Reverse Engineering

Welcome to the Reverse Engineering open course! This course is a journey into executable binaries and operating systems from 3 different angles: 1) Malware analysis, 2) Bug hunting and 3) Exploit writing. Both  Windows and Linux x86/x86_64 platforms are under the scope.

Last version: v.1.0
License: Creative Commons Attribution ShareAlike 4.0 (CC BY-SA)

  • Class 0 – Introduction
  • Class 1 – Executable Binaries: ELF
  • Class 2 – Executable Binaries: PE
  • Class 3 – Executable Binaries: Reversing
  • Class 4 – Malware Analysis I
  • Class 5 – Malware Analysis II
  • Class 6 – Fuzzing & SMT Solvers
  • Class 7 – Binary Instrumentation & Dynamic Binary Analysis
  • Class 8 – Exploit writing I: Stack & Integer Overflow
  • Class 9 – Exploit writing II: Use-After-Free
  • Class 10 – Exploit writing III: ROP chain

If you want to have this course/training on your company or university, contact me here.