===Digital Education===
Tools Resources for reverse engineering closed-source software to identify bugs, debug, and resources necessary to succeed in an increasingly digital worldconduct penetration testing.
====Reverse engineering====
=====Assembly reference / manuals=====
======x86======
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).
======x86 and amd64======
::[https://www.felixcloutier.com/x86/ x86 and amd64 instruction reference] - Derived from the December 2023 version of the Intel® 64 and IA-32 Architectures Software Developer's Manual.
=====Bytecode reference=====
::[http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html Pallergabor] - Dalvik opcodes documentation with examples.
======Common Language Runtime (CLR) .NET======
::[https://en.wikipedia.org/wiki/List_of_CIL_instructions Wikipedia] - List of CIL instructions.
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).
====800 MHz AMPS Documentation====
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.