--python
https://www.youtube.com/watch?v=5sqye64-1-k&list=PLBf0hzazHTGO7wysZIzstZi1han97XY16 #Python For Ethical Hacking - HackerSploit
http://www.primalsecurity.net/tutorials/python-tutorials/
--Basic Exploit development & Reverse Engineering
https://github.com/KorayAgaya/awesome-windows-exploitation [awesome list]
https://vulners.com/n0where/N0WHERE:76294 [awesome list]
http://netsec.ws/?p=180 # Simple Buffer Overflows and some good hacking notes
https://www.securitysift.com/windows-exploit-development-part-1-basics/
https://samsclass.info/123/123_S18.shtml # Ch 7: Programming for Security Professionals
https://samsclass.info/127/127_S18.shtml # CNIT 127: Exploit Development
https://veteransec.com/exploit-development-buffer-overflows/
http://www.fuzzysecurity.com/tutorials.html
https://veteransec.com/2018/09/22/creating-vetsecs-wargame-pt-1/ [crearing vagrant machine for exploit development Lab]
[awesome-windows-exploitation]
Course on Intermediate Level Linux Exploitation: https://github.com/nnamon/linux-exploitation-course
https://securityonline.info/category/penetration-testing/network-pentest/exploitation/
ARM EXploitation: https://blog.3or.de/category/reverse-engineering.html
---Malware Analysis Kevin M. Thomas on Reversing Malware: https://www.linkedin.com/in/mytechnotalent/detail/recent-activity/posts/
https://judithvanstegeren.com/blog/2017/getting-started-with-malware-analysis.html
https://blogs.cisco.com/security/malware-analysis-for-the-incident-responder
https://www.peerlyst.com/posts/resource-learning-how-to-reverse-malware-a-guide
http://struppigel.blogspot.com/ # MalwareAnalysisForHedgehogs [blog]
https://www.youtube.com/channel/UCVFXrUwuWxNlm6UNZtBLJ-A # MalwareAnalysisForHedgehogs [youtube]
https://samsclass.info/126/126_S17.shtml
http://securitytrainings.net/security-trainings/ # securityxploded sessions - references guides--> [https://securityxploded.com/malware-analysis-training-reference.php]
https://www.hackers-arise.com/reverse-engineering-malware
http://www.prodefence.org/category/reverse-engineering/malware-analysis-tutorials/
[part1] [Part2] [part3] [Olydbg]
---Reverse Engineering & Binary Analysis:
https://martin.uy/blog/projects/reverse-engineering/
https://www.begin.re/ [Reverse Engineering for Beginners]
https://www.peerlyst.com/posts/the-reverse-engineering-wiki-peerlyst
http://kakaroto.homelinux.net/2017/11/introduction-to-reverse-engineering-and-assembly/
https://www.apriorit.com/dev-blog/364-how-to-reverse-engineer-software-windows-in-a-right-way
https://0x00sec.org/c/reverse-engineering [community for Q&A advanced methods]
https://leotindall.com/tutorial/an-intro-to-x86_64-reverse-engineering/
https://blog.udemy.com/reverse-engineering-tutorial/
https://errantsecurity.com/2018/12/11/binary-exploitation-background.html
https://liveoverflow.com/binary_hacking/index.html # liveoverflow
https://trailofbits.github.io/ctf/vulnerabilities/
https://resources.infosecinstitute.com/java-bytecode-reverse-engineering/
https://whitedome.com.au/re4son/slae-blog/
static program analysis for 0-day : https://null-byte.wonderhowto.com/how-to/art-0-day-vulnerabilities-part-1-static-analysis-0165311/
Radar2 comparison table (https://radare.org/r/)