===================
Reference Materials
===================
---
CTF
---
- `CTF Time `__
- `About CTF `__
- `DEF CON CTF `__
--------
Wargames
--------
- `Pwnable.Kr `__
- `Pwnable.tw `__
- `OverTheWire `__
- `IO Wargame `__
- `CSAW 365 `__
--------
RE Tools
--------
GDB and plugins
---------------
- `GDB Tutorial 1 `__
- `GDB Tutorial 2 `__
- `Pwndbg `__
- `Pwndbg Tutorial `__
- `Home - GEF - GDB Enhanced Features documentation `__
- `GitHub - cyrus-and/gdb-dashboard: Modular visual interface for GDB in Python `__
Pwntools
--------
- `Pwntools `__
- `Pwntools document `__
- `Pwntools tutorial `__
Disassemblers & Decompilers
---------------------------
- `radare `__
- `Cutter `__
- `IDA 7.0 Freeware `__
- `Binary Ninja Demo Verions `__
- `The NSA Ghidra `__
Regular Expressions
---------------------------
- `regex101: build, debug and share regex `__
- `RegExr: Learn, Build, & Test RegEx `__
----------
References
----------
- `GDB `__
- `AS `__
- `GCC `__
- `x86 calling convention `__
- `Alphanumeric opcode table (x86/amd64) `__
- `Intel 64 and IA-32 Architectures Software Developer `__
- AMD64 Architecture Programmer's Manual
(`vol1 `__, `vol2 `__, `vol3 `__, `vol4 `__)
- `How2heap `__
- `ctf-tools `__
- `preeny `__
- `X86 Opcode and Instruction Reference `__
---------------
Books & Manuals
---------------
- `Phrack Magazine `__
- `The Shellcoder's Handbook: Discovering and Exploiting Security Holes `__
- `The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws `__
- `Intel Architecture Software Developer Manuals `__
- `Computer Systems: A Programmer's Perspective, 3/E `__