-
-
Save vijayksingh/be36d11a82397a865cfa9a33642562cf to your computer and use it in GitHub Desktop.
Revisions
-
müffin revised this gist
Oct 5, 2020 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -12,7 +12,7 @@ https://www.youtube.com/playlist?list=PLKK11Ligqitg9MOX3-0tFT1Rmh3uJp7kA ## Intro to x86 Assembly Language https://www.youtube.com/playlist?list=PLmxT2pVYo5LB5EzTPZGfFN0c2GDiSXgQe ## x86_64 Linux Assembly https://www.youtube.com/playlist?list=PLetF-YjXm-sCH6FrTz4AQhfH6INDQvQSn -
müffin revised this gist
Aug 13, 2020 . 1 changed file with 6 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -309,6 +309,12 @@ https://www.tenouk.com/Bufferoverflowc/Bufferoverflow3.html ## Introduction To Reverse Engineering Software http://opensecuritytraining.info/IntroductionToReverseEngineering.html ## Intro to Reverse Engineering https://medium.com/swlh/intro-to-reverse-engineering-45b38370384 ## Intro to Reverse Engineering, Part 2 https://medium.com/swlh/intro-to-reverse-engineering-part-2-4087a70104e9 # ⭐Malware Analysis -
müffin revised this gist
Aug 11, 2020 . No changes.There are no files selected for viewing
-
müffin revised this gist
Aug 8, 2020 . No changes.There are no files selected for viewing
-
müffin revised this gist
Aug 7, 2020 . No changes.There are no files selected for viewing
-
müffin revised this gist
Aug 5, 2020 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -162,6 +162,9 @@ https://github.com/onethawt/reverseengineering-reading-list ## Reverse Engineering 101 by MalwareUnicorn https://malwareunicorn.org/workshops/re101.html#0 ## IDA Pro Reverse Engineering Tutorial for Beginners https://www.youtube.com/playlist?list=PLKwUZp9HwWoDDBPvoapdbJ1rdofowT67z ## Reverse Engineering with IDA PRO from scratch #1 https://www.youtube.com/watch?v=bYDK5IJphPU -
müffin revised this gist
Aug 5, 2020 . 1 changed file with 3 additions and 3 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -303,9 +303,6 @@ https://hot3eed.github.io/2020/08/02/starling_p2_detections_mitigations.html ## BUFFER OVERFLOW 7 The Stack Operation https://www.tenouk.com/Bufferoverflowc/Bufferoverflow3.html ## Introduction To Reverse Engineering Software http://opensecuritytraining.info/IntroductionToReverseEngineering.html @@ -465,6 +462,9 @@ https://github.com/0xd4d/dnSpy ## Java Decompiler http://jd.benow.ca/ ## onlinedisassembler.com https://onlinedisassembler.com/static/home/index.html ## IDR http://kpnc.org/idr32/en/ -
müffin revised this gist
Aug 5, 2020 . 1 changed file with 76 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -101,6 +101,8 @@ http://opensecuritytraining.info/IntroX86.html ## INTRODUCTION TO ARM ASSEMBLY BASICS https://azeria-labs.com/writing-arm-assembly-part-1/ # ⭐Reverse Engineering ## Reverse engineering focusing on x64 Windows. @@ -307,6 +309,7 @@ https://onlinedisassembler.com/static/home/index.html ## Introduction To Reverse Engineering Software http://opensecuritytraining.info/IntroductionToReverseEngineering.html # ⭐Malware Analysis ## So You Want To Be A Malware Analyst @@ -435,6 +438,79 @@ https://www.youtube.com/playlist?list=PLniOzp3l9V83Yf52IXJTvW9rjstdqkduP ## Wireshark display filters which can be used in malware analysis https://www.securityinbits.com/malware-analysis/tools/wireshark-filters/ # ⭐Tools # Disassemblers and decompilers ## Binary Ninja https://binary.ninja/ ## IDA and Hex-Rays https://www.hex-rays.com ## Ghidra https://ghidra-sre.org/ ## radare2 https://www.radare.org/n/radare2.html ## Cutter https://cutter.re/ ## dnSpy https://github.com/0xd4d/dnSpy ## Java Decompiler http://jd.benow.ca/ ## IDR http://kpnc.org/idr32/en/ ## VB Decompiler https://www.vb-decompiler.org/ # Debuggers ## OllyDbg http://www.ollydbg.de/ ## x64dbg http://x64dbg.com/ ## Immunity Debugger https://www.immunityinc.com/products/debugger/ ## WinDbg https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools ## GDB https://www.gnu.org/software/gdb/ # Hex Editor ## Hex Workshop http://www.bpsoft.com/ ## HxD Hex Editor https://mh-nexus.de/en/hxd/ ## 010 Editor https://www.sweetscape.com/010editor/ ## Hexinator https://hexinator.com/ # Identifiers ## Detect It Easy http://ntinfo.biz/ ## ProtectionID http://pid.gamecopyworld.com/ # ⭐Practice ## crackmes.one -
müffin revised this gist
Aug 5, 2020 . 1 changed file with 15 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -136,6 +136,15 @@ https://github.com/GeoSn0w/Reverse-Engineering-Tutorials ## Introduction to Reverse Engineering with Ghidra https://hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra ## Reverse engineering tools review https://www.pelock.com/articles/reverse-engineering-tools-review ## TiGa's Video Tutorial Series on IDA Pro http://www.woodmann.com/TiGa/idaseries.html ## Introduction to Windbg and debugging windows https://www.youtube.com/playlist?list=PLhx7-txsG6t6n_E2LgDGqgvJtCHPL7UFu ## Using Frida For Windows Reverse Engineering https://darungrim.com/research/2020-06-17-using-frida-for-windows-reverse-engineering.html @@ -342,6 +351,12 @@ https://www.youtube.com/playlist?list=PLz8CtXWiXoXnpw41rMRjFOkgO0jxpOf7n ## Beginner Malware Reversing Challenges https://www.malwaretech.com/beginner-malware-reversing-challenges ## Creating a Simple Free Malware Analysis Environment https://www.malwaretech.com/2017/11/creating-a-simple-free-malware-analysis-environment.html ## Malware Analysis for noobs https://drive.google.com/file/d/1lSEps7jDX6an_iXJ0Wokdjh0rnBgY9l7/view ## How to become the best Malware Analyst E-V-E-R http://www.hexacorn.com/blog/2018/04/14/how-to-become-the-best-malware-analyst-e-v-e-r/ -
