> cat /dev/github | grep security-tools
discovered 30 Mar 2026

learning-reverse-engineering

C ★ 750 via github-topic
→ View on GitHub

AI Summary: The Learning Reverse Engineering repository provides a collection of programs aimed at enhancing skills in reverse engineering and malware analysis. It organizes content by specific concepts related to reverse engineering, delivers both source code and compiled binaries, and includes links to supplementary online courses and video playlists. Notable features include guidance on using various tools like Ghidra and IDA Pro, as well as instructions for compiling the source code with Microsoft’s C/C++ compiler.


README

Learning Reverse Engineering

This repository contains several programs designed to help you in learning reverse engineering and malware anlaysis. The type of program is organized by concept it is focused, you can see this through the root folder structure. Source code along with compiled binaries are provided in each directory.

I discuss many of these programs through online videos and courses and you may find the following helpful:

Other Tools You May Find Helpful

  • sclauncher: A shellcode launcher and debugging tool

Compiling the Source Code

These programs are intended to be compiled with the C/C++ compiler from Microsoft. You can use the Developer Command Prompt after installing the free/community version to compile using cl. An example of this command would be:

cl <path/to/source_code>

This should produce two files: .obj and .exe using the name of the input file. You can typically ignore the .obj file, the .exe is what you will analyze. Please note, occassionally specific compiler flags are used to obtain desired affects in the resulting binary. These compiler flags will be identified in the related videos or noted in the README in the specific folder.