channel>
</rss>
