Nivel 0:
https://cs50.harvard.edu/weeks
-
Asm & Api:
Limbaj de Asamblare (Assembler) Intel 8086
Windows Assembly Language Megaprimer
Iczelion's Win32 Assembly
Silences Programming Tour with MASM32
Intel Pentium Instruction Set Reference
Functii Api - MSDN Library
Undocumented Functions
Reverse engineering:
TiGa's Video Tutorial Series on IDA Pro
Lenas Reversing for Newbies
IDA Pro Binary Auditing Training
R4ndom’s Beginning Reverse Engineering
Ricardo Narvaja Tutorials [introduction to cracking with Olly from zero]
https://drive.google.com/drive/folders/0B13TW0I0f8O2ckd2T0lsbXRoYmc Reversing with IDA PRO from scratch
Kani Cracking tutorials
https://rstforums.com/forum/topic/106449-nsa-capstone-course-reverse-engineering/ NSA Capstone Course - Reverse Engineering
Analiza malware:
Dr. Fu's Malware Analysis Tutorials
F-Secure Malware Analysis Course
Reversing & Malware Analysis Training, Advanced Malware Analysis Training
https://github.com/RPISEC/Malware Malware Analysis at Rensselaer Polytechnic Institute
Exploits/shellcode:
Corelan Exploit writing tutorial
Neox Training Center
Exploit Research Megaprimer
Fuzzy security - Exploit Development Tutorial
Shellcode Tutorials
Memory forensics:
Introduction to Volatility
Scripting:
Google's Python Class
Open Security Training
Training -un site ce isi merita propria categorie
Tools:
RCE tool library
Diverse:
Goppit PE file format
Cheat sheets: quickly code, quick reference
Online automated malware analysis:
Malwr (Windows executable, PDF)
https://www.hybrid-analysis.com/
https://any.run/
ThreatExpert (Windows executable)
CWSandbox (Windows executable)
JSUNPACK (PDF, pcap, HTML, or JavaScript)
malware tracker (Shellcode Analysis, PDF, Doc )
Document Analyzer (.pdf, .doc, .ppt, .xls, .docx, .pptx, .xlsx, .rtf)
Mobile Sandbox (APK Analysis)
https://detux.org/index.php (Linux Sandbox x86, x86-64, ARM, MIPS and MIPSEL)
SandDroid (APK Analysis Sandbox)
https://linux.huntingmalware.com/#