=================== Reference Materials =================== --- CTF --- - `CTF Time `__ - `About CTF `__ - `DEF CON CTF `__ -------- Wargames -------- - `Pwnable.Kr `__ - `Pwnable.tw `__ - `OverTheWire `__ - `IO Wargame `__ - `CSAW 365 `__ -------- RE Tools -------- GDB and plugins --------------- - `GDB Tutorial 1 `__ - `GDB Tutorial 2 `__ - `Pwndbg `__ - `Pwndbg Tutorial `__ - `Home - GEF - GDB Enhanced Features documentation `__ - `GitHub - cyrus-and/gdb-dashboard: Modular visual interface for GDB in Python `__ Pwntools -------- - `Pwntools `__ - `Pwntools document `__ - `Pwntools tutorial `__ Disassemblers & Decompilers --------------------------- - `radare `__ - `Cutter `__ - `IDA 7.0 Freeware `__ - `Binary Ninja Demo Verions `__ - `The NSA Ghidra `__ Regular Expressions --------------------------- - `regex101: build, debug and share regex `__ - `RegExr: Learn, Build, & Test RegEx `__ ---------- References ---------- - `GDB `__ - `AS `__ - `GCC `__ - `x86 calling convention `__ - `Alphanumeric opcode table (x86/amd64) `__ - `Intel 64 and IA-32 Architectures Software Developer `__ - AMD64 Architecture Programmer's Manual (`vol1 `__, `vol2 `__, `vol3 `__, `vol4 `__) - `How2heap `__ - `ctf-tools `__ - `preeny `__ - `X86 Opcode and Instruction Reference `__ --------------- Books & Manuals --------------- - `Phrack Magazine `__ - `The Shellcoder's Handbook: Discovering and Exploiting Security Holes `__ - `The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws `__ - `Intel Architecture Software Developer Manuals `__ - `Computer Systems: A Programmer's Perspective, 3/E `__