-
Notifications
You must be signed in to change notification settings - Fork 29
Expand file tree
/
Copy pathresources.yml
More file actions
45 lines (41 loc) · 2.77 KB
/
resources.yml
File metadata and controls
45 lines (41 loc) · 2.77 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
# Resources for other people to use
categories:
- name: Getting Started
about: Resources for getting new students involved in Computing Security.
links:
- link: "https://overthewire.org/wargames/bandit/"
description: Learn basic Linux commands and get familiar with the command line.
- name: Advanced Red Team
about: Resources for people interested in competition red teaming
links:
- link: "https://github.com/ritredteam/"
description: The source code for RITSEC Redteam's public tools.
- name: Reverse Engineering
about: Taking apart and understanding software that source code is not available for.
links:
- link: https://undocumented.ntinternals.net/
description: The Undocumented Functions and Structures for Microsoft Windows NT/2000/XP/Win7.
- link: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/getting-started-with-windows-debugging
description: Getting started with Windows Debugging.
- link: https://docs.microsoft.com/en-us/previous-versions/ms809762(v=msdn.10)
description: "Peering Inside the PE: A Tour of the Win32 Portable Executable File Format."
- link: https://beginners.re/
description: "[Book] Free e-book detailing reverse engineering concepts for x86, x64, ARM, and MIPS."
- link: https://www.msreverseengineering.com/program-analysis-reading-list/
description: Reading list to start getting harcore about advanced reverse engineering.
- link: https://nostarch.com/binaryanalysis
description: "[Book] Practical Binary Analysis - In-depth book detailing how to create your own binary analysis, instrumentation, and emulation tooling."
- link: https://nostarch.com/malware
description: "[Book] Practical Malware Analysis - Detailed analysis and walkthrough exercises for reversing and analyzing malware samples."
- link: https://software.intel.com/en-us/articles/intel-sdm
description: "[Book] Official documentation provided by Intel for their CPUs and their architecture."
- link: https://www.radare.org/r/
description: "[Tool] Radare2, a free, open-source, command line tool with powerful reverse-engineering tooling."
- link: https://cutter.re/
description: "[Tool] Cutter, a cross-platform GUI frontend for Radare2"
- link: https://ghidra-sre.org/
description: "[Tool] Ghidra, an open-sourced NSA reverse engineering tool with a powerful decompiler."
- link: https://binary.ninja/
description: "[Tool] Binary Ninja, a powerful visual disassembler with Python API support and an in-progress decompiler engine."
- link: https://www.hex-rays.com/products/ida/support/download_freeware.shtml
description: "[Tool] IDA, a powerful visual disassembler."