filmov
tv
Day 13 - Reverse Engineering (Prompt + Additonal Resources)

Показать описание
The Prompt
"Being a finest reverse engineer is tough. Could you help me please by creating a complete roadmap from scratch to get started in learning and applying reverse engineer skills from scratch. Also, create me a list of general as well as top level of challenges found during reverse engineering assessments that will help me. After this, share me top resources to grow more as a reverse engineer in cybersecurity from scratch and tabulate the findings. The table should have a complete list of resources (paid as well as open source) for skill-up as a reverse engineer in cybersecurity. This table should also have column of how much time is needed to learn reverse engineering. After this, create third table where companies are hiring for reverse engineers consultants in cybersecurity. Create another table of all tools and techniques used in reverse engineer in cybersecurity. Conclude the table with reverse engineering in SDLC. Make sure, that you generate all the resources, and there is no word limit constraints"
Additional Resources
1. Reverse Engineering gitbooks
2. Reverse Engineering Topics
3. Beginner's Guide to Reverse Engineering
4. Reverse Engineering with Ghidra
5. Reverse Engineering Tools
Hope this helps all. Peace ✌️
"Being a finest reverse engineer is tough. Could you help me please by creating a complete roadmap from scratch to get started in learning and applying reverse engineer skills from scratch. Also, create me a list of general as well as top level of challenges found during reverse engineering assessments that will help me. After this, share me top resources to grow more as a reverse engineer in cybersecurity from scratch and tabulate the findings. The table should have a complete list of resources (paid as well as open source) for skill-up as a reverse engineer in cybersecurity. This table should also have column of how much time is needed to learn reverse engineering. After this, create third table where companies are hiring for reverse engineers consultants in cybersecurity. Create another table of all tools and techniques used in reverse engineer in cybersecurity. Conclude the table with reverse engineering in SDLC. Make sure, that you generate all the resources, and there is no word limit constraints"
Additional Resources
1. Reverse Engineering gitbooks
2. Reverse Engineering Topics
3. Beginner's Guide to Reverse Engineering
4. Reverse Engineering with Ghidra
5. Reverse Engineering Tools
Hope this helps all. Peace ✌️