A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources This article provides a curated list of resources for learning assembly language, reverse engineering, malware analysis, and game hacking. It includes links to YouTube playlists, tutorials, documentation, and GitHub repositories covering x86 and ARM assembly, as well as tools and courses for binary exploitation and reverse engineering. The collection is designed for both beginners and advanced learners seeking practical and theoretical knowledge in these cybersecurity and low-level programming fields. https://www.youtube.com/playlist?list=PLKK11Ligqitg9MOX3-0tFT1Rmh3uJp7kA https://www.youtube.com/playlist?list=PLmxT2pVYo5LB5EzTPZGfFN0c2GDiSXgQe https://www.youtube.com/playlist?list=PLetF-YjXm-sCH6FrTz4AQhfH6INDQvQSn https://www.youtube.com/playlist?list=PL038BE01D3BAEFDB0 https://www.tutorialspoint.com/assembly programming/index.html https://www.youtube.com/playlist?list=PL0C5C980A28FEE68D http://opensecuritytraining.info/IntroX86.html https://blog.rchapman.org/posts/Linux System Call Table for x86 64/ https://github.com/cirosantilli/x86-assembly-cheat https://www.cs.virginia.edu/~evans/cs216/guides/x86.html https://blog.stephenmarz.com/2020/05/20/assemblys-perspective/ https://sensepost.com/blogstatic/2014/01/SensePost crash course in x86 assembly-.pdf https://www.recurse.com/blog/7-understanding-c-by-learning-assembly https://www.youtube.com/watch?v=75gBFiFtAb8 https://www.felixcloutier.com/x86/index.html https://gpfault.net/posts/asm-tut-0.txt.html https://gpfault.net/posts/asm-tut-1.txt.html https://gpfault.net/posts/asm-tut-2.txt.html http://www.egr.unlv.edu/~ed/assembly64.pdf https://pacman128.github.io/pcasm/ https://www.syncfusion.com/ebooks/assemblylanguage https://www.whoishostingthis.com/resources/assembly-language/ https://inst.eecs.berkeley.edu/~cs161/sp15/discussions/dis06-assembly.pdf https://www.shadowinfosec.io/2018/05/a-gentle-introduction-into-arm-assembly.html http://opensecuritytraining.info/IntroARM.html http://opensecuritytraining.info/IntroX86.html https://azeria-labs.com/writing-arm-assembly-part-1/ https://github.com/0xZ0F/Z0FCourse ReverseEngineering https://revers.engineering/applied-reverse-engineering-series/ Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges. https://guyinatuxedo.github.io/index.html https://www.reversinghero.com/ https://github.com/GeoSn0w/Reverse-Engineering-Tutorials https://hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra https://www.pelock.com/articles/reverse-engineering-tools-review http://www.woodmann.com/TiGa/idaseries.html https://www.youtube.com/playlist?list=PLhx7-txsG6t6n E2LgDGqgvJtCHPL7UFu https://darungrim.com/research/2020-06-17-using-frida-for-windows-reverse-engineering.html https://www.youtube.com/playlist?list=PLiP0FxVgYuUz0kdK7L7YaI5n4qkOuymue https://www.youtube.com/playlist?list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN https://github.com/onethawt/reverseengineering-reading-list https://malwareunicorn.org/workshops/re101.html 0 https://www.youtube.com/playlist?list=PLKwUZp9HwWoDDBPvoapdbJ1rdofowT67z https://www.youtube.com/watch?v=bYDK5IJphPU http://security.cs.rpi.edu/courses/binexp-spring2015/ https://www.apriorit.com/dev-blog/363-how-to-reverse-engineer-os-x-and-ios-software https://www.robertxiao.ca/hacking/dsctf-2019-cpu-adventure-unknown-cpu-reversing/ https://github.com/wtsxDev/reverse-engineering https://github.com/hugsy/defcon 27 