Resources
Programming
- MSDN - https://msdn.microsoft.com/en-us
- Google - https://google.com
- The Cherno - https://www.youtube.com/user/TheChernoProject
- LearnCPP - https://www.learncpp.com
- Introduction to x64 Assembly - https://software.intel.com/en-us/articles/introduction-to-x64-assembly
- Intel® 64 and IA-32 ArchitecturesSoftware Developer’s Manual - https://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-instruction-set-reference-manual-325383.pdf
- CPPReference - https://en.cppreference.com/w
Security
- Websites:
- Sam Bowne - https://samsclass.info
- Pluralsight - https://www.pluralsight.com
- LiveOverflow - https://old.liveoverflow.com/index.html
- Fuzzy Security - https://www.fuzzysecurity.com
- Books:
- Hacking: The Art of Exploitation - https://nostarch.com/hacking2.htm
- Reversing: Secrets of Reverse Engineering - https://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817
- The Web Application Hacker’s Handbook - https://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470
- The Hacker Playbook 3: Practical Guide To Penetration Testing - https://www.amazon.com/Hacker-Playbook-Practical-Penetration-Testing/dp/1980901759
- Advanced Penetration Testing: Hacking the World’s Most Secure Networks - https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689
This post is licensed under
CC BY 4.0
by the author.