If any of the links are down and you can't retrieve them on archive.org, contact me and I can give you a copy of the document.
- Analyzing Uncommon Firmware
- UROBOROS - Reassembling Disassembling - a tool that can disassemble executables to the extent that the generated code can be assembled back to working binaries without manual effort.
- Automatic Reverse Engineering of Data Structures from Binary Execution [PDF]
- Digging For Data Structures [PDF]
- Howard: a dynamic excavator for reverse engineering data structures [PDF]
- Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer [PDF]
- Remote Exploitation of an Unaltered Passenger Vehicle [PDF]
- Intel® 64 and IA-32 Architectures Software Developer Manuals: These manuals describe the architecture and programming environment of the Intel® 64 and IA-32 architectures.
- X86 Opcode and Instruction Reference: This reference is intended to be precise opcode and instruction set reference (including x86-64). Its principal aim is exact definition of instruction parameters and attributes.
- iOS App Reverse Engineering: iOS App Reverse Engineering is the world's 1st book of very detailed iOS App reverse engineering skills
Please refer to the additional document
- Defeating Windows Driver Signature Enforcement #1: default drivers
- Defeating Windows Driver Signature Enforcement #2: CSRSS and thread desktops
- Defeating Windows Driver Signature Enforcement #3: The Ultimate Encounter
- DSEFix - Defeating x64 Driver Signature Enforcement: Using exploitable signed drivers - VirtualBox driver
- Bypassing PatchGuard on Windows x64
- Disable PatchGuard Vista & Windows 7
- Disable PatchGuard Windows 8 & Windows 10
- PInvoke.net: PInvoke.net is primarily a wiki, allowing developers to find, edit and add PInvoke* signatures, user-defined types, and any other information related to calling Win32 and other unmanaged APIs from managed code (written in languages such as C# or VB.NET).