Malware Reverse Engineering
By Bamidele Ajayi, OCP, MCTS, MCITP EA, CISA, CISM
Android Reverse Engineering: An Introductory Guide to Malware Analysis
By Vicente Aguilera Diaz, CISA, CISSP, CSSLP, PCI ASV, ITIL Foundation, CEH|I, ECSP|I, OPSA
Write Your Own Debugger
By Amr Thabet
Reverse Engineering – Shellcodes Techniques
By Eran Goldstein, CEH, CEI, CISO, Security+, MCSA, MCSE Security
Deep Inside Malicious PDF
By Yehia Mamdouh, Founder and Instructor of Master Metasploit Courses, CEH, CCNA
How to Reverse Engineer dot NET Assemblies
By Soufiane Tahiri, InfoSec Institute Contributor and Computer Security Researcher
Reversing with Stack-Overflow and Exploitation
By Bikash Dash, RHCSA, RHCE, CSSA