windbg workshop/ https://epic.blog/reverse-engineering/2020/07/27/reverse-engineering-android-app.html https://sourceware.org/gdb/onlinedocs/gdb/ https://gist.github.com/r1walz/64babc526d4e6f753c0821e46211dd30 https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/ https://wrongbaud.github.io/ghidra-training/ https://prezi.com/a5tm-lf0879-/reverse-engineering-101-nyupoly-2010/ https://azeria-labs.com/debugging-with-gdb-introduction/ https://www.pelock.com/articles/reverse-engineering-tools-review https://ghidra-sre.org/CheatSheet.html https://old.liveoverflow.com/binary hacking/reverse engineering.html https://www.notion.so/806c7afcbce24dc19e26fcd4b9c84f7b?v=ee1e96f93aaa46e2a2d11c9d70ed3a8b https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners/ https://www.youtube.com/watch?v=LAkYW5ixvhg https://www.megabeets.net/a-journey-into-radare-2-part-1/ https://www.taintedbits.com/2020/04/28/linux-binary-exploitation-series-with-pwnable-kr/ https://ctf101.org/reverse-engineering/overview/ https://ctf101.org/binary-exploitation/overview/ https://medium.com/@yardenshafir2/windbg-the-fun-way-part-1-2e4978791f9b https://www.youtube.com/watch?v=nf7yj51WkUA https://icyphox.sh/blog/python-for-re-1/ https://www.slideshare.net/AngelBoy1/presentations https://reversing.io/resources/ https://reverseengineering.stackexchange.com/ https://maxkersten.nl/binary-analysis-course/ https://forum.tuts4you.com/files/file/1307-lenas-reversing-for-newbies/ https://ghidra.re/courses/GhidraClass/Beginner/Introduction to Ghidra Student Guide withNotes.html https://hot3eed.github.io/2020/07/30/starling p1 obfuscations.html Reverse Engineering Starling Bank Part II : Jailbreak & Debugger Detection, Weaknesses & Mitigations https://hot3eed.github.io/2020/08/02/starling p2 detections mitigations.html https://www.tenouk.com/Bufferoverflowc/Bufferoverflow3.html http://opensecuritytraining.info/IntroductionToReverseEngineering.html https://medium.com/swlh/intro-to-reverse-engineering-45b38370384 https://medium.com/swlh/intro-to-reverse-engineering-part-2-4087a70104e9 https://blog.malwarebytes.com/security-world/2012/09/so-you-want-to-be-a-malware-analyst/ https://hshrzd.wordpress.com/how-to-start/ https://medium.com/secjuice/the-road-to-reverse-engineering-malware-7c0bc1bda9d2 https://github.com/rshipp/awesome-malware-analysis https://www.youtube.com/watch?v=Wh DJTaDq6U https://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html https://www.youtube.com/watch?v=QuFJpH3My7A https://www.youtube.com/watch?v=NuSdV8t3S4I https://medium.com/@tom rock/fifty-shades-of-malware-strings-d33b0c7bee99 https://www.youtube.com/playlist?list=PLz8CtXWiXoXnpw41rMRjFOkgO0jxpOf7n https://www.malwaretech.com/beginner-malware-reversing-challenges https://www.malwaretech.com/2017/11/creating-a-simple-free-malware-analysis-environment.html https://drive.google.com/file/d/1lSEps7jDX6an iXJ0Wokdjh0rnBgY9l7/view http://www.hexacorn.com/blog/2018/04/14/how-to-become-the-best-malware-analyst-e-v-e-r/ http://opensecuritytraining.info/MalwareDynamicAnalysis.html http://opensecuritytraining.info/ReverseEngineeringMalware.html https://www.youtube.com/playlist?list=PLOIa0J36PkUhKKjREFKzDo4DAP0W Wce4 https://www.youtube.com/playlist?list=PLynb9SXC4yER8NinXJwV4GHUM9-jaIsN https://www.youtube.com/playlist?list=PLynb9SXC4yEQFbBGoLy9yGaHM 71RoTG4 https://www.youtube.com/playlist?list=PLynb9SXC4yETaQYYBSg696V77Ku8TOM8- https://www.youtube.com/playlist?list=PLVMLi-YiSh3zR9hSGWxhBXGFrZ19jvDdm