Collection of study notes related to offensive programming, mostly C and Python focused.
Free Scripting Books
Free Programming Books
Developer Reference
Leetcode
https://learngitbranching.js.org/
Bash Handbook
BASH Programming - Introduction HOW-TO
Advanced Bash
Python for Pentesters
learnpythonthehardway
Practical Python
Python 101 for Hackers
Python 201 for Hackers
Python3 C2 Server How to Guide Gray Hat Python
Black Hat Python
Real World Python book, Real World Python Code Samples
30 Days of Python
Practical Python
Advanced Python Mastery
Python for Reverse Engineering
Python
PS 101
Learning Powershell
Powershell for Pentesters Videos
Hacking the Metal: Intro to Assembly
Some Assembly Required: Assembly Intro
Assembly Language Megaprimer for Linux
Windows Assembly Language Megaprimer
Art of Assembly
Assembly Tutorial
SecurityTube Assembly Primer for Hackers
Assembly
Learn C and C++
Learn C
Learn-C
C Programming: A Modern Approach
C Programming
Essential C
Kernel Basics
Windows Internals C++
OffensiveC++
C# for n00bs
Write Custom Backdoor Payloads with C#
Rust 101: Building Ransomware
Rust for n00bs
Offensive Rust
ired.team
VX Underground
Dark Vortex Maldev Series
Malware Development Notes
Getting Started with Malware Development
The Unprotect Project
0xpat maldev series
Learn C by Creating a Rootkit
Windows Internals
Exploit Education
ROPEmporium
Root Me
Connor McGarr's Blog
Exploit Development Resources
How to start RE/malware analysis?
Microcorruption.com
Challenges.re
Linux Reverse Engineering 101
Malware Unicorn Reverse Engineering Workshops
Tyler Hudak's Class "Intro to Reverse Engineering"
OS Dev Wiki
Open Security Training
Machine-Level and Systems Programming
Linux Kernel Book
Reversing C++ Functions
Article on How C++ Maps to Assembly
"Modern Debugging with WinDbg Preview" DEFCON 27 workshop
Malware Gems
x86/RM encoding cheat sheet
Applied Reverse Engineering Series
Flare On - RevEng Challenge
Reverse Engineering For Everyone!
Exploit Dev / Reversing
Reverse Engineering for Beginners
Binary Exploitation / Memory Corruption by LiveOverflow