müffin revised this gist
Aug 4, 2020 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -133,6 +133,9 @@ https://youtu.be/a2EkORFcSZo ## Some Reverse Engineering Tutorials for Beginners https://github.com/GeoSn0w/Reverse-Engineering-Tutorials ## Introduction to Reverse Engineering with Ghidra https://hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra ## Using Frida For Windows Reverse Engineering https://darungrim.com/research/2020-06-17-using-frida-for-windows-reverse-engineering.html -
müffin revised this gist
Aug 4, 2020 . 1 changed file with 3 additions and 3 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -175,6 +175,9 @@ https://github.com/hugsy/defcon_27_windbg_workshop/ ## Reverse Engineering for Beginners https://www.begin.re/ ## Reverse engineering an Android Application https://epic.blog/reverse-engineering/2020/07/27/reverse-engineering-android-app.html ## Debugging with GDB https://sourceware.org/gdb/onlinedocs/gdb/ @@ -232,9 +235,6 @@ https://youtu.be/Min6DWTHDBw ## Simple Tools and Techniques for Reversing a binary https://youtu.be/3NTXFUxcKPc ## A journey into Radare 2 – Part 1: Simple crackme https://www.megabeets.net/a-journey-into-radare-2-part-1/ -
müffin revised this gist
Aug 4, 2020 . 1 changed file with 2 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -396,7 +396,7 @@ https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-3/ ## Analyzing Modern Malware Techniques Part 4 https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-4/ ## Rotkits: What they are, and how to find them http://opensecuritytraining.info/Rootkits.html ## Reverse Engineering Anti-VM Detections in Malware @@ -444,7 +444,7 @@ https://github.com/N4NU/Reversing-Challenges-List https://github.com/3XPL017/Reversing-Challenges ## Latest Reverse Engineering Challenges https://0x00sec.org/c/reverse-engineering/challenges/ ## RE CTFd https://reversing.ctfd.io/challenges -
müffin revised this gist
Aug 4, 2020 . 1 changed file with 6 additions and 3 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -98,6 +98,9 @@ http://opensecuritytraining.info/IntroARM.html ## Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration http://opensecuritytraining.info/IntroX86.html ## INTRODUCTION TO ARM ASSEMBLY BASICS https://azeria-labs.com/writing-arm-assembly-part-1/ # ⭐Reverse Engineering ## Reverse engineering focusing on x64 Windows. @@ -196,8 +199,8 @@ https://artik.blue/reversing ## Reverse Engineering 101 https://prezi.com/a5tm-lf0879-/reverse-engineering-101-nyupoly-2010/ ## DEBUGGING WITH GDB https://azeria-labs.com/debugging-with-gdb-introduction/ ## Reverse engineering tools review https://www.pelock.com/articles/reverse-engineering-tools-review @@ -402,7 +405,7 @@ https://www.youtube.com/watch?v=8yHLqZ3k1Xs ## IDA Pro Tutorial - Reverse Engineering Dynamic Malware Imports https://www.youtube.com/watch?v=hM2Zvsak3GM ## IDA Pro Scripting Intro - Automate Dynamic Import Resolving for REvil Ransomware https://youtu.be/R4xJou6JsIE ## Analysing a Firefox Malware browserassist.dll - FLARE-On 2018 -
müffin revised this gist
Aug 4, 2020 . 1 changed file with 44 additions and 4 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -112,6 +112,9 @@ https://guyinatuxedo.github.io/index.html ## Reverse Engineering Resources-Beginners to intermediate Guide/Links https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed ## ReversingHero Learn Reverse Engineering by solving 15 challenges https://www.reversinghero.com/ ## Introduction to Reverse Engineering https://youtu.be/7v7UaMsgg_c @@ -127,7 +130,6 @@ https://youtu.be/a2EkORFcSZo ## Some Reverse Engineering Tutorials for Beginners https://github.com/GeoSn0w/Reverse-Engineering-Tutorials ## Using Frida For Windows Reverse Engineering https://darungrim.com/research/2020-06-17-using-frida-for-windows-reverse-engineering.html @@ -161,9 +163,6 @@ https://www.apriorit.com/dev-blog/363-how-to-reverse-engineer-os-x-and-ios-softw ## CPU Adventure – Unknown CPU Reversing https://www.robertxiao.ca/hacking/dsctf-2019-cpu-adventure-unknown-cpu-reversing/ ## List of awesome reverse engineering resources https://github.com/wtsxDev/reverse-engineering @@ -304,6 +303,9 @@ https://hshrzd.wordpress.com/how-to-start/ ## Introduction to Malware Analysis and Reverse Engineering https://class.malware.re/ ## The Road To Reverse Engineering Malware