Offensive Security
Est. read time: 1 minute | Last updated: October 22, 2025 by John Gentile
Contents
- Software Reverse Engineering (SRE)
- Web Security
- Kernel/OS Security
- Capture The Flag (CTF) & General Practice Sites
- General References & Learnings
Software Reverse Engineering (SRE)
Analysis
- Start with basic GNU file utilities like
file
to show what kind of file it looks to be based on standard headers (e.g. ELF executable or zip archive), and usestrings
to see if any unobfuscated strings stand out.
Tools
- Ghidra: Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate.
- IDA: Multi-OS disassembler and debugger with many advanced features.
- ReFirmLabs/binwalk: Firmware Analysis Tool
- OFRAK: OFRAK (Open Firmware Reverse Analysis Konsole) supports a wide variety of binaries, including: userspace executables, embedded filesystems, compressed and checksummed firmware, bootloaders, RTOS/OS kernels, and everything in between.
- AFL++: The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
Anti-SRE
- Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
- droberson/ELFcrypt
SRE Practice Sites
Web Security
Tools
- Shodan: search engine for IoT devices.
Kernel/OS Security
Capture The Flag (CTF) & General Practice Sites
- Wargames Nexus: a sorted and updated list of security wargame sites.
- OverTheWire: Wargames
- Root Me
- apsdehal/awesome-ctf: A curated list of CTF frameworks, libraries, resources and softwares
- CTF Time: find upcoming CTF events