-
Notifications
You must be signed in to change notification settings - Fork 79
Reverse Engineering
Julian Cohen edited this page Jun 28, 2013
·
7 revisions
Reverse engineering is the process of understanding binary programs, usually in an environment where source code is not available and there is little knowledge about the original functionality of the binary.
- http://pentest.cryptocity.net/reverse-engineering/
- mammon_'s tales to his grandson
- http://blog.reverberate.org/2013/05/deep-wizardry-stack-unwinding.html
- Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
- Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration
- The Life of Binaries
- Introduction to ARM
- Lena Tutorials
- x86 Assembly
- Intel 64 and IA-32 Software Developer Manuals
- AMD64 Architecture Programmer's Manual Volume 1: Application Programming
- AMD64 Architecture Programmer's Manual Volume 2: System Programming
- AMD64 Architecture Programmer's Manual Volume 3: General-Purpose and System Instructions
- AMD64 Architecture Programmer's Manual Volume 4: 128-Bit Media Instructions
- AMD64 Architecture Programmer's Manual Volume 5: 64-Bit Media and x87 Floating-Point Instructions
- x86 calling conventions
- Calling Convention Examples
- x86 Win32 Reverse Engineering Cheat Sheet
- Intel x86 Assembly Instruction Cheat Sheet
- Calling Convention Reference
- Novice and Advanced Assembly resources for x86
- Lists of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs