šŸ”“
PURPLEBYTEONE
  • main
  • Notes
    • Education
      • Base
        • Information Technology
          • OpenText
            • Courses
              • Security and Forensics
                • EnCaseā„¢ eDiscovery Series
                  • ED290 - eDiscovery Training with EnCase Information Assurance
                • EnCaseā„¢ Crossover Series
                  • DFIR450 - EnCase EnScript Programming
                  • DFIR370 - Host Intrusion Methodology and Investigation
                  • DFIR350 - Internet-based Investigations
                  • DFIR130 - EnCase Endpoint Investigator
                • EnCaseā„¢ Incident Response Series
                  • IR280 - EnCase Endpoint Security
                  • IR250 - Incident Investigation
                • EnCaseā„¢ Digital Forensics Series
                  • DF420 - Mac Examinations
                  • DF410 - NTFS Examinations
                  • DF320 - Advanced Analysis of Windows Artifacts
                  • DF310 - EnCase Certified Examiner
                  • DF210 - Building an Investigation
                  • DF125 - Mobile Device Examinations
                  • DF120 - Foundations in Digital Forensics
              • Business Network
              • Digital Process Automation
              • Platform Solutions
              • Discovery
              • Digital Experience
              • Analytics
              • Enterprise Content Management
          • Harvard University
            • CS 50
          • LPI
            • Courses
              • Essentials
                • Linux Essentials: 010
                • Security Essentials: 020
                • Web Development Essentials: 030
              • Professional
                • LPIC-1
                  • 101
                  • 102
                • LPIC-2
                  • 201
                  • 202
                • LPIC-3
                  • 300
                  • 303
                  • 305
                  • 306
          • Cloud Orchestration
            • Docker
            • Kubernetes
              • KCNA
              • CKA
              • CKS
          • Google Cloud
            • Path
              • Google Cloud Computing Foundations
              • Network Engineer Learning Path
              • Database Engineer Learning Path
              • Cloud Engineer Learning Path
              • Security Engineer Learning Path
              • Cloud Architect Learning Path
              • Cloud Developer Learning Path
          • VMware
            • Courses
              • Carbon Black
                • Professional
                  • Endpoint Security: Core Technical Skills
                  • App Control Administrator
                  • EDR Administrator
                • Advanced
                  • App Control Advanced Administrator
                  • Advanced Operations and Troubleshooting
                  • Audit and Remediation
                  • Endpoint Standard
                  • Enterprise EDR
                  • EDR Advanced Administrator
                  • EDR Advanced Analyst
          • Amazon
            • Courses
              • Foundation
                • AWS Certified Cloud Practitioner
              • Associate
                • AWS Certified Solutions Architect
              • Professional
                • AWS Certified Solutions Architect
              • Speciality
                • AWS Certified Advanced Networking
                • AWS Certified Security – Specialty
          • Microsoft
            • Courses
              • Azure
                • AZ - 900
                • AZ - 104
                • AZ - 305
                • SC - 900
                • SC - 200
                • SC - 300
                • AZ - 500
                • MS-500
                • SC - 400
                • SC - 100
          • The Code
            • Platform
              • FreeCodeCamp
              • W3
            • Language
              • Python
              • PowerShell
              • JavaScript
              • PHP
              • SQL
              • GO
              • Java
              • Perl
              • Ruby
              • Scala
              • C
              • C#
              • C++
              • Brainfuck
              • CSS
              • JSON
              • Kotlin
              • LOLCODE
              • MISP
              • MongoDB
              • Objective-C
              • Perl
              • Rust
              • SAAS
              • Scala
              • Solidity
              • SWIFT
              • TypeScript
              • WebAssembly
              • XML
              • YAML
              • AngularJS
              • Ansible
              • BASH
              • Docker
              • GIT
              • jQuery
              • VIM
          • OKTA
        • Purple Team
          • Splunk
            • Courses
              • Udemy
            • Notes
          • Security Team Blue
            • Courses
              • BTL v1
              • BTL v2
          • ISC2
            • CC
              • Introduction
              • Security Principles
                • Security Concepts of Information Assurance
                • Risk Management Process
                • Security Controls
                • Governance Elements and Processes
                • Terms and Definitions
              • Incident Response
                • Understand Incident Response
                • Business Continuity
                • Disaster Recovery
              • Access Control Concepts
                • Access Control Concepts
                • Physical Access Controls
                • Logical Access Controls
              • Network Security
                • Computer Networking
                • Threats and Attacks
                • Network Security Infrastructure
              • Security Operations
            • SSCP
            • CISSP
            • CCSP
          • TCM Security
            • Courses
              • Python 101
              • Python 201
              • Linux 101
              • External Pentest Playbook
              • Windows Privilege Escalation
              • Linux Privilege Escalation
              • Movement, Pivoting and Persistence
              • Practical Phishing Assessments
              • Practical Web Application Security
              • Practical Malware Analysis
              • Mobile
              • (OSINT) Fundamentals
              • PEH
            • Certification
              • PNPT
              • PJMR
          • Coursera
            • Courses
              • NYU
                • Introduction to Cyber Security Specialization
              • Google
                • Google Cybersecurity Professional
                  • Foundations of Cybersecurity
                  • Play It Safe: Manage Security Risks
                  • Connect and Protect: Networks and Network Security
                  • Tools of the Trade: Linux and SQL
                  • Assets, Threats, and Vulnerabilities
                  • Sound the Alarm: Detection and Response
                  • Automate Cybersecurity Tasks with Python
                  • Put It to Work: Prepare for Cybersecurity Jobs
          • ICSI Global
          • OccupyTheWeb
            • Courses
              • GSBMH
              • NBFH
              • LBFH
          • CompTIA
            • Courses
              • Core Base
                • A+
                  • Chapter 1
                • Network+
                  • Chapter 1
                • Linux+
                  • Chapter 1
                  • Chapter 2
                • Cloud+
                  • Chapter 1
              • Security
                • Security+
                  • Chapter 1
                    • Risk Terminology
                • Pentest+
                  • Chapter 1
                • CySA+
                  • Chapter 1
                • CSA+
                  • Defending Against Cybersecurity Threats
          • EC-Council
            • Courses
              • CEH
              • CHFI
              • CSA
          • Intel Techniques
            • Courses
              • OSINT Techniques
              • Privacy & Security
          • SANS
            • Courses
              • SEC
                • SEC 401 - Security Essentials
                • SEC 450 - Blue Team Fundamentals
                • SEC 502 - Perimeter Protection In-Depth
                • SEC 503 - Network Monitoring and Threat Detection In-Depth
                • SEC 504 - Hackers Tools, Techniques And Incident Handling
                • SEC 505 - Securing Windows and PowerShell Automation
                • SEC 506 - Securing Linux & UNIX
                • SANS 509 - Securing Oracle Database
                • SEC 511 - Continuous Monitoring and Security Operations
                • SEC 517 - Cutting Edge Hacking Techniques
                • SEC 524 - Cloud Security Fundamentals
                • SEC 531 - Windows Command Line Kung Fu
                • SEC 542 - Web App Penetration Testing
                • SEC 560 - Enterprise Penetration Testing
                • SEC 565 - Red Team Operations and Adversary Emulation
                • SEC 566 - Implementing and Auditing Security Frameworks
                • SEC 573 - Automating Information Security with Python
                • SEC 575: Mobile Device Security
                • SEC 580 - Metasploit for Enterprise Penetration Testing
                • SEC 587 - Advanced Open Source Intelligence
                • SEC 599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
                • SEC 617 - Wireless Penetration Testing and Ethical Hacking
                • SEC 642 - Advanced Web App Penetration Testing
                • SEC 660 - Advanced Penetration Testing
                • SEC 760 - Advanced Exploit Development
                • SEC 554: Blockchain and Smart Contract Security
              • FOR
                • FOR 408 - Windows Forensic Analysis
                • FOR 500 - Windows Forensic Analysis
