0% found this document useful (0 votes)
183 views1 page

V It C C++ I S: e A Io Wi "Ga E"::: Reverse Engineering

This document provides resources for learning reverse engineering including links to courses on basic computer architecture, the stack, exceptions, interrupts and accelerated assembly. It also lists references on reverse engineering with IDA Pro, analyzing data structures with Ghidra, software reverse engineering with Ghidra, and decompiling with IDA. Books and training courses on reverse engineering, malware analysis, and incident response are also referenced.

Uploaded by

rsadga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
183 views1 page

V It C C++ I S: e A Io Wi "Ga E"::: Reverse Engineering

This document provides resources for learning reverse engineering including links to courses on basic computer architecture, the stack, exceptions, interrupts and accelerated assembly. It also lists references on reverse engineering with IDA Pro, analyzing data structures with Ghidra, software reverse engineering with Ghidra, and decompiling with IDA. Books and training courses on reverse engineering, malware analysis, and incident response are also referenced.

Uploaded by

rsadga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Applied Reverse Engineering: Basic Architecture

https://revers.engineering/applied-re-basic-architecture/
Applied Reverse Engineering: The Stack
https://revers.engineering/applied-re-the-stack/
Applied Reverse Engineering: Exceptions And Interrupts
https://revers.engineering/applied-re-exceptions/
Applied Reverse Engineering: Accelerated Assembly [P1]
https://revers.engineering/applied-re-accelerated-assembly-p1/
Applied Reverse Engineering: Accelerated Assembly [P2]
https://revers.engineering/applied-re-accelerated-assembly-p2/
Assembly "x86 - x86/64 - ARM - MIPS...etc."

Assembly courses:
https://www.youtube. com/playlist?1ist=PL_joX3jb1YBMTHq_2QTrpqVxHi-EhokHG
Open Security Training : Intro x86 (32 bit) - YouTube
Intermediate x86 (32 bit) - YouTube
1- The Art of Assembly Language Book

RE References: 2- Professional Assembly Language Book


https://www.facebook.com/vs.viro/posts/471437990199235
Computer architecture & organization
https://www.facebook.com/vs.viro/posts/508599133149787
Basics: High Level Programming Language
Practical Reverse Engineering Book
Network Basics
Reverse Engineering for Beginners Book
eLearn Security eCMAP:
Ricardo Reverse Engineering with IDA pro course:
eCMAP Certification - eLearn Security
http://www.ricardonarvaja.info/WEB/IDA%20DESDE%20CERO/EN%20INGLES/INGLES/
SANS 610:
RE Data Structure with Ghidra:
https://www.sans.org/cyber-security-courses/reverse-engineering-malware-malware-analysis-tools-techniques/
Software Reverse Engineering with Ghidra - YouTube
MalTrak: Amr Thabet course Malware
PE Structure : The Life of Binaries - YouTube
Incident Response Training
https://blog.kowalczyk.info/articles/pefileformat.html
https://maltrak.com/join
Virtual Inheritance in C++ Binaries:
My posts on Facebook and Twitter
https://arxiv.org/pdf/2003.05039.pdf
https://facebook.com/vs.viro
Practical Decompilation with IDA "Game”: https://twitter.com/Muhammed_0x00
https://www.youtube.com/playlist?list=PLQgy5xfkFQv2FyKPwYHkgy25yCyy7JGWG
GynvaelEN Kernel Debugging Part 1: Hacking Books:
Livestream #28: Windows Kernel Debugging Part I - 1- Mastering Malware Analysis
YouTube 2- Learning Malware Analysis
3- Practical malware Analysis
Introduction to Windbg and Debugging Windows:
4- Malware Data Science
Introduction to Windbg and debugging windows - YouTube
5- Malware analyst’s cookbook
Windows Internal Part 1:
6- Rootkits and bootkits: Reversing Modern Malware
Windows Internal Part 1 - Processes - YouTube
7- Accelerated Malware Analysis
ARM assembly & RE; 8- Art of Memory Forensics
1- Azeria Labs (azeria-labs.com)
Zero2auto malware analysis course:
2- "Practical Reverse Engineering" Ch.2
https://courses.zero2auto.com/
Practice:
Embedded Security CTF (microcorruption.com) APT Articles:
https://github.com/aptnotes/data
Reverse Engineering
Secrets of Reverse Engineering Book Malware Traffic Analysis:
https://www.malware-traffic-analysis.net/
De-obfuscation:
https://github.com/malrev/ABD Malware Dynamic Analysis course:
MalwareDynamicAnalysis (opensecuritytraining.info)
1- elearnSecurity RE or eCMAP course
2- Anti Reverse Engineering: OALabs channel:
Anti Debugging Protection Techniques with Examples (apriorit.com) OALabs - YouTube
3- The "Ultimate "Anti-Debugging Reference
Injection techniques:
https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
Secrets of reverse engineering Book Malware Analysis References
Reverse Engineering Malware course 101 & 102: Reverse Engineering 101
Reverse Engineering with Ghidra playlist: (malwareunicorn.org)
https://www.youtube.com/playlist?list=PL_tws4AXg7auglkFo6ZRoWGXnWL0FHAEi Reverse Engineering 102 (malwareunicorn.org)
Solving Reverse Engineering challenges channel: Malware Analysis course (University of Cincinnati):
https://www.youtube.com/ZetaTwo/videos
https://www.youtube.com/playlist?list=PLFvh_k-n27CnAyfsMDowQmogkG5MbZkXz
Binary Auditing Training:
MalwareAnalysisForHedgehogs channel:
https://github.com/Info-security/binary-auditing-training
MalwareAnalysisForHedgehogs - YouTube
Reverse Engineering with Ollydbg:
Colin Hardy channel:
https://tuts4you.com/download/category/17//
Colin Hardy - YouTube
https://tuts4you.com/download/category/25//
Hasherezade channel:
Solutions to "Practical Reverse Engineering”:
Solutions to "Practical Reverse Engineering" (johannesbader.ch) hasherezade - YouTube
hasherezade's 1001 nights | projects and tasks that I do in my free time (wordpress.com)

Reverse Engineering with Binary Ninja: Kernel mode rootkits techniques:


https://resources.infosecinstitute.com/hooking-idt/
Syrillian - YouTube
https://www.adlice.com/kernelmode-rootkits-part-1-ssdt-hooks/
.NET (Core) debugging with SOS and Windbg: https://www.adlice.com/kernelmode-rootkits-part-2-irp-hooks/
https://www.youtube.com/playlist?list=PLhx7-txsG6t5eYN-v57zD2r2Q0AKzsy0u&fbclid=lwAR2bF1pC9RQOVnJdToTpHw7l6-gpNVXb2GhNolD https://www.adlice.com/kernelmode-rootkits-part-3-kernel-filters/
http://www.sekoia.fr/blog/wp-content/uploads/2016/10/Rootkit-analysis-Use-case-on-HIDEDRV-v1.6.pdf
Ransomware Reverse Engineering courses & playlists:
Playlist 1:
Ransomware Analysis - YouTube
Playlist 2:
https://www.youtube.com/playlist?list=PLHUKi1UlEgOIcoAUj9reDurE30NIMiqD1
Course 1 - Reverse Engineering Ransomware :
Reverse Engineering Ransomware | Udemy
Course 2 - Advanced Reverse Engineering Ransomware :
https://www.udemy.com/course/advanced-ransomware-reverse-engineering/
Dr. Fu's Security Blog - Malware Analysis Tutorials : a Reverse Engineering Approach course
http://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html
https://www.malwaretech.com/
Best Blog• Kernel Rootkits Reverse Engineering:
https://artemonsecurity.blogspot.com/search?q=rootkit

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy