Est. read time: 1 minute | Last updated: October 22, 2025 by John Gentile


Contents

Software Reverse Engineering (SRE)

Analysis

  • Start with basic GNU file utilities like file to show what kind of file it looks to be based on standard headers (e.g. ELF executable or zip archive), and use strings to see if any unobfuscated strings stand out.

Tools

  • Ghidra: Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate.
  • IDA: Multi-OS disassembler and debugger with many advanced features.
  • ReFirmLabs/binwalk: Firmware Analysis Tool
  • OFRAK: OFRAK (Open Firmware Reverse Analysis Konsole) supports a wide variety of binaries, including: userspace executables, embedded filesystems, compressed and checksummed firmware, bootloaders, RTOS/OS kernels, and everything in between.
  • AFL++: The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!

Anti-SRE

SRE Practice Sites

Web Security

Tools

  • Shodan: search engine for IoT devices.

Kernel/OS Security

Capture The Flag (CTF) & General Practice Sites

General References & Learnings