Epilogue

To Go Further
And so ends this introduction to software reverse engineering. I hope you enjoyed the format of this course and found it useful!
However, it's important to remember that reverse engineering is all about practice! In addition to numerous blog posts and related resources, there are plenty of executables available online for you to cut your teeth on, and it is easy to practice and develop your reverse engineering skills using free tools. Eventually, you may find yourself analyzing malware, or even making a living at it.
Even if you can't learn reverse engineering from books alone (or from reading a newsletter on your phone on the way to work), there are a few books out there that can give you a deeper insight into certain aspects:
Eldad Eilam, Reversing: Secrets of Reverse Engineering, Wiley,
2015, ISBN 978-0764574818.
Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse,
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel,
Reversing Tools, and Obfuscation, Wiley, 2014, ISBN
978-1118787311.
Kara Nance, Chris Eagle, The Ghidra Book: The Definitive Guide,
No Starch Press, 2020, ISBN 978-1718501027.
Maria “Azeria” Markstedter, Blue Fox: Arm Assembly Internals
and Reverse Engineering, Wiley, 2023, ISBN 978-1119745303.
Stephanie Domas, Christopher Domas, x86 Software Reverse Engineering, Cracking, and Counter-Measures, Wiley, 2024, ISBN 978-1394199884.

David Álvarez Pérez, Ravikant Tiwari, Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats, 2nd ed., Packt Publishing, 2025, ISBN 978-1835889824.
Thanks for reading Crumbs of Cybersecurity! Subscribe for free to receive new posts and support my work.