Skip to content

Instantly share code, notes, and snippets.

Last active July 18, 2024 01:30
Show Gist options
  • Save muff-in/ff678b1fda17e6188aa0462a99626121 to your computer and use it in GitHub Desktop.
Save muff-in/ff678b1fda17e6188aa0462a99626121 to your computer and use it in GitHub Desktop.
A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources

Assembly Language / Reversing / Malware Analysis / Game Hacking -resources

⭐Assembly Language

Modern x64 Assembly

Intro to x86 Assembly Language

x86_64 Linux Assembly

Intro x86 (32 bit)

Assembly Programming Tutorial

Practical x64 Assembly and C++ Tutorials

Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration


Learning assembly for linux-x64


x86 Assembly Guide

Assembly’s Perspective

A Crash Course in x86 Assembly for Reverse Engineers

Understanding C by learning assembly

x86 Assembly Crash Course → YouTube

x86 and amd64 instruction reference

Learn x86_64 Assembly

x86-64 Assembly Programming with Ubuntu

Assembly for beginners

Assembly Language Succinctly

Everything you want to know about x86 microcode, but might have been afraid to ask

Beginner Write your first Assembly Language program – Hello World!! [explained]

Assembly Language: How To Learn To Code Assembly Today

Quick Guide to Assembly in 161 - Berkeley - Code ↔ Assembly

A gentle introduction into ARM assembly

Introduction to ARM

Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration


⭐Reverse Engineering

Reverse engineering focusing on x64 Windows.

Applied Reverse Engineering Series

Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges.

Reverse Engineering Resources-Beginners to intermediate Guide/Links

ReversingHero Learn Reverse Engineering by solving 15 challenges

Introduction to Reverse Engineering

Introduction to Reverse Engineering | Ollydbg Tutorial

Ghidra quickstart & tutorial: Solving a simple crackme

Reverse Engineering Basics

Some Reverse Engineering Tutorials for Beginners

Introduction to Reverse Engineering with Ghidra

Reverse engineering tools review

TiGa's Video Tutorial Series on IDA Pro

Introduction to Windbg and debugging windows

Using Frida For Windows Reverse Engineering

SecurityTube GDB Expert Playlist

Binary Exploitation / Memory Corruption by LiveOverflow

Reverse Engineering Reading List

Reverse Engineering 101 by MalwareUnicorn

IDA Pro Reverse Engineering Tutorial for Beginners

Reverse Engineering with IDA PRO from scratch #1

Patching Binaries (with vim, Binary Ninja, Ghidra and radare2)

Reversing Statically-Linked Binaries with Function Signatures

Modern Binary Exploitation

How to Reverse Engineer an iOS App and macOS Software

CPU Adventure – Unknown CPU Reversing

List of awesome reverse engineering resources

Modern Debugging with WinDbg Preview

Reverse Engineering for Beginners

Reverse engineering an Android Application

Debugging with GDB

GDB Cheatsheet

Index of the training Reversing & Exploiting with Free Tools


Introduction to Reverse Engineering with Ghidra: A Four Session Course

A Reverse Engineering Tool Kit for Go, Written in Go.

Reverse engineering course (with radare2)

Reverse Engineering 101


Reverse engineering tools review

Reverse Engineering for Beginners

Ghidra Cheatsheet

Reverse Engineering 101

Reverse Engineering

[RE Useful Links & Resources]

Linux Reverse Engineering CTFs for Beginners

Introduction To Reverse Engineering With Radare2

Reverse Engineering Quick Tip - Unpacking Process Injection With a Single Breakpoint

Simple Tools and Techniques for Reversing a binary

A journey into Radare 2 – Part 1: Simple crackme

Windows for Reverse Engineers

Linux Binary Exploitation Series (with

Reverse Engineering

Binary Exploitation

WinDbg — the Fun Way: Part 1

Reverse Engineering Lecture

Python for Reverse Engineering #1: ELF Binaries

Binary exploitation slides

Video lectures, tools, and papers on reversing

Reverse Engineering Beta

Becoming a full-stack reverse-engineer

Binary Analysis Course

Lenas Reversing for Newbies

Introduction to Ghidra Student Guide

Reverse Engineering Starling Bank (Part I): Obfuscation Techniques

Reverse Engineering Starling Bank (Part II): Jailbreak & Debugger Detection, Weaknesses & Mitigations

BUFFER OVERFLOW 7 The Stack Operation

Introduction To Reverse Engineering Software

Intro to Reverse Engineering

Intro to Reverse Engineering, Part 2

⭐Malware Analysis

So You Want To Be A Malware Analyst

How to start RE/malware analysis?

