Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jstrosch/learning-reverse-engineering
This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
https://github.com/jstrosch/learning-reverse-engineering
c cplusplus educational-project learning reverse-engineering
Last synced: 7 days ago
JSON representation
This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
- Host: GitHub
- URL: https://github.com/jstrosch/learning-reverse-engineering
- Owner: jstrosch
- Created: 2019-10-01T15:28:48.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2024-01-13T17:36:56.000Z (10 months ago)
- Last Synced: 2024-03-16T01:54:08.959Z (8 months ago)
- Topics: c, cplusplus, educational-project, learning, reverse-engineering
- Language: C
- Homepage: http://0xevilc0de.com
- Size: 4.7 MB
- Stars: 399
- Watchers: 19
- Forks: 67
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
Awesome Lists containing this project
README
# Learning Reverse Engineering
This repository contains several programs designed to help you in learning reverse engineering and malware anlaysis. The type of program is organized by concept it is focused, you can see this through the root folder structure. Source code along with compiled binaries are provided in each directory.
I discuss many of these programs through online videos and courses and you may find the following helpful:
- Getting Started with x86 Assembly - [YouTube Playlist](https://www.youtube.com/playlist?list=PLHJns8WZXCdvESvdr1BRjo4RHiR1Ylhw9)
- Getting Started with Reverse Engineering - [YouTube Playlist](https://www.youtube.com/playlist?list=PLHJns8WZXCdvaD7-xR7e5FJNW_6H9w-wC) and full courses on [Pluralsight](https://www.pluralsight.com/courses/reverse-engineering-getting-started)
- Analyzing C++ objects in Ghidra - [YouTube playlist](https://www.youtube.com/playlist?list=PLHJns8WZXCdu6kPwPpBhA0mfdB4ZuWy6M)
- Analyzing C Structures in IDA Pro - [YouTube playlist](https://www.youtube.com/playlist?list=PLHJns8WZXCdu7zDObGl7oEO0APWOEnDNT)
- Essential Elements of the Portable Executable (PE) file - [YouTube playlist](https://www.youtube.com/playlist?list=PLHJns8WZXCdstHnLaxcz-CO74fO4Q88_8)
## Other Tools You May Find Helpful
- [sclauncher](https://github.com/jstrosch/sclauncher): A shellcode launcher and debugging tool
## Compiling the Source Code
These programs are intended to be compiled with the C/C++ compiler from Microsoft. You can use the `Developer Command Prompt` after installing the free/community version to compile using `cl`. An example of this command would be:
```cl ```
This should produce two files: `.obj` and `.exe` using the name of the input file. You can typically ignore the `.obj` file, the `.exe` is what you will analyze. Please note, occassionally specific compiler flags are used to obtain desired affects in the resulting binary. These compiler flags will be identified in the related videos or noted in the README in the specific folder.