A list of resources that will teach you crucial skills needed to be a Reverse Engineer and/or an Exploit Developer
- A STRONG desire to learn and a love for problem solving
- [Briefly Covering C] Learn C - Interactive Online Course
- [Learn Linux Program Interaction] PWN College - Interaction Module
- [Learn Basics of Reversing] Begin.re 'The Workshop'
- [Learn C more in depth] edX - C Programming: Getting Started
- [Learn Assembly] Architecture 1001: x86-64 Assembly
- [Think like an attacker - Earn a belt if you complete it] PWN College - All Modules
- [Practice Reversing Skills] Binary Bomb Lab - Download
- [Practice Reversing Skills] Binary Bomb Lab - Setup
- [Practice Reversing Skills] Reverse Engineering tutorials to help you along the way
- [Browser Based Disassembly Tool] Godbolt tool
- [Fun Exploit Dev/Reversing] Microcorruption
- [Fun Exploit Dev/Reversing] Microcorruption CTF Tutorial
- [Fun Exploit Dev/Reversing] Microcorruption Tutorial Walkthrough - Youtube
- [Practice Exploit Dev] Exploit Education: Phoenix - Practice Fundamentals
- [Practice More Exploit Dev] ROP Emporium - Most common exploitation techniques used today
- [Final Step] Nightmare - Final Practice Reading
- [Final Step] Nightmare - Final Practice Download
Why you should learn C (first)
- [Optional] Learn C - Interactive Online Course
- [Optional] Dartmouth's 'C Programming with Linux' edX class
- [Optional] edX - C Programming: Getting Started
- [Mandatory] Architecture 1001: x86-64 Assembly
- [Optional] Architecture 2001: x86-64 OS Internals
- [Optional] Learn ARM Assembly
- [Mandatory] Begin.re 'The Workshop'
- [Optional] Godbolt tool
- [Mandatory] Binary Bomb Lab - Download
- [Mandatory] Binary Bomb Lab - Setup
- [Optional Reading] Reverse Engineering tutorials to help you along the way
- [Optional] [Earn a belt if you complete it] PWN College - Think like an attacker
- [Mandatory] Exploit Education: Nebula - Start thinking like an attacker
- [Mandatory] Exploit Education: Phoenix - Practice Fundamentals
- [Optional] PWN College: Memory Module - Learn Common Vulnerabilities
- [Optional] Exploit Education: Fusion - Next step up from Phoenix
- [Mandatory] Microcorruption
- [Optional] Microcorruption CTF Tutorial
- [Optional] Microcorruption Tutorial Walkthrough - Youtube
- [Mandatory] ROP Emporium - Most common exploitation techniques used today
- [Mandatory] Nightmare - Final Practice Reading
- [Mandatory] Nightmare - Final Practice Download
- [Optional] Port Swigger Web Application Security
- https://dayzerosec.com/blog/2021/02/02/getting-started.html
- https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
- https://python3-pwntools.readthedocs.io/en/latest/tubes/processes.html
- https://docs.pwntools.com/_/downloads/en/stable/pdf/
- https://www.youtube.com/pwncollege
- https://teachyourselfinfosec.com/