//Topic

Best Reverse Engineering books

15 books in our catalog cover Reverse Engineering, ranked by rating. Each entry is an opinionated review with who the book is for and who should skip it.

  1. 01 · 2021

    The Hardware Hacking Handbook

    Breaking Embedded Security with Hardware Attacks

    Jasper van Woudenberg and Colin O'Flynn (NewAE / ChipWhisperer) on real hardware attacks: bus sniffing, fault injection, side-channel power analysis, and the lab work that turns a black box into a known target.

    Advanced5/5Jasper van Woudenberg, Colin O'Flynn
  2. 02 · 2018

    Practical Binary Analysis

    Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

    Dennis Andriesse on the binary toolchain you can actually script: ELF internals, dynamic taint analysis, symbolic execution and instrumentation with concrete code-along examples.

    Advanced5/5Dennis Andriesse
  3. 03 · 2012

    Practical Malware Analysis

    The Hands-On Guide to Dissecting Malicious Software

    Still the gold standard textbook for static and dynamic malware analysis on Windows.

    Intermediate5/5Michael Sikorski, Andrew Honig
  4. 04 · 2009

    Les virus informatiques : théorie, pratique et applications

    Éric Filiol's reference French-language treatment of computer virology. Formal theory, infection mechanisms, offensive and defensive applications, with academic rigor rare on the topic.

    Advanced5/5Éric Filiol
  5. 05 · 2024

    Evasive Malware

    A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats

    Kyle Cucci on the anti-analysis arms race: sandbox detection, anti-debug, anti-VM, packing, and the analyst-side tooling and tradecraft that get past those layers.

    Advanced4/5Kyle Cucci
  6. 06 · 2022

    Gray Hat Hacking

    The Ethical Hacker's Handbook

    A multi-author breadth-first reference covering the modern offensive landscape: web, binary, hardware, IoT, mobile, cloud, and adversarial ML — the closest thing in print to a single-volume snapshot of where offensive security is.

    Advanced4/5Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huascar Tejeda, Moses Frost
  7. 07 · 2022

    The Art of Mac Malware, Volume 1

    The Guide to Analyzing Malicious Software

    Patrick Wardle's deep dive on macOS malware analysis: persistence patterns, injection techniques, anti-analysis tricks, and the macOS-specific tooling needed to triage real samples.

    Advanced4/5Patrick Wardle
  8. 08 · 2019

    Rootkits and Bootkits

    Reversing Modern Malware and Next Generation Threats

    Matrosov, Rodionov and Bratus on persistent, deeply-embedded malware: kernel rootkits, MBR/UEFI bootkits, and the forensic techniques that surface them. Strongly Windows-internals oriented.

    Advanced4/5Alex Matrosov, Eugene Rodionov, Sergey Bratus
  9. 09 · 2016

    The Car Hacker's Handbook

    A Guide for the Penetration Tester

    Craig Smith's guide to automotive bus systems (CAN, LIN, FlexRay), ECUs, infotainment surfaces, and how to fuzz, trace and exploit modern vehicles.

    Intermediate4/5Craig Smith
  10. 10 · 2014

    Practical Reverse Engineering

    x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

    A working reverser's textbook from three Microsoft / Quarkslab veterans, covering the architectures and toolchain you'll actually meet on real targets, including the Windows kernel and modern obfuscation patterns.

    Advanced4/5Bruce Dang, Alexandre Gazet, Elias Bachaalany
  11. 11 · 2011

    The IDA Pro Book

    The Unofficial Guide to the World's Most Popular Disassembler

    Chris Eagle's deep manual on IDA Pro, the disassembler that defined a generation of reverse engineering. Useful even with Ghidra in the picture, since most malware-analysis literature still assumes IDA.

    Intermediate4/5Chris Eagle
  12. 12 · 2007

    Techniques virales avancées

    Specialized follow-up to Filiol's Les virus informatiques. Dives into advanced malicious-code attack techniques and their defensive analysis.

    Advanced4/5Éric Filiol
  13. 13 · 2007

    The Shellcoder's Handbook

    Discovering and Exploiting Security Holes

    A foundational text on memory-corruption exploitation across Linux, Windows, Solaris and embedded targets. Pre-modern-mitigations in spirit but still the canonical introduction to the techniques the modern toolchain is built to defeat.

    Advanced4/5Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte
  14. 14 · 2003

    Hacking the Xbox

    An Introduction to Reverse Engineering

    Andrew "bunnie" Huang on the original Xbox: hardware modding as the entry path into reverse engineering, plus a frank account of the legal fight that followed.

    Intermediate4/5Andrew "bunnie" Huang
  15. 15 · 2009

    The Mac Hacker's Handbook

    Charlie Miller and Dino Dai Zovi's 2009 deep dive into the Mac OS X exploit landscape — Mach-O, IPC, sandboxing as it then existed, and the early-Intel-Mac exploitation chains.

    Advanced3/5Charlie Miller, Dino Dai Zovi

Related topics