https://medium.com/secjuice/the-road-to-reverse-engineering-malware-7c0bc1bda9d2 ## The Basics of Packed Malware: Manually Unpacking UPX Executables https://kindredsec.wordpress.com/2020/01/07/the-basics-of-packed-malware-manually-unpacking-upx-executables/ @@ -408,3 +410,41 @@ https://youtu.be/5cvpGSSUZI0 ## Reversing WannaCry https://www.youtube.com/playlist?list=PLniOzp3l9V83Yf52IXJTvW9rjstdqkduP ## Wireshark display filters which can be used in malware analysis https://www.securityinbits.com/malware-analysis/tools/wireshark-filters/ # ⭐Practice ## crackmes.one https://crackmes.one/ ## Reverse Engineering challenges https://challenges.re/ ## Embedded Security CTF https://microcorruption.com/ ## Beginner Malware Reversing Challenges https://www.malwaretech.com/beginner-malware-reversing-challenges ## RingZer0 https://ringzer0ctf.com/challenges ## Reversing.kr http://reversing.kr/index.php ## CTF Reversing Challenges List https://github.com/N4NU/Reversing-Challenges-List ## Reverse engineering challenges https://github.com/3XPL017/Reversing-Challenges ## Latest Reverse Engineering Challenges https://0x00sec.org/c/reverse-engineering/challenges/13 ## RE CTFd https://reversing.ctfd.io/challenges ## Flare-On6 challenges http://flare-on.com/files/Flare-On6_Challenges.zip -
müffin revised this gist
Aug 4, 2020 . 1 changed file with 42 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -109,6 +109,25 @@ https://revers.engineering/applied-reverse-engineering-series/ ## Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges. https://guyinatuxedo.github.io/index.html ## Reverse Engineering Resources-Beginners to intermediate Guide/Links https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed ## Introduction to Reverse Engineering https://youtu.be/7v7UaMsgg_c ## Introduction to Reverse Engineering | Ollydbg Tutorial https://youtu.be/D6mVIos-S2M ## Ghidra quickstart & tutorial: Solving a simple crackme https://youtu.be/fTGTnrgjuGA ## Reverse Engineering Basics https://youtu.be/a2EkORFcSZo ## Some Reverse Engineering Tutorials for Beginners https://github.com/GeoSn0w/Reverse-Engineering-Tutorials ## Using Frida For Windows Reverse Engineering https://darungrim.com/research/2020-06-17-using-frida-for-windows-reverse-engineering.html @@ -127,8 +146,11 @@ https://malwareunicorn.org/workshops/re101.html#0 ## Reverse Engineering with IDA PRO from scratch #1 https://www.youtube.com/watch?v=bYDK5IJphPU ## Patching Binaries (with vim, Binary Ninja, Ghidra and radare2) https://youtu.be/LyNyf3UM9Yc ## Reversing Statically-Linked Binaries with Function Signatures https://youtu.be/CgGha_zLqlo ## Modern Binary Exploitation http://security.cs.rpi.edu/courses/binexp-spring2015/ @@ -202,6 +224,12 @@ https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners ## Introduction To Reverse Engineering With Radare2 https://www.youtube.com/watch?v=LAkYW5ixvhg ## Reverse Engineering Quick Tip - Unpacking Process Injection With a Single Breakpoint https://youtu.be/Min6DWTHDBw ## Simple Tools and Techniques for Reversing a binary https://youtu.be/3NTXFUxcKPc ## microcorruption https://microcorruption.com @@ -368,3 +396,15 @@ http://opensecuritytraining.info/Rootkits.html ## Reverse Engineering Anti-VM Detections in Malware https://www.youtube.com/watch?v=8yHLqZ3k1Xs ## IDA Pro Tutorial - Reverse Engineering Dynamic Malware Imports https://www.youtube.com/watch?v=hM2Zvsak3GM ## DA Pro Scripting Intro - Automate Dynamic Import Resolving for REvil Ransomware https://youtu.be/R4xJou6JsIE ## Analysing a Firefox Malware browserassist.dll - FLARE-On 2018 https://youtu.be/5cvpGSSUZI0 ## Reversing WannaCry https://www.youtube.com/playlist?list=PLniOzp3l9V83Yf52IXJTvW9rjstdqkduP -
müffin revised this gist
Aug 4, 2020 . 1 changed file with 199 additions and 189 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,50 +1,120 @@ # Assembly Language / Reversing / Malware Analysis -resources <div align="center"> <img src="http://www.nyan.cat/cats/original.gif" height="128"> </div> ## [](https://twitter.com/navneetmuffin) # ⭐Assembly Language ## Modern x64 Assembly https://www.youtube.com/playlist?list=PLKK11Ligqitg9MOX3-0tFT1Rmh3uJp7kA ## Intro to x86 Assembly Language https://www.youtube.com/playlist?list=PLmxT2pVYo5LB5EzTPZGfFN0c2GDiSXgQ ## x86_64 Linux Assembly https://www.youtube.com/playlist?list=PLetF-YjXm-sCH6FrTz4AQhfH6INDQvQSn ## Intro x86 (32 bit) https://www.youtube.com/playlist?list=PL038BE01D3BAEFDB0 ## Assembly Programming Tutorial https://www.tutorialspoint.com/assembly_programming/index.html ## Practical x64 Assembly and C++ Tutorials https://www.youtube.com/playlist?list=PL0C5C980A28FEE68D ## Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration http://opensecuritytraining.info/IntroX86.html ## LINUX SYSTEM CALL TABLE FOR X86 64 https://blog.rchapman.org/posts/Linux_System_Call_Table_for_x86_64/ ## Learning assembly for linux-x64 https://github.com/0xAX/asm ## x86-assembly-cheat https://github.com/cirosantilli/x86-assembly-cheat ## x86 Assembly Guide https://www.cs.virginia.edu/~evans/cs216/guides/x86.html ## Assembly’s Perspective https://blog.stephenmarz.com/2020/05/20/assemblys-perspective/ ## A Crash Course in x86 Assembly for Reverse Engineers https://sensepost.com/blogstatic/2014/01/SensePost_crash_course_in_x86_assembly-.pdf ## Understanding C by learning assembly https://www.recurse.com/blog/7-understanding-c-by-learning-assembly ## x86 Assembly Crash Course → YouTube https://www.youtube.com/watch?v=75gBFiFtAb8 ## x86 and amd64 instruction reference https://www.felixcloutier.com/x86/index.html ## Learn x86_64 Assembly https://gpfault.net/posts/asm-tut-0.txt.html https://gpfault.net/posts/asm-tut-1.txt.html https://gpfault.net/posts/asm-tut-2.txt.html ## x86-64 Assembly Programming with Ubuntu http://www.egr.unlv.edu/~ed/assembly64.pdf ## Assembly for beginners https://pacman128.github.io/pcasm/ ## Assembly Language Succinctly https://www.syncfusion.com/ebooks/assemblylanguage ## Everything you want to know about x86 microcode, but might have been afraid to ask https://media.ccc.de/v/34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask ## Beginner Write your first Assembly Language program – Hello World!! [explained] http://cssimplified.com/computer-organisation-and-assembly-language-programming/beginner-write-your-first-assembly-language-program-hello-world-explained ## Assembly Language: How To Learn To Code Assembly Today https://www.whoishostingthis.com/resources/assembly-language/ ## Quick Guide to Assembly in 161 - Berkeley https://inst.eecs.berkeley.edu/~cs161/sp15/discussions/dis06-assembly.pdf ## godbolt.org - Code ↔ Assembly https://godbolt.org/ ## A gentle introduction into ARM assembly https://www.shadowinfosec.io/2018/05/a-gentle-introduction-into-arm-assembly.html ## Introduction to ARM http://opensecuritytraining.info/IntroARM.html ## Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration http://opensecuritytraining.info/IntroX86.html # ⭐Reverse Engineering ## Reverse engineering focusing on x64 Windows. https://github.com/0xZ0F/Z0FCourse_ReverseEngineering ## Applied Reverse Engineering Series https://revers.engineering/applied-reverse-engineering-series/ ## Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges. https://guyinatuxedo.github.io/index.html ## Using Frida For Windows Reverse Engineering https://darungrim.com/research/2020-06-17-using-frida-for-windows-reverse-engineering.html ## SecurityTube GDB Expert Playlist https://www.youtube.com/playlist?list=PLiP0FxVgYuUz0kdK7L7YaI5n4qkOuymue ## Binary Exploitation / Memory Corruption by LiveOverflow https://www.youtube.com/playlist?list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN @@ -54,84 +124,36 @@ https://github.com/onethawt/reverseengineering-reading-list ## Reverse Engineering 101 by MalwareUnicorn https://malwareunicorn.org/workshops/re101.html#0 ## Reverse Engineering with IDA PRO from scratch #1 https://www.youtube.com/watch?v=bYDK5IJphPU ## Reverse Engineering Resources-Beginners to intermediate Guide/Links https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed ## Modern Binary Exploitation http://security.cs.rpi.edu/courses/binexp-spring2015/ ## How to Reverse Engineer an iOS App and macOS Software https://www.apriorit.com/dev-blog/363-how-to-reverse-engineer-os-x-and-ios-software ## CPU Adventure – Unknown CPU Reversing https://www.robertxiao.ca/hacking/dsctf-2019-cpu-adventure-unknown-cpu-reversing/ ## CTF Reversing Challenges List https://github.com/N4NU/Reversing-Challenges-List ## List of awesome reverse engineering resources https://github.com/wtsxDev/reverse-engineering ## Modern Debugging with WinDbg Preview https://github.com/hugsy/defcon_27_windbg_workshop/ ## Reverse Engineering for Beginners https://www.begin.re/ ## Debugging with GDB https://sourceware.org/gdb/onlinedocs/gdb/ ## GDB Cheatsheet https://gist.github.com/r1walz/64babc526d4e6f753c0821e46211dd30 @@ -144,27 +166,12 @@ https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/ ## Introduction to Reverse Engineering with Ghidra: A Four Session Course https://wrongbaud.github.io/ghidra-training/ ## A Reverse Engineering Tool Kit for Go, Written in Go. https://go-re.tk/ ## Reverse engineering course (with radare2) https://artik.blue/reversing ## Reverse Engineering 101 https://prezi.com/a5tm-lf0879-/reverse-engineering-101-nyupoly-2010/ @@ -174,21 +181,12 @@ https://0x00sec.org/c/reverse-engineering/challenges ## Reverse engineering tools review https://www.pelock.com/articles/reverse-engineering-tools-review ## Reverse Engineering for Beginners https://beginners.re/ ## Ghidra Cheatsheet https://ghidra-sre.org/CheatSheet.html ## Reverse Engineering 101 https://vimeo.com/6764570 @@ -201,36 +199,122 @@ https://www.notion.so/806c7afcbce24dc19e26fcd4b9c84f7b?v=ee1e96f93aaa46e2a2d11c9 ## Linux Reverse Engineering CTFs for Beginners https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners/ ## Introduction To Reverse Engineering