Reverse engineering and game hacking resources

November 9, 2022

Here are some awesome resources to better understand what this is all about:

Ricardo Narvaja and Daniel Kazimirow’s course on reversing Windows binaries for beginners.

Game hacking tutorials from Game Hacking Academy.

LiveOverflow’s playlist on reverse engineering and exploitation of Linux binaries.

– Exploit writing guide and excercises by Fundación Sadosky.

CS6265: Information Security Lab reversing tutorials by Georgia Tech Systems Software & Security Lab.

pwn.college open computer security course from Arizona State University.

Nightmare‘s intro to binary exploitation based around CTF challenges.

Game Hacking Academy

Happy hacking and keep on learning!

Continue Reading

The latest handpicked blog articles

NIST’s changes to the NVD highlight a bigger challenge for security teams: vulnerability management can no longer depend only on centralized data feeds. Teams need context, prioritization, and continuous validation

April 29, 2026

In this Faraday webinar, we explore how to move from a traditional vulnerability management approach to a continuous security monitoring model by combining automation, artificial intelligence, and open-source tools.

April 17, 2026

This release delivers on long-standing client requests and reinforces our mission to make vulnerability management simpler, more transparent, and more actionable.With this new version, we’re giving security teams greater traceability

March 20, 2026

Stay Informed, Subscribe to Our Newsletter

Enter your email and never miss timely alerts and security guidance from the experts at Faraday.

Faraday provides a smarter way for Large Enterprises, MSSPs, and Application Security Teams to get more from their existing security ecosystem.

Headquarters

Research Lab & Dev

Solutions

Open Source

© 2025 Faraday Security. All rights reserved.
Terms and Conditions | Privacy Policy