Reverse engineering and game hacking resources

November 9, 2022

Here are some awesome resources to better understand what this is all about:

Ricardo Narvaja and Daniel Kazimirow’s course on reversing Windows binaries for beginners.

Game hacking tutorials from Game Hacking Academy.

LiveOverflow’s playlist on reverse engineering and exploitation of Linux binaries.

– Exploit writing guide and excercises by Fundación Sadosky.

CS6265: Information Security Lab reversing tutorials by Georgia Tech Systems Software & Security Lab.

pwn.college open computer security course from Arizona State University.

Nightmare‘s intro to binary exploitation based around CTF challenges.

Game Hacking Academy

Happy hacking and keep on learning!

Continue Reading

The latest handpicked blog articles

This release delivers on long-standing client requests and reinforces our mission to make vulnerability management simpler, more transparent, and more actionable.With this new version, we’re giving security teams greater traceability

February 19, 2026

Our security research team actively investigates vulnerabilities in widely used technologies, with a strong focus on network infrastructure and embedded systems. Throughout 2024, our researchers reported multiple security issues affecting

January 8, 2026

Cada año, la Ekoparty nos recuerda por qué amamos lo que hacemos.Nos preparamos con la misma energía de siempre: para reencontrarnos con la comunidad, compartir lo que investigamos, aprender de otros y,

January 6, 2026

Stay Informed, Subscribe to Our Newsletter

Enter your email and never miss timely alerts and security guidance from the experts at Faraday.

Faraday provides a smarter way for Large Enterprises, MSSPs, and Application Security Teams to get more from their existing security ecosystem.

Headquarters

Research Lab & Dev

Solutions

Open Source

© 2025 Faraday Security. All rights reserved.
Terms and Conditions | Privacy Policy