https://www.youtube.com/playlist?list=PLKK11Ligqitg9MOX3-0tFT1Rmh3uJp7kA
https://www.youtube.com/playlist?list=PLmxT2pVYo5LB5EzTPZGfFN0c2GDiSXgQ
https://www.youtube.com/playlist?list=PLetF-YjXm-sCH6FrTz4AQhfH6INDQvQSn
https://www.youtube.com/playlist?list=PL038BE01D3BAEFDB0
https://www.tutorialspoint.com/assembly_programming/index.html
https://www.youtube.com/playlist?list=PL0C5C980A28FEE68D
http://opensecuritytraining.info/IntroX86.html
https://blog.rchapman.org/posts/Linux_System_Call_Table_for_x86_64/
https://github.com/0xAX/asm
https://github.com/cirosantilli/x86-assembly-cheat
https://www.cs.virginia.edu/~evans/cs216/guides/x86.html
https://blog.stephenmarz.com/2020/05/20/assemblys-perspective/
https://sensepost.com/blogstatic/2014/01/SensePost_crash_course_in_x86_assembly-.pdf
https://www.recurse.com/blog/7-understanding-c-by-learning-assembly
https://www.youtube.com/watch?v=75gBFiFtAb8
https://www.felixcloutier.com/x86/index.html
https://gpfault.net/posts/asm-tut-0.txt.html
https://gpfault.net/posts/asm-tut-1.txt.html
https://gpfault.net/posts/asm-tut-2.txt.html
http://www.egr.unlv.edu/~ed/assembly64.pdf
https://pacman128.github.io/pcasm/
https://www.syncfusion.com/ebooks/assemblylanguage
https://www.whoishostingthis.com/resources/assembly-language/
https://inst.eecs.berkeley.edu/~cs161/sp15/discussions/dis06-assembly.pdf
https://www.shadowinfosec.io/2018/05/a-gentle-introduction-into-arm-assembly.html
http://opensecuritytraining.info/IntroARM.html
http://opensecuritytraining.info/IntroX86.html
https://azeria-labs.com/writing-arm-assembly-part-1/
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://revers.engineering/applied-reverse-engineering-series/
Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges.
https://guyinatuxedo.github.io/index.html
https://www.reversinghero.com/
https://github.com/GeoSn0w/Reverse-Engineering-Tutorials
https://hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra
https://www.pelock.com/articles/reverse-engineering-tools-review
http://www.woodmann.com/TiGa/idaseries.html
https://www.youtube.com/playlist?list=PLhx7-txsG6t6n_E2LgDGqgvJtCHPL7UFu
https://darungrim.com/research/2020-06-17-using-frida-for-windows-reverse-engineering.html
https://www.youtube.com/playlist?list=PLiP0FxVgYuUz0kdK7L7YaI5n4qkOuymue
https://www.youtube.com/playlist?list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN
https://github.com/onethawt/reverseengineering-reading-list
https://malwareunicorn.org/workshops/re101.html#0
https://www.youtube.com/playlist?list=PLKwUZp9HwWoDDBPvoapdbJ1rdofowT67z
https://www.youtube.com/watch?v=bYDK5IJphPU
http://security.cs.rpi.edu/courses/binexp-spring2015/
https://www.apriorit.com/dev-blog/363-how-to-reverse-engineer-os-x-and-ios-software
https://www.robertxiao.ca/hacking/dsctf-2019-cpu-adventure-unknown-cpu-reversing/
https://github.com/wtsxDev/reverse-engineering
https://github.com/hugsy/defcon_27_windbg_workshop/
https://epic.blog/reverse-engineering/2020/07/27/reverse-engineering-android-app.html
https://sourceware.org/gdb/onlinedocs/gdb/
https://gist.github.com/r1walz/64babc526d4e6f753c0821e46211dd30
https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/
https://wrongbaud.github.io/ghidra-training/
https://prezi.com/a5tm-lf0879-/reverse-engineering-101-nyupoly-2010/
https://azeria-labs.com/debugging-with-gdb-introduction/
https://www.pelock.com/articles/reverse-engineering-tools-review
https://ghidra-sre.org/CheatSheet.html
https://old.liveoverflow.com/binary_hacking/reverse_engineering.html
https://www.notion.so/806c7afcbce24dc19e26fcd4b9c84f7b?v=ee1e96f93aaa46e2a2d11c9d70ed3a8b
https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners/
https://www.youtube.com/watch?v=LAkYW5ixvhg
https://www.megabeets.net/a-journey-into-radare-2-part-1/
https://www.taintedbits.com/2020/04/28/linux-binary-exploitation-series-with-pwnable-kr/
https://ctf101.org/reverse-engineering/overview/
https://ctf101.org/binary-exploitation/overview/
https://medium.com/@yardenshafir2/windbg-the-fun-way-part-1-2e4978791f9b