Introduction to Malware Analysis and Reverse Engineering

The Road To Reverse Engineering Malware

The Basics of Packed Malware: Manually Unpacking UPX Executables

Awesome Malware Analysis

Best Malware Analysis Tools | Learn Malware Analysis

Malware Analysis Tutorials: a Reverse Engineering Approach

Malware, IR - Tools & Resources

WinDbg Basics for Malware Analysis

Reverse Engineering Windows Malware with Ghidra

Fifty Shades of Malware Strings

GETTING STARTED | Reverse Engineering Android Malware

Beginner Malware Reversing Challenges

Creating a Simple Free Malware Analysis Environment

Malware Analysis for noobs

How to become the best Malware Analyst E-V-E-R

Malware Dynamic Analysis

Reverse Engineering Malware

malware analysis

Malware Unpacking Tutorials

Misc Malware Analysis

Malware Theory on Blackboard

Malware Analysis Techniques

Malware Analysis

malware unpacking


Malware Analysis Tutorials

Engineering antivirus evasion

Training 1: File Type Analysis and Code Extraction from Malicious Document

Malware Noob2Ninja Course

Analyzing Modern Malware Techniques Part 1

Analyzing Modern Malware Techniques Part 2

Analyzing Modern Malware Techniques Part 3

Analyzing Modern Malware Techniques Part 4

Rotkits: What they are, and how to find them

Reverse Engineering Anti-VM Detections in Malware

IDA Pro Tutorial - Reverse Engineering Dynamic Malware Imports

IDA Pro Scripting Intro - Automate Dynamic Import Resolving for REvil Ransomware

Analysing a Firefox Malware browserassist.dll - FLARE-On 2018

Reversing WannaCry

Wireshark display filters which can be used in malware analysis

⭐Game Hacking

Introduction to Game Hacking! (Beginner Guide)

Game Hacking Academy


Game Reversal Club FAQ

How To Reverse Engineer ANY GAME For An Internal Hack Using IDA

Windows Game Hacking with Ghidra and Cheat Engine

Reverse Engineering hidden game cheat codes

C-sharp game hacking guide

linux game hacking guide

Unity Game hacking

Pwn Adventure 3: Pwnie Island

Developing a Hackable Game

C++ How To Hack Any Game Tutorial

AntiCheat Videos

CS420 Game Hacking Course

CSGO Game Hacking Tutorials

Making A Kernel Cheat - Part 1 - KM/UM Communication Via Function Hooking Wiki

The Ultimate Game Hacking Resource

The Ultimate Online Game Hacking Resource

Beginners Guide to Reverse Engineering (Retro Games)

Cheating in Online Games: Overview of Approaches and Consequences

BattlEye anti-cheat: analysis and mitigation

For 20 Years, This Man Has Survived Entirely by Hacking Online Games

List of open-source video games

GameReversalClub Youtube

Null Youtube

Guidedhacking youtube

Online Game Hacking Forums

UnKnoWnCheaTs Forum ( REGames Discord ( Guided Hacking ( Cheat Engine ( Reverse Engineering Games (


Disassemblers and decompilers

Binary Ninja

IDA and Hex-Rays





Java Decompiler


VB Decompiler




Immunity Debugger



Hex Editor

Hex Workshop

HxD Hex Editor

010 Editor



Detect It Easy


Memory scanner

Cheat engine


CTF Game Challenges

Reverse Engineering challenges

Embedded Security CTF

Beginner Malware Reversing Challenges


CTF Reversing Challenges List

Reverse engineering challenges

Latest Reverse Engineering Challenges


Flare-On6 challenges

Decompetition 2020 Challenges

Copy link

Thank you!

Copy link

sharpicx commented Jun 1, 2021

amazing stuffs, i really like it!.

Copy link

ghost commented Jul 7, 2021


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment