Reverse // Binary Analysis

Reverse Engineering

Reverse Engineering brings the binary back into view. This domain covers assembly fundamentals, decompilation, tooling, memory-corruption context and the reasoning used to understand what software really does when source code is absent or untrusted.

16 notescurated referencespublic research surface

Domain overview

This domain focuses on understanding binaries, unpacking behavior and mapping control flow. It supports exploit development, malware analysis, thick-client review and platform-specific research.

Curated public references

Brief index

brief

Introduction

Static and dynamic techniques for understanding binaries and platform behaviour.

2 focus points0 links
brief

Source Code Auditing

Static review of code paths, dangerous functions and weak validation patterns.

7 focus points3 links
brief

x86 Assembly Basics Theory

Static and dynamic techniques for understanding binaries and platform behaviour.

2 focus points0 links
brief

Reverse Engineering Basics

Binary analysis, disassembly, control-flow recovery and behavioural understanding.

4 focus points4 links
brief

Buffer Overflow Theory

Memory-corruption analysis focused on offsets, overwrite control and exploit primitives.

3 focus points0 links
brief

Macos Reverse Engineering

Binary analysis, disassembly, control-flow recovery and behavioural understanding.

5 focus points2 links
brief

ARM Reverse Engineering

Binary analysis, disassembly, control-flow recovery and behavioural understanding.

6 focus points3 links
brief

Binary Ninja

Static and dynamic techniques for understanding binaries and platform behaviour.

4 focus points2 links
brief

radare2 Quick Reference

Command-line reversing for disassembly, analysis and low-level binary inspection.

1 focus point0 links