Back to Browse

Software Reverse Engineering Part 3.1: Examining an executable (gcc, xxd, godbolt, compilation)

181 views
20:37

We finally look at some code. We learn about a few compilation flags using gcc, we dive into godbolt, and we explore our first set of code constructs (if statements, loops). Notes and code are in the github repo below. github: https://github.com/xiscoding/reverse-engineering

Download

0 formats

No download links available.

Software Reverse Engineering Part 3.1: Examining an executable (gcc, xxd, godbolt, compilation) | NatokHD