- 1. some basics
- 2. function-prologue-and-epilogue
- 3. stack
- 4. printf-with-several-arguments
- 5. scanf
- 6. accessing passed arguments
- Software cracking
- Portable Executable
- Executable and Linkable Format
- Debugging
- Debugger
- Tools: x64_dbg, Immunity Debugger, GNU Debugger, WDK\Windbg, OllyDBG
- Debugger
- Disassembler
- Decompiler
- Obfuscation
- Sandbox
- Anti-tamper software
- Tools: Radare2, dnSpy,
- Resources: Awesome-Reversing, Reverse Engineering Malware 101
- Practical Reverse Engineering Part 1 - Hunting for Debug Ports
- Practical Reverse Engineering Part 2 - Scouting the Firmware
- Practical Reverse Engineering Part 3 - Following the Data
- Practical Reverse Engineering Part 4 - Dumping the Flash
- Practical Reverse Engineering Part 5 - Digging Through the Firmware
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation by Bruce Dang, Elias Bachaalany and Alexandre Gazet, 2014.
- Practical Reverse Engineering
- A modest proposal (Absolutely no babies involved)
- Show My Code is a Free Online Decoder / Decompiler
- Shellcode Injection
- A repository for learning various heap exploitation techniques