With Radare2 https://www.youtube.com/watch?v=LAkYW5ixvhg ## microcorruption https://microcorruption.com ## A journey into Radare 2 – Part 1: Simple crackme https://www.megabeets.net/a-journey-into-radare-2-part-1/ ## Windows for Reverse Engineers http://www.cse.tkk.fi/fi/opinnot/T-110.6220/2014_Reverse_Engineering_Malware_AND_Mobile_Platform_Security_AND_Software_Security/luennot-files/T1106220.pdf ## Linux Binary Exploitation Series (with pwnable.kr) https://www.taintedbits.com/2020/04/28/linux-binary-exploitation-series-with-pwnable-kr/ ## Reverse Engineering https://ctf101.org/reverse-engineering/overview/ ## Binary Exploitation https://ctf101.org/binary-exploitation/overview/ ## WinDbg — the Fun Way: Part 1 https://medium.com/@yardenshafir2/windbg-the-fun-way-part-1-2e4978791f9b ## Reverse Engineering Lecture https://www.youtube.com/watch?v=nf7yj51WkUA ## Python for Reverse Engineering #1: ELF Binaries https://icyphox.sh/blog/python-for-re-1/ ## Binary exploitation slides https://www.slideshare.net/AngelBoy1/presentations ## Video lectures, tools, and papers on reversing https://reversing.io/resources/ ## Reverse Engineering Beta https://reverseengineering.stackexchange.com/ ## Becoming a full-stack reverse-engineer https://youtu.be/9vKG8-TnawY ## Binary Analysis Course https://maxkersten.nl/binary-analysis-course/ ## Lenas Reversing for Newbies https://forum.tuts4you.com/files/file/1307-lenas-reversing-for-newbies/ ## Introduction to Ghidra Student Guide https://ghidra.re/courses/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide_withNotes.html ## Reverse Engineering Starling Bank (Part I): Obfuscation Techniques https://hot3eed.github.io/2020/07/30/starling_p1_obfuscations.html ## Reverse Engineering Starling Bank (Part II): Jailbreak & Debugger Detection, Weaknesses & Mitigations https://hot3eed.github.io/2020/08/02/starling_p2_detections_mitigations.html ## BUFFER OVERFLOW 7 The Stack Operation https://www.tenouk.com/Bufferoverflowc/Bufferoverflow3.html ## onlinedisassembler.com https://onlinedisassembler.com/static/home/index.html ## Introduction To Reverse Engineering Software http://opensecuritytraining.info/IntroductionToReverseEngineering.html # ⭐Malware Analysis ## So You Want To Be A Malware Analyst https://blog.malwarebytes.com/security-world/2012/09/so-you-want-to-be-a-malware-analyst/ ## How to start RE/malware analysis? https://hshrzd.wordpress.com/how-to-start/ ## Introduction to Malware Analysis and Reverse Engineering https://class.malware.re/ ## The Basics of Packed Malware: Manually Unpacking UPX Executables https://kindredsec.wordpress.com/2020/01/07/the-basics-of-packed-malware-manually-unpacking-upx-executables/ ## Awesome Malware Analysis https://github.com/rshipp/awesome-malware-analysis ## Best Malware Analysis Tools | Learn Malware Analysis https://www.youtube.com/watch?v=Wh_DJTaDq6U ## Malware Analysis Tutorials: a Reverse Engineering Approach https://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html ## Malware, IR - Tools & Resources https://docs.google.com/spreadsheets/d/13wBzwmfAoEBPUgcYM4CgSoj--xLicPz777IQ6iSUlNk/edit#gid=1407551440 ## WinDbg Basics for Malware Analysis https://www.youtube.com/watch?v=QuFJpH3My7A ## Reverse Engineering Windows Malware with Ghidra https://www.youtube.com/watch?v=NuSdV8t3S4I ## Fifty Shades of Malware Strings https://medium.com/@tom_rock/fifty-shades-of-malware-strings-d33b0c7bee99 ## GETTING STARTED | Reverse Engineering Android Malware https://www.youtube.com/playlist?list=PLz8CtXWiXoXnpw41rMRjFOkgO0jxpOf7n ## Beginner Malware Reversing Challenges https://www.malwaretech.com/beginner-malware-reversing-challenges ## How to become the best Malware Analyst E-V-E-R http://www.hexacorn.com/blog/2018/04/14/how-to-become-the-best-malware-analyst-e-v-e-r/ ## Malware Dynamic Analysis http://opensecuritytraining.info/MalwareDynamicAnalysis.html ## Reverse Engineering Malware http://opensecuritytraining.info/ReverseEngineeringMalware.html ## malware analysis https://www.youtube.com/playlist?list=PLOIa0J36PkUhKKjREFKzDo4DAP0W_Wce4 @@ -258,77 +342,12 @@ https://www.youtube.com/playlist?list=PL3CZ2aaB7m81OSOJ5Go-2sBbFcVVxX9Xu ## Malware Analysis Tutorials https://www.youtube.com/playlist?list=PLPsJIruML_Zg_iLA2bfoAPCo5d2aEuuV8 ## Engineering antivirus evasion https://blog.scrt.ch/2020/06/19/engineering-antivirus-evasion/ ## Training 1: File Type Analysis and Code Extraction from Malicious Document https://struppigel.blogspot.com/2017/06/training-1-file-type-analysis-and-code.html?view=sidebar ## Malware Noob2Ninja Course https://www.youtube.com/playlist?list=PLiFO-R_BI-kAqDPqtnOq2n70mtAZ6xg5N @@ -344,17 +363,8 @@ https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-3/ ## Analyzing Modern Malware Techniques Part 4 https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-4/ ## Rotkits: hat they are, and how to find them http://opensecuritytraining.info/Rootkits.html ## Reverse Engineering Anti-VM Detections in Malware https://www.youtube.com/watch?v=8yHLqZ3k1Xs -
müffin revised this gist
Aug 3, 2020 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -3,6 +3,8 @@ <img src="http://www.nyan.cat/cats/original.gif" height="128"> </div> ## [](https://twitter.com/navneetmuffin) ## Reverse engineering focusing on x64 Windows. https://github.com/0xZ0F/Z0FCourse_ReverseEngineering -
müffin revised this gist
Aug 3, 2020 . 1 changed file with 5 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -351,3 +351,8 @@ https://www.shadowinfosec.io/2018/05/a-gentle-introduction-into-arm-assembly.htm ## Lenas Reversing for Newbies https://forum.tuts4you.com/files/file/1307-lenas-reversing-for-newbies/ ## Introduction to Ghidra Student Guide https://ghidra.re/courses/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide_withNotes.html -
müffin revised this gist
Aug 3, 2020 . 1 changed file with 0 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -2,7 +2,6 @@ <div align="center"> <img src="http://www.nyan.cat/cats/original.gif" height="128"> </div> ## Reverse engineering focusing on x64 Windows. -
müffin revised this gist
Aug 3, 2020 . 1 changed file with 2 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,7 +1,8 @@ # Reversing / Malware Analysis / Assembly -resources <div align="center"> <img src="http://www.nyan.cat/cats/original.gif" height="128"> </div> [](https://twitter.com/navneetmuffin) ## Reverse engineering focusing on x64 Windows. -
müffin revised this gist
Aug 3, 2020 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,7 +1,7 @@ # Reversing / Malware Analysis / Assembly -resources <div align="center"> <img src="http://www.nyan.cat/cats/original.gif" height="128"> </div> [](https://twitter.com/navneetmuffin) ## Reverse engineering focusing on x64 Windows. -
müffin revised this gist
Aug 3, 2020 . 1 changed file with 9 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -342,3 +342,12 @@ https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-3/ ## Analyzing Modern Malware Techniques Part 4 https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-4/ ## Binary Analysis Course https://maxkersten.nl/binary-analysis-course/ ## A gentle introduction into ARM assembly https://www.shadowinfosec.io/2018/05/a-gentle-introduction-into-arm-assembly.html ## Lenas Reversing for Newbies https://forum.tuts4you.com/files/file/1307-lenas-reversing-for-newbies/ -
müffin revised this gist
Jul 29, 2020 . 1 changed file with 17 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -325,4 +325,20 @@ https://reversing.io/resources/ https://reverseengineering.stackexchange.com/ ## Becoming a full-stack reverse-engineer https://youtu.be/9vKG8-TnawY ## Malware Noob2Ninja Course https://www.youtube.com/playlist?list=PLiFO-R_BI-kAqDPqtnOq2n70mtAZ6xg5N ## Analyzing Modern Malware Techniques Part 1 https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-1/ ## Analyzing Modern Malware Techniques Part 2 https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-2/ ## Analyzing Modern Malware Techniques Part 3 https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-3/ ## Analyzing Modern Malware Techniques Part 4 https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-4/ -
müffin revised this gist
Jul 29, 2020 . 1 changed file with 4 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -322,4 +322,7 @@ https://www.slideshare.net/AngelBoy1/presentations https://reversing.io/resources/ ## Reverse Engineering Beta https://reverseengineering.stackexchange.com/ ## Becoming a full-stack reverse-engineer https://youtu.be/9vKG8-TnawY -
müffin revised this gist
Jul 29, 2020 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -321,3 +321,5 @@ https://www.slideshare.net/AngelBoy1/presentations ## Video lectures, tools, and papers on reversing https://reversing.io/resources/ ## Reverse Engineering Beta https://reverseengineering.stackexchange.com/ -
müffin revised this gist
Jul 29, 2020 . No changes.There are no files selected for viewing
-
müffin created this gist
Jul 29, 2020 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,323 @@ # Reversing / Malware Analysis / Assembly -resources <div align="center"> <img src="http://www.nyan.cat/cats/original.gif" height="128"> </div> ## Reverse engineering focusing on x64 Windows. https://github.com/0xZ0F/Z0FCourse_ReverseEngineering ## Applied Reverse Engineering Series https://revers.engineering/applied-reverse-engineering-series/ ## So You Want To Be A Malware Analyst https://blog.malwarebytes.com/security-world/2012/09/so-you-want-to-be-a-malware-analyst/ ## Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges. https://guyinatuxedo.github.io/index.html ## How to start RE/malware analysis? https://hshrzd.wordpress.com/how-to-start/ ## Introduction to Malware Analysis and Reverse Engineering https://class.malware.re/ ## Using Frida For Windows Reverse Engineering https://darungrim.com/research/2020-06-17-using-frida-for-windows-reverse-engineering.html ## Modern x64 Assembly