└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # RE_Mal_Exploit_Tutorials 2 | 3 | --python 4 | 5 | https://www.youtube.com/watch?v=5sqye64-1-k&list=PLBf0hzazHTGO7wysZIzstZi1han97XY16 #Python For Ethical Hacking - HackerSploit 6 | 7 | http://www.primalsecurity.net/tutorials/python-tutorials/ 8 | 9 | 10 | 11 | --Basic Exploit development & Reverse Engineering 12 | 13 | https://x86re.com/ [reverse for noob] 14 | 15 | https://github.com/KorayAgaya/awesome-windows-exploitation [awesome list] 16 | 17 | https://vulners.com/n0where/N0WHERE:76294 [awesome list] 18 | 19 | http://netsec.ws/?p=180 # Simple Buffer Overflows and some good hacking notes 20 | 21 | https://www.securitysift.com/windows-exploit-development-part-1-basics/ 22 | 23 | https://null-byte.wonderhowto.com/how-to/hack-like-pro-build-your-own-exploits-part-1-introduction-buffer-overflows-0151173/ 24 | 25 | https://samsclass.info/123/123_S18.shtml # Ch 7: Programming for Security Professionals 26 | 27 | https://samsclass.info/127/127_S18.shtml # CNIT 127: Exploit Development 28 | 29 | https://veteransec.com/exploit-development-buffer-overflows/ 30 | 31 | http://www.fuzzysecurity.com/tutorials.html 32 | 33 | http://www.pentest.guru/index.php/2016/01/28/best-books-tutorials-and-courses-to-learn-about-exploit-development/ 34 | 35 | https://veteransec.com/2018/09/22/creating-vetsecs-wargame-pt-1/ [crearing vagrant machine for exploit development Lab] 36 | 37 | [[awesome-windows-exploitation](https://github.com/KorayAgaya/awesome-windows-exploitation)] 38 | 39 | Course on Intermediate Level Linux Exploitation: https://github.com/nnamon/linux-exploitation-course 40 | 41 | https://securityonline.info/category/penetration-testing/network-pentest/exploitation/ 42 | 43 | ARM EXploitation: https://blog.3or.de/category/reverse-engineering.html 44 | 45 | [[زیان اسمبلی به فارسی](http://ilikephp.ir/tutorial/id/50/assembly/)] 46 | 47 | 48 | ---Malware Analysis 49 | Kevin M. Thomas on Reversing Malware: https://www.linkedin.com/in/mytechnotalent/detail/recent-activity/posts/ 50 | 51 | https://judithvanstegeren.com/blog/2017/getting-started-with-malware-analysis.html 52 | 53 | https://blogs.cisco.com/security/malware-analysis-for-the-incident-responder 54 | 55 | https://www.peerlyst.com/posts/resource-learning-how-to-reverse-malware-a-guide 56 | 57 | http://struppigel.blogspot.com/ # MalwareAnalysisForHedgehogs [blog] 58 | 59 | https://www.youtube.com/channel/UCVFXrUwuWxNlm6UNZtBLJ-A # MalwareAnalysisForHedgehogs [youtube] 60 | 61 | https://samsclass.info/126/126_S17.shtml 62 | 63 | http://securitytrainings.net/security-trainings/ # securityxploded sessions - references guides--> [https://securityxploded.com/malware-analysis-training-reference.php] 64 | 65 | https://www.hackers-arise.com/reverse-engineering-malware 66 | 67 | http://www.prodefence.org/category/reverse-engineering/malware-analysis-tutorials/ 68 | [[part1](https://www.hackingloops.com/rce-tutorial-reverse-code-engineering-intro-part-1/)] [[Part2](https://www.hackingloops.com/reverse-code-engineering-tutorial-part-2-hackingloops/)] [[part3](https://www.hackingloops.com/reverse-engineering-tutorial-3-exe-file-structure/)] [[Olydbg](https://www.prodefence.org/tutorial-on-cracking-applications-with-ollydbg/)] 69 | 70 | 71 | https://www.prodefence.org/malware-analysis-learning-how-to-reverse-malware-a-collection-of-guides-and-tools/ 72 | 73 | 74 | 75 | ---Reverse Engineering & Binary Analysis: 76 | 77 | https://github.com/mytechnotalent/Reverse-Engineering/ [Kevin Tomas] 78 | 79 | https://martin.uy/blog/projects/reverse-engineering/ 80 | 81 | https://www.begin.re/ [Reverse Engineering for Beginners] 82 | 83 | https://www.peerlyst.com/posts/the-reverse-engineering-wiki-peerlyst 84 | 85 | http://kakaroto.homelinux.net/2017/11/introduction-to-reverse-engineering-and-assembly/ 86 | 87 | https://www.apriorit.com/dev-blog/364-how-to-reverse-engineer-software-windows-in-a-right-way 88 | 89 | https://0x00sec.org/c/reverse-engineering [community for Q&A advanced methods] 90 | 91 | https://leotindall.com/tutorial/an-intro-to-x86_64-reverse-engineering/ 92 | 93 | https://blog.udemy.com/reverse-engineering-tutorial/ 94 | 95 | https://resources.infosecinstitute.com/tutorial-building-reverse-engineering-simple-virtual-machine-protection/ 96 | 97 | https://errantsecurity.com/2018/12/11/binary-exploitation-background.html 98 | 99 | https://liveoverflow.com/binary_hacking/index.html # liveoverflow 100 | 101 | https://trailofbits.github.io/ctf/vulnerabilities/ 102 | 103 | https://resources.infosecinstitute.com/java-bytecode-reverse-engineering/ 104 | 105 | https://whitedome.com.au/re4son/slae-blog/ 106 | 107 | ------------------------ 108 | 109 | static program analysis for 0-day : https://null-byte.wonderhowto.com/how-to/art-0-day-vulnerabilities-part-1-static-analysis-0165311/ 110 | 111 | Radar2 comparison table (https://radare.org/r/) 112 | 113 | 114 | --------------------------------------------------------------------------------