                • FOR 508 - Advanced Digital Forensics and Incident Response
                • FOR 518 - Mac and iOS Forensic Analysis
                • FOR 526 - Memory Forensics In-Depth
                • FOR 572 - Advanced Network Forensics
                • FOR 577 - Virtualization Security Fundamentals
                • FOR 578 - Cyber Threat Intelligence
                • FOR 610 - Reverse-Engineering Malware
                • FOR 710 - Reverse-Engineering Malware: Advanced Code Analysis
              • AUD
                • AUD 507 - Auditing Systems, Applications, and the Cloud
              • ICS
                • ICS 410 - ICS/SCADA Security Essentials
              • MGT
                • MGT 512 - Security Leadership Essentials for Managers
          • IBM
            • Courses
              • Cybersecurity Analyst Professional
                • Introduction to Cybersecurity Tools & Cyber Attacks
                  • Week 1
                  • Week 2
                  • Week 3
                  • Week 4
          • Cybrary
            • Courses
              • SOC L1
              • SOC L2
              • SOC L3
              • Become an Incident Handler
          • Zero Point Security
            • Courses
              • Red Team Ops [CRTO]
              • C2 Development in C#
          • Web Security Academy
            • Courses
              • Burp Suite Certified Practitioner
          • INE
            • Courses
              • eJPT
                • Blue Team
                  • ePND
                  • eCIR
                  • eCRE
                  • ePWD
                  • eCTHPv2
                  • eCDFP
                  • eCMAP
                • Red Team
                  • eMAPT
                  • eWPT
                  • eCPPTv2
                  • eCXD
                  • eWPTXv2
                  • eCPTXv2
          • Pentester Lab
          • Pentester Academy
            • Courses
              • Pentesting with Metasploit: Beginner Edition
              • Linux Privilege Escalation
          • Offensive Security
            • Courses
              • Fundamental
                • Introduction to Secure Software Development
                • Introduction to Cloud Security
                • Exploit Development Essentials
                • Web Application Assessment Essentials
                • Security Operations Essentials
                • Network Penetration Testing Essentials
              • Security Operations
                • SOC-200: Foundational Security Operations and Defensive Analysis (OSDA)
              • Penetration Testing
                • PEN - 200
                • PEN - 210
                • PEN - 300
              • Web Application
                • WEB-200: Foundational Web Application Assessments with Kali Linux (OSWA)
                • WEB-300: Advanced Web Attacks and Exploitation (OSWE)
              • Exploit Development
                • EXP-301: Windows User Mode Exploit Development (OSED)
                • EXP-312: Advanced macOS Control Bypasses (OSMR)
                • EXP-401: Advanced Windows Exploitation (OSEE)
          • Sektor7
            • Courses
              • Windows Privilege Escalation
              • Windows Persistence
              • Malware Development Essentials
              • Evasion Windows Red Team Ops
          • Black Hat
            • Courses
              • BlackHat - Malware Analysis And Memory Forensics
          • Fortinet
          • VHL
          • DFIRdiva
          • YouTube
            • Channels
          • Udemy
            • Certified in Cybersecurity (CC)
            • CompTIA Security+
          • AntiSyphon
          • THM
            • Room
              • SPLUNK
                • Introduction to SIEM
                • Basics
                • Incident handling
                • Investigating
                • Benign
                • ELK 101
                • PS Eclipse
                • New Hire Old Artifacts
                • Conti
                • BOTS
                  • v1
                  • v2
                  • v3
                • ItsyBitsy
            • Learning Paths
              • Introduction to Cyber Security
                • Introduction to Cyber Security
                  • Intro to Offensive Security
                  • Intro to Defensive Security
                • Introduction to Offensive Security
                • Introduction to Defensive Security
          • HTB
            • HTB Academy
              • Job Role Path
                • Penetration Tester
                  • Getting Started
                    • Infosec Overview
                    • Getting Started with a Pentest Distro
                    • Staying Organized
                    • Connecting Using VPN
                    • Common Terms
                  • Machines
                    • Nibbles
                • SOC Analyst
                  • Incident Handling Process
                    • Incident Handling
                    • Cyber Kill Chain
                    • Incident Handling Process Overview
                      • Preparation Stage
                      • Detection & Analysis Stage
                      • Containment, Eradication, & Recovery Stage
                      • Post-Incident Activity Stage
                  • Security Monitoring & SIEM Fundamentals
                  • Windows Event Logs & Finding Evil
                  • Introduction to Threat Hunting & Hunting With Elastic
                  • Understanding Log Sources & Investigating with Splunk
                  • Windows Attacks & Defense
                  • Intro to Network Traffic Analysis
                  • Intermediate Network Traffic Analysis
                  • Working with IDS/IPS
                  • Introduction to Malware Analysis
                  • JavaScript Deobfuscation
                  • YARA & Sigma for SOC Analysts
                  • Introduction to Digital Forensics
                  • Detecting Windows Attacks with Splunk
                  • Security Incident Reporting
            • Challenges
              • Retired
                • Challenges
                  • Hardware
                    • Very Easy
                      • Gawk
                      • Secure Digital
                  • Web
                    • Very Easy
                      • Trapped Source
                  • Mobile
                    • Very Easy
                      • Don't Overreact
                  • Pwn
                    • Very Easy
                      • Getting Started
                      • Questionnaire
                      • Vault-breaker
                  • Crypto
                    • Very Easy
                      • Ancient Encodings
                  • Reverse
                    • Very Easy
                      • WIDE
                      • Shattered Tablet
                      • Hunting License
                      • Gonna-Lift-Em-All
                  • Misc
                    • Very Easy
                      • Compressor
                  • Forensics
                    • Very Easy
                      • Extraterrestrial Persistence
                      • Alien Cradle
                      • Wrong Spooky Season
                  • OSINT
                  • GamePwn
                  • Blockchain
            • Machines
              • Retired
                • Windows
                  • Easy
                    • Blue
          • Blueteamlabs.online
          • LetsDefend.io
          • CyberDefenders.org
      • Infinity
        • c0//53
          • Leet Code
          • Hacker Rank
        • Tools
          • Red Team
            • OSINT
            • Enumeration
            • Web
            • Exploit Base
              • Linux
            • Post-exploitation
              • Backdoor
          • Blue Team
            • Forensics
            • My scripts
        • Bookmarks
          • Cybersecurity
            • Reverse Engineering
            • Telegram
          • MindHub
            • Job Boards
          • GitHub
          • AI
            • Free
          • Books
            • Cybersecurity
              • Linux
                • Linux Essentials For Cybersecurity
                • The Linux Command Line, 2nd Edition: A Complete Introduction
                • How Linux Works, 3rd Edition: What Every Superuser Should Know
              • OSINT
                • Deep Dive: Exploring the Real-world Value of Open Source Intelligence
              • Networking
                • Wireshark for Security Professionals
              • Social Engineering
                • Practical Social Engineering
          • Writeups
    • Carrier
      • Interview Questions
        • General HR questions
        • Cybersecurity
          • Junior Positions
            • SOC L1
            • Junior Malware Analyst
            • Junior Penetration Tester
            • Junior Red Teamer
            • Junior Forensic Analyst
            • Junior Incident responder
            • Junior Threat hunter
            • Junior Security Analyst
          • Specialist Positions
            • SOC L2
            • Malware Analyst
            • Penetration Tester
            • Red Teamer
            • Forensic Analyst
            • Incident responder
            • Threat hunter
            • Security Analyst
          • Senior Positions
            • SOC L3
            • Senior Malware Analyst
            • Senior Penetration Tester
            • Senior Red Teamer
            • Senior Forensic Analyst
            • Senior Incident responder
            • Senior Threat hunter
            • Senior Security Analyst
          • Random questions
            • PT.1
            • PT.2
            • PT.3
            • PT.4
            • PT.5
            • PT.6
    • Note
      • Read
      • Interview
      • Cheat Sheet
        • Penetration Testing
          • Enumeration
  • Roadmap
    • CTF Track
Powered by GitBook
On this page
  1. Notes
  2. Education
  3. Infinity
  4. Bookmarks
  5. Cybersecurity

Reverse Engineering

Last updated 2 years ago

Intro

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum

Follow

Get better

Prerequisites

Read

  1. h

  2. Analysis of Virtualization-based Obfuscation

    1. writeup:

    2. slides:

    3. video:

    4. code:

    5. – a talk on reversing VMProtect

    6. A solution to VMProtect challenge from – SpeakEasy:

    7. ā€œTickling VMProtect with LLVMā€: [][][] (more on LLVM )

Video

Environment

Code

  1. x86 Assembler

  2. C++

Study

Books

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum

Read

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum

Video

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum

YouTube

Tools & Documentation

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum

Editors

Practice

CTF Platforms

Sourcecode

Sandbox. Detonate malware

  1. 1

Malware samples

Trackers

Hands-on

https://twitter.com/wrongbaud
https://twitter.com/voidstarsec
https://hshrzd.wordpress.com/
https://en.wikipedia.org/wiki/Reverse_engineering
https://www.learn-c.org/
https://www.intel.com/content/www/us/en/resources-documentation/developer.html
https://www.intel.com/content/dam/develop/external/us/en/documents/introduction-to-x64-assembly-181178.pdf
https://www.cs.uaf.edu/2017/fall/cs301/reference/x86_64.html
https://cs.lmu.edu/~ray/notes/x86overview/
ttp://www.cs.cornell.edu/courses/cs412/2000SP/resources/Intel%20Architecture%20Vol.%201.PDF
https://www.intel.com/content/www/us/en/architecture-and-technology/64-ia-32-architectures-software-developer-vol-2a-manual.html
https://godbolt.org/
https://en.wikipedia.org/wiki/Assembly_language
https://en.wikipedia.org/wiki/Low-level_programming_language
Academy of reverse engineering
https://learn.microsoft.com/en-us/sysinternals/
https://linker.iecc.com/
https://a.co/d/dqk8thB
https://en.wikipedia.org/wiki/X86_assembly_language
https://www.malwaretech.com/2018/03/best-programming-languages-to-learn-for-malware-analysis.html
https://www.malwarebytes.com/blog/news/2015/12/malware-crypters-the-deceptive-first-layer
https://synthesis.to/2021/10/21/vm_based_obfuscation.html
https://synthesis.to/presentations/r2con2021-deobfuscation.pdf
https://www.youtube.com/watch?v=b6udPT79itk
https://github.com/mrphrazer/r2con2021_deobfuscation
https://www.youtube.com/watch?v=PAG3M7mWT2c&t=13229s
VMProtect 2 – Detailed Analysis of the Virtual Machine Architecture
VMProtect 2 – Part Two, Complete Static Analysis
UIUCTF 2021
https://medium.com/@acheron2302/speakeasy-writeup-3af3375ab63
1
2
3
here
https://www.mandiant.com/resources/blog/flare-on-8-challenge-solutions
https://github.com/stephenfewer/ReflectiveDLLInjection
https://web.archive.org/web/20170719052516/https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
https://github.com/hasherezade/demos
https://www.youtube.com/watch?v=xewv122qxnk
https://www.youtube.com/watch?v=Fpb4eL3vMgk
https://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf
https://github.com/odzhan/injection
https://gist.github.com/hasherezade/e6daa4124fab73543497b6d1295ece10#file-injection_demos-md
https://github.com/hasherezade/pe-sieve
https://github.com/hasherezade/hollows_hunter
https://github.com/hasherezade/pe-sieve/wiki/4.1.-Detect-shellcodes-(shellc)
https://www.youtube.com/watch?v=rDQmh1yFWGU
https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-1.html
https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html
https://www.ired.team/offensive-security/code-injection-process-injection/how-to-hook-windows-api-using-c++
https://raw.githubusercontent.com/hasherezade/malware_training_vol1/main/slides/module2/Module2_2_hooking.pdf
https://www.malwarebytes.com/blog/news/2016/12/simple-userland-rootkit-a-case-study