https://www.youtube.com/playlist?list=PLKK11Ligqitg9MOX3-0tFT1Rmh3uJp7kA ## Intro to x86 Assembly Language https://www.youtube.com/playlist?list=PLmxT2pVYo5LB5EzTPZGfFN0c2GDiSXgQe ## x86_64 Linux Assembly https://www.youtube.com/playlist?list=PLetF-YjXm-sCH6FrTz4AQhfH6INDQvQSn ## SecurityTube GDB Expert Playlist https://www.youtube.com/playlist?list=PLiP0FxVgYuUz0kdK7L7YaI5n4qkOuymue ## Intro x86 (32 bit) https://www.youtube.com/playlist?list=PL038BE01D3BAEFDB0 ## “Must Have” Free Resources for Malware Analysis https://securityboulevard.com/2020/06/must-have-free-resources-for-malware-analysis/ ## Binary Exploitation / Memory Corruption by LiveOverflow https://www.youtube.com/playlist?list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN ## Reverse Engineering Reading List https://github.com/onethawt/reverseengineering-reading-list ## Reverse Engineering 101 by MalwareUnicorn https://malwareunicorn.org/workshops/re101.html#0 ## Assembly Programming Tutorial https://www.tutorialspoint.com/assembly_programming/index.html ## Reverse Engineering with IDA PRO from scratch #1 https://www.youtube.com/watch?v=bYDK5IJphPU ## The Basics of Packed Malware: Manually Unpacking UPX Executables https://kindredsec.wordpress.com/2020/01/07/the-basics-of-packed-malware-manually-unpacking-upx-executables/ ## Practical x64 Assembly and C++ Tutorials https://www.youtube.com/playlist?list=PL0C5C980A28FEE68D ## LINUX SYSTEM CALL TABLE FOR X86 64 https://blog.rchapman.org/posts/Linux_System_Call_Table_for_x86_64/ ## Reverse Engineering Resources-Beginners to intermediate Guide/Links https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed ## Modern Binary Exploitation http://security.cs.rpi.edu/courses/binexp-spring2015/ ## Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration http://opensecuritytraining.info/IntroX86.html ## How to Reverse Engineer an iOS App and macOS Software https://www.apriorit.com/dev-blog/363-how-to-reverse-engineer-os-x-and-ios-software ## Reverse Engineering Anti-VM Detections in Malware https://www.youtube.com/watch?v=8yHLqZ3k1Xs ## CPU Adventure – Unknown CPU Reversing https://www.robertxiao.ca/hacking/dsctf-2019-cpu-adventure-unknown-cpu-reversing/ ## Awesome Malware Analysis https://github.com/rshipp/awesome-malware-analysis ## CTF Reversing Challenges List https://github.com/N4NU/Reversing-Challenges-List ## Learning assembly for linux-x64 https://github.com/0xAX/asm ## Best Malware Analysis Tools | Learn Malware Analysis https://www.youtube.com/watch?v=Wh_DJTaDq6U ## List of awesome reverse engineering resources https://github.com/wtsxDev/reverse-engineering ## The world’s 1st book of very detailed iOS App reverse engineering skills :) https://github.com/iosre/iOSAppReverseEngineering ## Open Security Training http://opensecuritytraining.info/Training.html ## Malware Analysis Tutorials: a Reverse Engineering Approach https://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html ## Modern Debugging with WinDbg Preview https://github.com/hugsy/defcon_27_windbg_workshop/ ## Malware, IR - Tools & Resources https://docs.google.com/spreadsheets/d/13wBzwmfAoEBPUgcYM4CgSoj--xLicPz777IQ6iSUlNk/edit#gid=1407551440 ## x86-assembly-cheat https://github.com/cirosantilli/x86-assembly-cheat ## Reverse Engineering for Beginners https://www.begin.re/ ## Debugging with GDB https://sourceware.org/gdb/onlinedocs/gdb/ ## WinDbg Basics for Malware Analysis https://www.youtube.com/watch?v=QuFJpH3My7A ## Reverse Engineering Windows Malware with Ghidra https://www.youtube.com/watch?v=NuSdV8t3S4I ## GDB Cheatsheet https://gist.github.com/r1walz/64babc526d4e6f753c0821e46211dd30 ## Index of the training Reversing & Exploiting with Free Tools https://docs.google.com/document/d/18FBSpnPrduNidGS4SAQreXITHMz6PyYfx2nqlcTKDSM/edit#heading=h.uzujihnza7no ## ANDROID APPLICATIONS REVERSING 101 https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/ ## Introduction to Reverse Engineering with Ghidra: A Four Session Course https://wrongbaud.github.io/ghidra-training/ ## Fifty Shades of Malware Strings https://medium.com/@tom_rock/fifty-shades-of-malware-strings-d33b0c7bee99 ## Everything you want to know about x86 microcode, but might have been afraid to ask https://media.ccc.de/v/34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask ## A Reverse Engineering Tool Kit for Go, Written in Go. https://go-re.tk/ ## Reverse engineering course (with radare2) https://artik.blue/reversing ## GETTING STARTED | Reverse Engineering Android Malware https://www.youtube.com/playlist?list=PLz8CtXWiXoXnpw41rMRjFOkgO0jxpOf7n ## Beginner Malware Reversing Challenges https://www.malwaretech.com/beginner-malware-reversing-challenges ## Beginner Write your first Assembly Language program – Hello World!! [explained] http://cssimplified.com/computer-organisation-and-assembly-language-programming/beginner-write-your-first-assembly-language-program-hello-world-explained ## Reverse Engineering 101 