===================
Reference Materials
===================
---
CTF
---
- `CTF Time `__
- `About CTF `__
- `DEF CON CTF `__
--------
Wargames
--------
- `OverTheWire `__
- `IO Wargame `__
- `CSAW 365 `__
- `Pwnable.Kr `__
- `Pwnable.tw `__
-----
Tools
-----
- `GDB Tutorial 1 `__
- `GDB Tutorial 2 `__
- `Pwndbg `__
- `Pwndbg Tutorial `__
- `Pwntools `__
- `Pwntools document `__
- `Pwntools tutorial `__
- `IDA 7.0 Freeware `__
- `Binary Ninja Demo Verions `__
- `The NSA Ghidra `__
----------
References
----------
- `GDB `__
- `AS `__
- `GCC `__
- `x86 calling convention `__
- `Alphanumeric opcode table (x86/amd64) `__
- `Intel 64 and IA-32 Architectures Software Developer `__
- AMD64 Architecture Programmer's Manual
(`vol1 `__, `vol2 `__, `vol3 `__, `vol4 `__)
- `How2heap `__
- `ctf-tools `__
- `preeny `__
---------------
Books & Manuals
---------------
- `Phrack Magazine `__
- `The Shellcoder's Handbook: Discovering and Exploiting Security Holes `__
- `The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws `__
- `Intel Architecture Software Developer Manuals `__
- `Computer Systems: A Programmer's Perspective, 3/E `__