https://www.youtube.com/watch?v=nf7yj51WkUA
https://icyphox.sh/blog/python-for-re-1/
https://www.slideshare.net/AngelBoy1/presentations
https://reversing.io/resources/
https://reverseengineering.stackexchange.com/
https://maxkersten.nl/binary-analysis-course/
https://forum.tuts4you.com/files/file/1307-lenas-reversing-for-newbies/
https://ghidra.re/courses/GhidraClass/Beginner/Introduction_to_Ghidra_Student_Guide_withNotes.html
https://hot3eed.github.io/2020/07/30/starling_p1_obfuscations.html
Reverse Engineering Starling Bank (Part II): Jailbreak & Debugger Detection, Weaknesses & Mitigations
https://hot3eed.github.io/2020/08/02/starling_p2_detections_mitigations.html
https://www.tenouk.com/Bufferoverflowc/Bufferoverflow3.html
http://opensecuritytraining.info/IntroductionToReverseEngineering.html
https://medium.com/swlh/intro-to-reverse-engineering-45b38370384
https://medium.com/swlh/intro-to-reverse-engineering-part-2-4087a70104e9
https://blog.malwarebytes.com/security-world/2012/09/so-you-want-to-be-a-malware-analyst/
https://hshrzd.wordpress.com/how-to-start/
https://medium.com/secjuice/the-road-to-reverse-engineering-malware-7c0bc1bda9d2
https://github.com/rshipp/awesome-malware-analysis
https://www.youtube.com/watch?v=Wh_DJTaDq6U
https://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html
https://www.youtube.com/watch?v=QuFJpH3My7A
https://www.youtube.com/watch?v=NuSdV8t3S4I
https://medium.com/@tom_rock/fifty-shades-of-malware-strings-d33b0c7bee99
https://www.youtube.com/playlist?list=PLz8CtXWiXoXnpw41rMRjFOkgO0jxpOf7n
https://www.malwaretech.com/beginner-malware-reversing-challenges
https://www.malwaretech.com/2017/11/creating-a-simple-free-malware-analysis-environment.html
https://drive.google.com/file/d/1lSEps7jDX6an_iXJ0Wokdjh0rnBgY9l7/view
http://www.hexacorn.com/blog/2018/04/14/how-to-become-the-best-malware-analyst-e-v-e-r/
http://opensecuritytraining.info/MalwareDynamicAnalysis.html
http://opensecuritytraining.info/ReverseEngineeringMalware.html
https://www.youtube.com/playlist?list=PLOIa0J36PkUhKKjREFKzDo4DAP0W_Wce4
https://www.youtube.com/playlist?list=PLynb9SXC4yER8NinXJwV4GHUM9-jaIsN_
https://www.youtube.com/playlist?list=PLynb9SXC4yEQFbBGoLy9yGaHM_71RoTG4
https://www.youtube.com/playlist?list=PLynb9SXC4yETaQYYBSg696V77Ku8TOM8-
https://www.youtube.com/playlist?list=PLVMLi-YiSh3zR9hSGWxhBXGFrZ19jvDdm
https://www.youtube.com/playlist?list=PLVMLi-YiSh3yKO06HnnT3OJXbAVfNWySF
https://www.youtube.com/playlist?list=PL3CZ2aaB7m83eYTAVV2knNglB8I4y5QmH
https://www.youtube.com/playlist?list=PL3CZ2aaB7m81OSOJ5Go-2sBbFcVVxX9Xu
https://www.youtube.com/playlist?list=PLPsJIruML_Zg_iLA2bfoAPCo5d2aEuuV8
https://blog.scrt.ch/2020/06/19/engineering-antivirus-evasion/
https://struppigel.blogspot.com/2017/06/training-1-file-type-analysis-and-code.html?view=sidebar
https://www.youtube.com/playlist?list=PLiFO-R_BI-kAqDPqtnOq2n70mtAZ6xg5N
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-1/
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-2/
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-3/
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-4/
http://opensecuritytraining.info/Rootkits.html
https://www.youtube.com/watch?v=8yHLqZ3k1Xs
https://www.youtube.com/watch?v=hM2Zvsak3GM
https://www.youtube.com/playlist?list=PLniOzp3l9V83Yf52IXJTvW9rjstdqkduP
https://www.securityinbits.com/malware-analysis/tools/wireshark-filters/
https://www.radare.org/n/radare2.html
https://github.com/0xd4d/dnSpy
https://onlinedisassembler.com/static/home/index.html
https://www.vb-decompiler.org/
https://www.immunityinc.com/products/debugger/
https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools
https://www.gnu.org/software/gdb/
https://www.sweetscape.com/010editor/
https://www.malwaretech.com/beginner-malware-reversing-challenges
https://ringzer0ctf.com/challenges
https://github.com/N4NU/Reversing-Challenges-List
https://github.com/3XPL017/Reversing-Challenges
https://0x00sec.org/c/reverse-engineering/challenges/