https://prezi.com/a5tm-lf0879-/reverse-engineering-101-nyupoly-2010/ ## reverse-engineering challenges https://0x00sec.org/c/reverse-engineering/challenges ## Reverse engineering tools review https://www.pelock.com/articles/reverse-engineering-tools-review ## How to become the best Malware Analyst E-V-E-R http://www.hexacorn.com/blog/2018/04/14/how-to-become-the-best-malware-analyst-e-v-e-r/ ## Reverse Engineering for Beginners https://beginners.re/ ## Ghidra Cheatsheet https://ghidra-sre.org/CheatSheet.html ## x86 Assembly Guide https://www.cs.virginia.edu/~evans/cs216/guides/x86.html ## Assembly Language: How To Learn To Code Assembly Today https://www.whoishostingthis.com/resources/assembly-language/ ## Reverse Engineering 101 https://vimeo.com/6764570 ## Reverse Engineering https://old.liveoverflow.com/binary_hacking/reverse_engineering.html ## [RE Useful Links & Resources] https://www.notion.so/806c7afcbce24dc19e26fcd4b9c84f7b?v=ee1e96f93aaa46e2a2d11c9d70ed3a8b ## Linux Reverse Engineering CTFs for Beginners https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners/ ## Assembly’s Perspective https://blog.stephenmarz.com/2020/05/20/assemblys-perspective/ ## Introduction To Reverse Engineering With Radare2 https://www.youtube.com/watch?v=LAkYW5ixvhg ## Understanding the differences between 8bit, 16bit, 32bit, and 64bit -- Arrow Tech Trivia https://www.youtube.com/watch?v=_SkpnG571z8 ## microcorruption https://microcorruption.com ## A Crash Course in x86 Assembly for Reverse Engineers https://sensepost.com/blogstatic/2014/01/SensePost_crash_course_in_x86_assembly-.pdf ## Understanding C by learning assembly https://www.recurse.com/blog/7-understanding-c-by-learning-assembly ## myexperiments.io - Exploit a basic buffer overflow https://myexperiments.io/exploit-basic-buffer-overflow.html ## x86 Assembly Crash Course → YouTube https://www.youtube.com/watch?v=75gBFiFtAb8 ## BUFFER OVERFLOW 7 The Stack Operation https://www.tenouk.com/Bufferoverflowc/Bufferoverflow3.html ## onlinedisassembler.com https://onlinedisassembler.com/static/home/index.html ## malware analysis https://www.youtube.com/playlist?list=PLOIa0J36PkUhKKjREFKzDo4DAP0W_Wce4 ## Malware Unpacking Tutorials https://www.youtube.com/playlist?list=PLynb9SXC4yER8NinXJwV4GHUM9-jaIsN_ ## Misc Malware Analysis https://www.youtube.com/playlist?list=PLynb9SXC4yEQFbBGoLy9yGaHM_71RoTG4 ## Malware Theory on Blackboard https://www.youtube.com/playlist?list=PLynb9SXC4yETaQYYBSg696V77Ku8TOM8- ## Malware Analysis Techniques https://www.youtube.com/playlist?list=PLVMLi-YiSh3zR9hSGWxhBXGFrZ19jvDdm ## Malware Analysis https://www.youtube.com/playlist?list=PLVMLi-YiSh3yKO06HnnT3OJXbAVfNWySF ## malware unpacking https://www.youtube.com/playlist?list=PL3CZ2aaB7m83eYTAVV2knNglB8I4y5QmH ## malware https://www.youtube.com/playlist?list=PL3CZ2aaB7m81OSOJ5Go-2sBbFcVVxX9Xu ## Malware Analysis Tutorials https://www.youtube.com/playlist?list=PLPsJIruML_Zg_iLA2bfoAPCo5d2aEuuV8 ## Quick Guide to Assembly in 161 - Berkeley https://inst.eecs.berkeley.edu/~cs161/sp15/discussions/dis06-assembly.pdf ## godbolt.org - Code ↔ Assembly https://godbolt.org/ ## A journey into Radare 2 – Part 1: Simple crackme https://www.megabeets.net/a-journey-into-radare-2-part-1/ ## x86 and amd64 instruction reference https://www.felixcloutier.com/x86/index.html ## AT&T Syntax versus Intel Syntax → mit.edu http://web.mit.edu/rhel-doc/3/rhel-as-en-3/i386-syntax.html ## Windows for Reverse Engineers http://www.cse.tkk.fi/fi/opinnot/T-110.6220/2014_Reverse_Engineering_Malware_AND_Mobile_Platform_Security_AND_Software_Security/luennot-files/T1106220.pdf ## Engineering antivirus evasion https://blog.scrt.ch/2020/06/19/engineering-antivirus-evasion/ ## Linux Binary Exploitation Series (with pwnable.kr) https://www.taintedbits.com/2020/04/28/linux-binary-exploitation-series-with-pwnable-kr/ ## Reverse Engineering https://ctf101.org/reverse-engineering/overview/ ## Binary Exploitation https://ctf101.org/binary-exploitation/overview/ ## Learn x86_64 Assembly https://gpfault.net/posts/asm-tut-0.txt.html https://gpfault.net/posts/asm-tut-1.txt.html https://gpfault.net/posts/asm-tut-2.txt.html ## WinDbg — the Fun Way: Part 1 https://medium.com/@yardenshafir2/windbg-the-fun-way-part-1-2e4978791f9b ## x86-64 Assembly Programming with Ubuntu http://www.egr.unlv.edu/~ed/assembly64.pdf ## Reverse Engineering Lecture https://www.youtube.com/watch?v=nf7yj51WkUA ## Python for Reverse Engineering #1: ELF Binaries https://icyphox.sh/blog/python-for-re-1/ ## Training 1: File Type Analysis and Code Extraction from Malicious Document https://struppigel.blogspot.com/2017/06/training-1-file-type-analysis-and-code.html?view=sidebar ## Assembly for beginners https://pacman128.github.io/pcasm/ ## Assembly Language Succinctly https://www.syncfusion.com/ebooks/assemblylanguage ## Binary exploitation slides https://www.slideshare.net/AngelBoy1/presentations ## Video lectures, tools, and papers on reversing https://reversing.io/resources/