Skip to content

Instantly share code, notes, and snippets.

What would you like to do?

Reversing / Malware Analysis / Assembly -resources

Reverse engineering focusing on x64 Windows.

Applied Reverse Engineering Series

So You Want To Be A Malware Analyst

Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges.

How to start RE/malware analysis?

Introduction to Malware Analysis and Reverse Engineering

Using Frida For Windows Reverse Engineering

Modern x64 Assembly

Intro to x86 Assembly Language

x86_64 Linux Assembly

SecurityTube GDB Expert Playlist

Intro x86 (32 bit)

“Must Have” Free Resources for Malware Analysis

Binary Exploitation / Memory Corruption by LiveOverflow

Reverse Engineering Reading List

Reverse Engineering 101 by MalwareUnicorn

Assembly Programming Tutorial

Reverse Engineering with IDA PRO from scratch #1

The Basics of Packed Malware: Manually Unpacking UPX Executables

Practical x64 Assembly and C++ Tutorials


Reverse Engineering Resources-Beginners to intermediate Guide/Links

Modern Binary Exploitation

Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration

How to Reverse Engineer an iOS App and macOS Software

Reverse Engineering Anti-VM Detections in Malware

CPU Adventure – Unknown CPU Reversing

Awesome Malware Analysis

CTF Reversing Challenges List

Learning assembly for linux-x64

Best Malware Analysis Tools | Learn Malware Analysis

List of awesome reverse engineering resources

The world’s 1st book of very detailed iOS App reverse engineering skills :)

Open Security Training

Malware Analysis Tutorials: a Reverse Engineering Approach

Modern Debugging with WinDbg Preview

Malware, IR - Tools & Resources


Reverse Engineering for Beginners

Debugging with GDB

WinDbg Basics for Malware Analysis

Reverse Engineering Windows Malware with Ghidra

GDB Cheatsheet

Index of the training Reversing & Exploiting with Free Tools


Introduction to Reverse Engineering with Ghidra: A Four Session Course

Fifty Shades of Malware Strings

Everything you want to know about x86 microcode, but might have been afraid to ask

A Reverse Engineering Tool Kit for Go, Written in Go.

Reverse engineering course (with radare2)

GETTING STARTED | Reverse Engineering Android Malware

Beginner Malware Reversing Challenges

Beginner Write your first Assembly Language program – Hello World!! [explained]

Reverse Engineering 101

reverse-engineering challenges

Reverse engineering tools review

How to become the best Malware Analyst E-V-E-R

Reverse Engineering for Beginners

Ghidra Cheatsheet

x86 Assembly Guide

Assembly Language: How To Learn To Code Assembly Today

Reverse Engineering 101

Reverse Engineering

[RE Useful Links & Resources]

Linux Reverse Engineering CTFs for Beginners

Assembly’s Perspective

Introduction To Reverse Engineering With Radare2

Understanding the differences between 8bit, 16bit, 32bit, and 64bit -- Arrow Tech Trivia


A Crash Course in x86 Assembly for Reverse Engineers

Understanding C by learning assembly - Exploit a basic buffer overflow

x86 Assembly Crash Course → YouTube

BUFFER OVERFLOW 7 The Stack Operation

malware analysis

Malware Unpacking Tutorials

Misc Malware Analysis

Malware Theory on Blackboard

Malware Analysis Techniques

Malware Analysis

malware unpacking


Malware Analysis Tutorials

Quick Guide to Assembly in 161 - Berkeley - Code Assembly

A journey into Radare 2 – Part 1: Simple crackme

x86 and amd64 instruction reference

AT&T Syntax versus Intel Syntax →

Windows for Reverse Engineers

Engineering antivirus evasion

Linux Binary Exploitation Series (with

Reverse Engineering

Binary Exploitation

Learn x86_64 Assembly

WinDbg — the Fun Way: Part 1

x86-64 Assembly Programming with Ubuntu

Reverse Engineering Lecture

Python for Reverse Engineering #1: ELF Binaries

Training 1: File Type Analysis and Code Extraction from Malicious Document

Assembly for beginners

Assembly Language Succinctly

Binary exploitation slides

Video lectures, tools, and papers on reversing

Reverse Engineering Beta

Becoming a full-stack reverse-engineer

Malware Noob2Ninja Course

Analyzing Modern Malware Techniques Part 1

Analyzing Modern Malware Techniques Part 2

Analyzing Modern Malware Techniques Part 3

Analyzing Modern Malware Techniques Part 4

Binary Analysis Course

A gentle introduction into ARM assembly

Lenas Reversing for Newbies

Introduction to Ghidra Student Guide

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment