https://github.com/samrb-dev/asmforre
Collection of assembly program of IA-32 CPU architecture to understand how things work under each high level language. The main goal of the repo is get with familiar with ASM to identify various procedures while reversing a binary/executable
https://github.com/samrb-dev/asmforre
8086-programs assembly-language c cpp cybersecurity malware-analysis reverse-engineering x86 x86-assembly
Last synced: 8 months ago
JSON representation
Collection of assembly program of IA-32 CPU architecture to understand how things work under each high level language. The main goal of the repo is get with familiar with ASM to identify various procedures while reversing a binary/executable
- Host: GitHub
- URL: https://github.com/samrb-dev/asmforre
- Owner: SamRB-dev
- License: mit
- Created: 2022-08-30T03:47:51.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2024-02-22T09:25:34.000Z (over 1 year ago)
- Last Synced: 2025-01-11T20:44:35.764Z (9 months ago)
- Topics: 8086-programs, assembly-language, c, cpp, cybersecurity, malware-analysis, reverse-engineering, x86, x86-assembly
- Language: Assembly
- Homepage:
- Size: 13.1 MB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# ASM codes
Each ASM file contains useful comments that might point the readers to topics for further reading.
To use make.py for assembling your assembly code, make sure to have nasm installed on your system.
**Syntax**:
```shell
python make.py
```
# Resources
## Assemblers
- NASM
- Installation on Manjaro/Arch
```shell
sudo pacman -S nasm
```
- Debian
```shell
sudo apt-get update && sudo apt-get install nasm
```## x86 assembly
- [x86 Assembly (NASM)](https://www.tutorialspoint.com/assembly_programming/index.htm)
- [cs.lmu.edu](https://cs.lmu.edu/~ray/notes/x86assembly/)
- [8086 reference Recommended](https://shanniz.github.io/courses/assemblylanguage/Ytha_Yu_Charles_Marut_Assembly_Language.pdf)## 32 bit Linux syscalls
- [syscalls32.paolostivanin.com](https://syscalls32.paolostivanin.com/)## General
- [Open Security Training](https://opensecuritytraining.info/Training.html)
- [Open Security Training 2](https://p.ost2.fyi/courses)
- [TryHackMe](https://tryhackme.com)