https://www.youtube.com/playlist?list=PLVMLi-YiSh3yKO06HnnT3OJXbAVfNWySF https://www.youtube.com/playlist?list=PL3CZ2aaB7m83eYTAVV2knNglB8I4y5QmH https://www.youtube.com/playlist?list=PL3CZ2aaB7m81OSOJ5Go-2sBbFcVVxX9Xu https://www.youtube.com/playlist?list=PLPsJIruML Zg iLA2bfoAPCo5d2aEuuV8 https://blog.scrt.ch/2020/06/19/engineering-antivirus-evasion/ https://struppigel.blogspot.com/2017/06/training-1-file-type-analysis-and-code.html?view=sidebar https://www.youtube.com/playlist?list=PLiFO-R BI-kAqDPqtnOq2n70mtAZ6xg5N https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-1/ https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-2/ https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-3/ https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-4/ http://opensecuritytraining.info/Rootkits.html https://www.youtube.com/watch?v=8yHLqZ3k1Xs https://www.youtube.com/watch?v=hM2Zvsak3GM https://www.youtube.com/playlist?list=PLniOzp3l9V83Yf52IXJTvW9rjstdqkduP https://www.securityinbits.com/malware-analysis/tools/wireshark-filters/ https://medium.com/ax1al/introduction-to-game-hacking-fb70e29de60f https://guidedhacking.com/threads/ghb1-start-here-beginner-guide-to-game-hacking.5911/ https://heathhowren.github.io/faq.html Reverse Engineering hidden game cheat codes https://guidedhacking.com/threads/c-game-hacking-guide-start-here.12701/ https://guidedhacking.com/threads/linux-game-hacking-full-guide.16411/ https://www.youtube.com/watch?v=5lZSFtxM 3w https://youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw9DnQtssdAwgG https://youtube.com/playlist?list=PLhixgUqwRTjwrqAY YDWllMw4e5E89E3x https://youtube.com/playlist?list=PL2C03D3BB7FAF2EA0 https://youtube.com/playlist?list=PLt9cUwGw6CYG-d7LGlLKHmLWFBJqA2XSV https://youtube.com/playlist?list=PLt9cUwGw6CYG1b4L76vZ49tvI2mfmRSCl https://youtube.com/playlist?list=PLt9cUwGw6CYGVvMWmbIFXmNTNeJ p8pv2 https://www.unknowncheats.me/wiki/UnKnoWnCheaTs Game Hacking Wiki https://github.com/dsasmblr/game-hacking https://github.com/dsasmblr/hacking-online-games https://www.retroreversing.com/tutorials/introduction https://en.wikipedia.org/wiki/Cheating in online games https://secret.club/2019/02/10/battleye-anticheat.html https://www.vice.com/en/article/59p7qd/this-man-has-survived-by-hacking-mmo-online-games https://en.wikipedia.org/wiki/List of open-source video games https://www.youtube.com/channel/UC bMnu fYu9-2 EY7GUfclQ https://www.youtube.com/channel/UCZF93Qrt6yMAabRnlND4YsQ https://www.youtube.com/user/L4DL4D2EUROPE UnKnoWnCheaTs Forum https://unknowncheats.me/ REGames Discord https://discord.gg/VdTRNA8 Guided Hacking https://guidedhacking.com/ Cheat Engine https://forum.cheatengine.org/ Reverse Engineering Games https://www.reddit.com/r/REGames/ https://www.radare.org/n/radare2.html https://github.com/0xd4d/dnSpy https://onlinedisassembler.com/static/home/index.html https://www.vb-decompiler.org/ https://www.immunityinc.com/products/debugger/ https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools https://www.gnu.org/software/gdb/ https://www.sweetscape.com/010editor/ https://github.com/mrT4ntr4/CTF-Game-Challenges https://www.malwaretech.com/beginner-malware-reversing-challenges https://ringzer0ctf.com/challenges https://github.com/N4NU/Reversing-Challenges-List https://github.com/3XPL017/Reversing-Challenges https://0x00sec.org/c/reverse-engineering/challenges/ https://reversing.ctfd.io/challenges