Binary Reverse Engineering Resources
Collection of reverse engineering resources from books to challenge sites to tools.
Learning
Books
- Assembly Language for x86 Processors
- Reverse Engineering for Beginners
- Practical Malware Analysis
- Practical Reverse Engineering
- Reversing: Secrets of Reverse Engineering
- Malware Analysts Cookbook
- Radare 2
- IDA Pro Book
Courses
Sites
Useful
Documentation
Challenges
Most reversing challenges should be safe to run on your host, but it is always best to run on a virtual machine
- Crackmes.one
- OSX Crackmes
- ESET Challenges
- Flare-on Challenges
- Github CTF Archives
- Reverse Engineering Challenges
- xorpd Advanced Assembly Exercises
- Malware-Traffic-Analysis
- Assembly Game
- Nightmare Reversing
Virus Exchange
Be careful with malware the below sites they host live malware
Tools
Virtual Machines
Binary Format
Disassemblers/Decompilers
Hex Editors
Binary Analysis
Bytecode Analysis
Import Reconstruction
Dynamic Analysis
- ProcessHacker
- Process Explorer
- Process Monitor
- Autoruns
- Noriben
- API Monitor
- iNetSim
- Wireshark
- Fakenet
- netzob
- Volatility
- Dumpit
- LiME
- Cuckoo
- Objective-See Utilities
- XCode Instruments - XCode Instruments for Monitoring Files and Processes User Guide
- dtrace - sudo dtruss = strace dtrace recipes
- fs_usage - report system calls and page faults related to filesystem activity in real-time. File I/O: fs_usage -w -f filesystem
- dmesg - display the system message buffer