https://github.com/hasherezade/pe-sieve
https://github.com/hasherezade/hollows_hunter
https://github.com/hasherezade/pe-sieve/wiki/3.1.-Investigating-hooks-and-patches
https://github.com/hasherezade/pe-sieve/wiki/4.7.-Scan-for-IAT-Hooks-(iat)
https://github.com/hasherezade/hollows_hunter/wiki#hollows-hunter-vs-pe-sieve
https://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/
https://leanpub.com/windowskernelprogramming
https://leanpub.com/u/zodiacon
https://github.com/zodiacon/windowskernelprogrammingbook
https://posts.specterops.io/methodology-for-static-reverse-engineering-of-windows-kernel-drivers-3115b2efed83
https://voidsec.com/windows-drivers-reverse-engineering-methodology/
https://raw.githubusercontent.com/jack8daniels2/threat-INTel/master/2016/Rootkit-analysis-Use-case-on-HIDEDRV-v1.6.pdf
https://resources.infosecinstitute.com/topic/hooking-idt/
https://www.adlice.com/kernelmode-rootkits-part-1-ssdt-hooks/
https://www.adlice.com/kernelmode-rootkits-part-2-irp-hooks/
https://www.adlice.com/kernelmode-rootkits-part-3-kernel-filters/
https://www.malwarebytes.com/blog/news/2016/04/petya-ransomware
https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/
https://toddcullumresearch.com/2018/01/21/become-remain-malware-researcher/
http://www.hexacorn.com/blog/2018/04/14/how-to-become-the-best-malware-analyst-e-v-e-r/
https://www.reversinghero.com/
https://www.malwarebytes.com/blog/news/2019/07/a-deep-dive-into-phobos-ransomware
Introduction to Assembly
Introduction to C
Reversing Tutorial For Newbies
Reverse Engineering for Beginners
Introduction to Reverse Engineering
Reverse Engineering
Ghidra Reversing
Windows Internals
Malware Analysis
Technical Analysis of NullMixer Malware
Analyzing OneNote Malware
Reverse Engineering Binaries
Reverse Engineering Q&A Session
IDA Pro Reverse Engineering
TiGa’s course on IDA Pro
Introduction to Windbg
https://www.youtube.com/watch?v=75gBFiFtAb8
https://www.youtube.com/watch?v=wLXIWKUWpSs
https://www.youtube.com/watch?v=qCQRKLaz2nQ
CS6038
https://www.youtube.com/c/MalwareAnalysisForHedgehogs
https://www.youtube.com/c/oalabs
https://www.youtube.com/channel/UCND1KVdVt8A580SjdaS4cZg
https://www.youtube.com/c/DuMpGuYTrIcKsTeR
https://www.youtube.com/c/hasherezade
https://www.youtube.com/watch?v=tbcrV1rNgMo
Malware and the tools for its analysis
Malware Analysis Virtual Machine
Creating a Simple Free Malware Analysis Environment
Reviews of various tools for reverse engineering
https://web.archive.org/web/20171110201344/http://win32assembly.programminghorizon.com/tutorials.html
https://drive.google.com/file/d/1QMqqXraqtbUimsJMqqy2ABl58dOKI2qh/view
https://www.amazon.com/Programming-Language-2nd-Brian-Kernighan/dp/0131103628
https://www.amazon.com/C-Programming-Language-4th/dp/0321563840
https://www.amazon.com/Linux-Programming-Example-Kurt-Wall/dp/0789722151
https://www.amazon.com/Programming-Paperback-Addison-Wesley-Microsoft-Technology/dp/0134382250
https://www.begin.re/
https://malwareunicorn.org/workshops/re101#0
https://malwareunicorn.org/workshops/re102#0
https://legend.octopuslabs.io/sample-page.html
https://opensecuritytraining.info/Training.html
https://samsclass.info/126/126_S17.shtml
https://0xpat.github.io/
https://shogunlab.gitbook.io/building-c2-implants-in-cpp-a-primer/
https://github.com/hasherezade/malware_training_vol1
Reverse Engineering for Beginners
https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting-ebook/dp/B007ED2XDS
https://www.amazon.com/SZOR-VIRUS-DEFENSE-Symantec-Press-ebook/dp/B003DQ4WLQ/
https://anti-reversing.com/Downloads/Anti-Reversing/The_Ultimate_Anti-Reversing_Reference.pdf
https://www.amazon.com/Malware-Analysts-Cookbook-DVD-Techniques/dp/0470613033/
https://www.amazon.com/Hacker-Disassembling-Uncovered-Kris-Kaspersky/dp/1931769648/
https://www.amazon.com/Rootkit-Arsenal-Escape-Evasion-Corners/dp/144962636X
https://nostarch.com/rootkits
https://www.amazon.com/Programming-Paperback-Addison-Wesley-Microsoft-Technology/dp/0134382250
https://nostarch.com/ghpython.htm
https://hackaday.io/course/172292-introduction-to-reverse-engineering-with-ghidra
http://bitblaze.cs.berkeley.edu/bitblaze-pub.html
https://a.co/d/d399HpW
https://courses.cs.washington.edu/courses/csep505/06sp/
https://a.co/d/5zpnNb1
https://a.co/d/8H1l6KI
https://a.co/d/deTwIYW
https://a.co/d/dC6IyTQ
https://a.co/d/cVv5jHv
http://spritesmods.com/
https://www.mandiant.com/resources/blog/defining-cobalt-strike-components
https://drive.google.com/file/d/1Sjm7xo4AwBxoLVo7X0Wx4u-tlHERevE-/view
https://bytepointer.com/resources/pietrek_in_depth_look_into_pe_format_pt1.htm
https://bytepointer.com/resources/pietrek_in_depth_look_into_pe_format_pt2.htm
https://learn.microsoft.com/en-us/previous-versions/ms809762(v=msdn.10)?redirectedfrom=MSDN
https://raw.githubusercontent.com/corkami/pics/master/binary/PE101.png
https://raw.githubusercontent.com/corkami/pics/master/binary/PE102.png
https://raw.githubusercontent.com/hasherezade/malware_training_vol1/main/slides/module1/Module1_2_pe.pdf
https://hshrzd.wordpress.com/pe-bear/
https://www.youtube.com/playlist?list=PL_tws4AXg7auglkFo6ZRoWGXnWL0FHAEi
https://www.youtube.com/watch?v=d4Pgi5XML8E
https://www.youtube.com/watch?v=uyWVztMHWtk
https://www.youtube.com/watch?v=RFG5FuqY0CE
https://www.youtube.com/watch?v=5QBXNF7FKxM
https://www.youtube.com/watch?v=K0g-twyhmQ4
https://www.youtube.com/watch?v=aoEEH2EJdVY
https://www.youtube.com/watch?v=t-bjhu2z9wE
https://www.youtube.com/watch?v=RvvRO_gWYIg
https://www.youtube.com/watch?v=8ymVjHCIciQ
https://www.youtube.com/watch?v=nm7EeFGWpFU
https://www.youtube.com/watch?v=z8GrAPKTQ_k
https://www.youtube.com/watch?v=ZGfOfonUuaY
https://www.youtube.com/watch?v=iRSkpQ4ijrE
https://www.youtube.com/watch?v=znyA9GSvn80
https://www.youtube.com/watch?v=mxwPde9t8E8
https://forum.tuts4you.com/
Disassemblers
IDA
JAD
Ghidra
Debugger
x64dbg
Edb-Debugger
windbg
ollydbg
W32Dasm
GDB GNU Debugger
cff explorer
Woodmans Reverse Engineering Tools
101
Malware families
https://ocaml.org/docs
https://hackingthexbox.com/
https://www.root-me.org
https://crackmes.one/
https://github.com/Visgean/Zeus
https://github.com/nyx0/Tinba
https://github.com/NextSecurity/Gozi-MBR-rootkit
https://github.com/nyx0/Pony
https://github.com/nyx0/Alina
https://github.com/nyx0/Carberp
https://github.com/vxunderground/MalwareSourceCode
https://malwarebreakdown.wordpress.com/
https://www.malware-traffic-analysis.net/
https://www.vx-underground.org/samples.html
https://www.malshare.com/
https://virusshare.com/
https://bazaar.abuse.ch/
https://thezoo.morirt.com/
https://beta.virusbay.io/
http://benkow.cc/
http://vxvault.net/ViriList.php
http://cybercrime-tracker.net/
https://www.malwaretech.com/challenges/windows-reversing
https://www.malwarebytes.com/blog/news/2017/11/how-to-solve-the-malwarebytes-crackme-a-step-by-step-tutorial
https://www.malwarebytes.com/blog/news/2018/04/malwarebytes-crackme-2-another-challenge
https://www.malwarebytes.com/blog/news/2018/05/malwarebytes-crackme-2-contest-summary
https://www.malwarebytes.com/blog/threat-intelligence/2021/10/the-return-of-the-malwarebytes-crackme
https://www.malwarebytes.com/blog/threat-intelligence/2021/11/malwarebytes-crackme-contest-summary
https://guyinatuxedo.github.io/index.html
https://www.mandiant.com/resources/blog/2017-flare-on-challenge-solutions
https://hshrzd.wordpress.com/tag/flareon/
https://github.com/mytechnotalent/Reverse-Engineering
https://cdrdv2-public.intel.com/774494/325462-sdm-vol-1-2abcd-3abcd.pdf