I've spent the this year studying RE, and I want to share all the resources that helped me along the way in the following tweets. Trust me, you won't be disappointed! 🧵
#infosec
asmtutor.com (Linux focused)
plantation-productions.com - Win
plantation-productions.com - Linux
godbolt.org - Live C to asm
cs.lmu.edu - Win32/Linux
sonictk.github.io - Modern Win
felixcloutier.com
NASM Assembly Language Tutorials - asmtutor.com
This project was put together to teach myself NASM x86 assembly language on linux. The obligatory 'H...
Art of Assembly Language Programming and HLA by Randall Hyde
The Art of Assembly Language Programming is the World's #1 book on x86 assembly language programming...
Art of Assembly Language Programming and HLA by Randall Hyde
The Art of Assembly Language Programming is the World's #1 book on x86 assembly language programming...
Compiler Explorer
Compiler Explorer is an interactive online compiler which shows the assembly output of compiled C++,...
x86assembly
The x86 architecture is the most popular architecture for desktop and laptop computers. Let’s see ho...
x86 and amd64 instruction reference
THIS REFERENCE IS NOT PERFECT. It's been mechanically separated into distinct files by a dumb script...
p.ost2.fyi
I have wrote a blog on this topic, here:
de-engineer.github.io
Other resources:
brokenthorn.com
raw.githubusercontent.com
cs.bham.ac.uk
Understanding the booting process of a computer and trying to write own operating system.
There are a lot of things that happen under the hood when we start a computer, we will be exploring...
Operating Systems Development Series
by Mike, 2008, Updated 2010 This series is intended to demonstrate and teach operating system develo...
- begin.re by @OphirHarpaz
- artik.blue by @artikblue
- legend.octopuslabs.io
- youtube.com
- youtube.com
- youtube.com
- youtube.com (Recommended)
RE for Beginners | Reverse Engineering
With Reverse Engineering for Beginners you will learn the basics of x86 and get hands-on experience,...
Reversing
All things cyber
Tutorials « The Legend Of Random
nwokiller Unpacking PELock v1.06 Download XOR06 Finding a serial using bitmaps. Download XOR06 Where...
Crackmes
This is a simple place where you can download crackmes to improve your reverse engineering skills. I...
Reversing.Kr
Challenge Collection: Reverse Engineering and CrackMe
Reverse Engineering and Crackme challenges This topic is an aggregation of Crackme and reverse engin...
- vadesecure.com
- youtube.com
- 0x00sec.org
- blackhat.com
- varonis.com
- apr4h.github.io
- youtube.com
- youtube.com
Malware Analysis, Part 1: Understanding Code Obfuscation Techniques
In a preceding article, we conducted a study on a malicious email and noted that code could be execu...
Packers - Executable Compression and Data Obfuscation
Greetings, all. The following paper will be documenting an example of executable compression, AKA pa...
How to Unpack Malware with x64dbg
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explaine...
Manually Unpacking Remcos Malware
I recently started the Zero2Automated Advanced Malware Analysis Course created by @0verfl0w_ and @VK...
Malware Unpacking Tutorials
Packers, packer identifiers, and unpacking of malware samples.
- iopscience.iop.org
- wikileaks.org
- anti-reversing.com
- anti-debug.checkpoint.com
- youtube.com
Anti-analysis:
- malwarebytes.com
- oic-cert.org
- cynet.com
- youtube.com
Anti-Debug Tricks
Anti-Debug Tricks
Five Anti-Analysis Tricks That Sometimes Fool Analysts | Malwarebytes Labs
Find out tricks used to bring analysts to a dead end.
Malware Anti-VM Techniques - Cynet
By clicking next I consent to the use of my personal data by Cynet in accordance with Cynet's Privac...
I have wrote about the most important basic topics like Processes, Virtual Memory and others on my blog as I was not able to find good resources for them, more to come:
de-engineer.github.io
- pluralsight.com - @zodiacon has the best video courses.
- youtube.com
- samsclass.info
-vimeo.com
Windows Internals Book - Sysinternals
Windows Internals book
Pavel Yosifovich
Pavel writes, consults, and trains developers on software development topics from Windows internals,...
Windows Internals
This is "Windows Internals" by Dan Guido on Vimeo, the home for high quality videos and the people w...
- ragestorm.net
- cs.miami.edu
- terminus.rewolf.pl
- ntopcode.wordpress.com
- - #org8e026de" target="_blank" rel="noopener" onclick="event.stopPropagation()">caiorss.github.io
Reversing – Insanely Low-Level
Thursday, December 12th, 2019 This is another information disclosure bug I submitted a few weeks ago...
The NT Handle Table
The NT OS uses objects to represent and access kernel abstractions and system resources, including f...
Terminus Project
Terminus Project by ReWolf, advanced NTDLLs structures diff, starting with Windows XP, up to Windows...
Anatomy of the Process Environment Block (PEB) (Windows Internals)
The Process Environment Block (PEB) is a wonderful thing, and I’d be lying if I told you that I didn...
CPP / C++ Notes - Windows API Programming Win32
cpp/c++ code examples and demonstrations.
- msreverseengineering.com
- versprite.com
- posts.specterops.io
- unit42.paloaltonetworks.com
- alice.climent-pommeret.red
- x86matthew.com
- secret.club
- tiraniddo.dev
- googleprojectzero.blogspot.com
- pastebin.com
Compiler Optimizations for Reverse Engineers — Möbius Strip Reverse Engineering
Originally written Q1 2007 as part of my Static Reverse Engineering Training Class, first published...
Reverse Engineering Undocumented Structures for Windows 10
Learn how to update undocumented structures for Windows 10 x64 and HexRays Decompiler using ESTROBJ...
Methodology for Static Reverse Engineering of Windows Kernel Drivers
Introduction
What I Learned from Reverse Engineering Windows Containers
Our researcher provides an overview on containers - starting with their Linux history - and shows th...
A Syscall Journey in the Windows Kernel
The analysis on this post was made from a Windows 10 x64 bits. If you are trying to compare the cont...
x86matthew - Home
Another alternative to WriteProcessMemory, this time by scheduling APC calls to call RtlFillMemory R...
secret club
Blog about reverse-engineering, hacking and breaking your software in every way imaginable.
Tyranid's Lair
Project Zero
News and updates from the Project Zero team at Google
Resources For Advanced Windows Development and Reverse Engineering - Pastebin.com
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text...
- msreverseengineering.com
- versprite.com
- posts.specterops.io
- unit42.paloaltonetworks.com
- alice.climent-pommeret.red
- x86matthew.com
- secret.club
- tiraniddo.dev
- googleprojectzero.blogspot.com
- pastebin.com
Compiler Optimizations for Reverse Engineers — Möbius Strip Reverse Engineering
Originally written Q1 2007 as part of my Static Reverse Engineering Training Class, first published...
Reverse Engineering Undocumented Structures for Windows 10
Learn how to update undocumented structures for Windows 10 x64 and HexRays Decompiler using ESTROBJ...
Methodology for Static Reverse Engineering of Windows Kernel Drivers
Introduction
What I Learned from Reverse Engineering Windows Containers
Our researcher provides an overview on containers - starting with their Linux history - and shows th...
A Syscall Journey in the Windows Kernel
The analysis on this post was made from a Windows 10 x64 bits. If you are trying to compare the cont...
x86matthew - Home
Another alternative to WriteProcessMemory, this time by scheduling APC calls to call RtlFillMemory R...
secret club
Blog about reverse-engineering, hacking and breaking your software in every way imaginable.
Tyranid's Lair
Project Zero
News and updates from the Project Zero team at Google
Resources For Advanced Windows Development and Reverse Engineering - Pastebin.com
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text...
Reverse eningeering
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Windows Internals: fuzzing, hijacking and weaponizing kernel objects
Advanced Threats are rising in the Windows 10 environment, where sophisticated attack vectors are be...
CodeMachine - Article - Kernel Callback Functions
Comprehensive list of documented and undocumented APIs available in the Windows kernel to register c...
It took me almost 3 hours to compile all these together but I'm glad I did it :D
I have nothing to sell you but if you want to help me, you can donate me at patreon.com
or join ask in our discord server discord.gg
I said I've nothing to sell but he has helped me financially in the past so this is just a thank you <3
Loading suggestions...