wtsxDev / reverse-engineering
List of awesome reverse engineering resources
AI Architecture Analysis
This repository is indexed by RepoMind. By analyzing wtsxDev/reverse-engineering in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.
Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.
Repository Summary (README)
PreviewReverse Engineering resources
A curated list of awesome reversing resources
Books
Reverse Engineering Books
- The IDA Pro Book
- Radare2 Book
- Reverse Engineering for Beginners
- The Art of Assembly Language
- Practical Reverse Engineering
- Reversing: Secrets of Reverse Engineering
- Practical Malware Analysis
- Malware Analyst's Cookbook
- Gray Hat Hacking
- Access Denied
- The Art of Memory Forensics
- Hacking: The Art of Exploitation
- Fuzzing for Software Security
- Art of Software Security Assessment
- The Antivirus Hacker's Handbook
- The Rootkit Arsenal
- Windows Internals Part 1 Part 2
- Inside Windows Debugging
- iOS Reverse Engineering
Courses
Reverse Engineering Courses
- Lenas Reversing for Newbies
- Open Security Training
- Dr. Fu's Malware Analysis
- Binary Auditing Course
- TiGa's Video Tutorials
- Legend of Random
- Modern Binary Exploitation
- RPISEC Malware Course
- SANS FOR 610 GREM
- REcon Training
- Blackhat Training
- Offensive Security
- Corelan Training
- Offensive and Defensive Android Reversing
Practice
Practice Reverse Engineering. Be careful with malware.
- Crackmes.de
- OSX Crackmes
- ESET Challenges
- Flare-on Challenges
- Github CTF Archives
- Reverse Engineering Challenges
- xorpd Advanced Assembly Exercises
- Virusshare.com
- Contagio
- Malware-Traffic-Analysis
- Malshare
- Malware Blacklist
- malwr.com
- vxvault
Hex Editors
Hex Editors
Binary Format
Binary Format Tools
- CFF Explorer
- Cerbero Profiler // Lite PE Insider
- Detect It Easy
- PeStudio
- PEiD
- MachoView
- nm - View Symbols
- file - File information
- codesign - Code signing information usage: codesign -dvvv filename
Disassemblers
Disassemblers
Binary Analysis
Binary Analysis Resources
Bytecode Analysis
Bytecode Analysis Tools
Import Reconstruction
Import Reconstruction Tools
Dynamic Analysis
Dynamic Analysis Tools
- ProcessHacker
- Process Explorer
- Process Monitor
- Autoruns
- Noriben
- API Monitor
- iNetSim
- SmartSniff
- TCPView
- Wireshark
- Fakenet
- Volatility
- Dumpit
- LiME
- Cuckoo
- Objective-See Utilities
- XCode Instruments - XCode Instruments for Monitoring Files and Processes User Guide
- dtrace - sudo dtruss = strace dtrace recipes
- fs_usage - report system calls and page faults related to filesystem activity in real-time. File I/O: fs_usage -w -f filesystem
- dmesg - display the system message buffer
Debugging
Debugging Tools
- WinDbg
- OllyDbg v1.10
- OllyDbg v2.01
- OllySnD
- Olly Shadow
- Olly CiMs
- Olly UST_2bg
- x64dbg
- gdb
- vdb
- lldb
- qira
- unicorn
Mac Decrypt
Mac Decrypting Tools
- Cerbero Profiler - Select all -> Copy to new file
- AppEncryptor - Tool for decrypting
- Class-Dump - use deprotect option
- readmem - OS X Reverser's process dumping tool
Document Analysis
Document Analysis Tools
Scripting
Scripting
- IDA Python Src
- IDC Functions Doc
- Using IDAPython to Make your Life Easier
- Introduction to IDA Python
- The Beginner's Guide to IDA Python
- IDA Plugin Contest
- onehawt IDA Plugin List
- pefile Python Library
Android
Android tools
Yara
Yara Resources
Please have a look at