1. Welcome
  2. Introduction
  3. Psi Beta Rho
  4. 1. Fall 24
    1. 1.1. Fundamentals
      1. 1.1.1. 1: Intro to Linux
      2. 1.1.2. 2: Forensics
      3. 1.1.3. 3: Open Source Reverse Engineering
      4. 1.1.4. 4: Intro to Web & Client-Side Security
      5. 1.1.5. 5: HTTP Requests
      6. 1.1.6. 6: Introduction to Cryptography
      7. 1.1.7. 7: Modern Cryptography Basics
    2. 1.2. Web
      1. 1.2.1. 1: Intro to Web & Client-Side Security
      2. 1.2.2. 2: HTTP Requests
      3. 1.2.3. 3: Local File Inclusion
      4. 1.2.4. 4: Advanced Local File Inclusion
      5. 1.2.5. 5: XSS
      6. 1.2.6. 6: XSS
      7. 1.2.7. 7: Writeups
    3. 1.3. Crypto
      1. 1.3.1. 1: Intro to cryptography
      2. 1.3.2. 2: Block Ciphers
      3. 1.3.3. 3: Stream & Block Ciphers
      4. 1.3.4. 4: Modular Arithmetic, DHKE
      5. 1.3.5. 5: RSA
      6. 1.3.6. 6: RSA Attacks
      7. 1.3.7. 7: Digital Signatures & Writeups
    4. 1.4. Rev
      1. 1.4.1. 1: Intro to Reverse Engineering
      2. 1.4.2. 2: Assembly
      3. 1.4.3. 3: Assembly Part 2
      4. 1.4.4. 4: GDB
      5. 1.4.5. 5: Decompilers
    5. 1.5. Pwn
      1. 1.5.1. 1: Intro to Pwn
      2. 1.5.2. 2: Return-Oriented Programming
  5. 2. Winter 25
    1. 2.1. Web
      1. 2.1.1. 1: Basic SQL Injection
      2. 2.1.2. 2: Advanced SQL Injection
      3. 2.1.3. 3: LACTF Challenges
      4. 2.1.4. 4: XSS, CSP
    2. 2.2. Crypto
      1. 2.2.1. 1: Intro to Cryptography/Math
      2. 2.2.2. 2: Modular Arithmetic/RSA
      3. 2.2.3. 3: RSA
      4. 2.2.4. 4: Signatures, Symmetric Cryptography
      5. 2.2.5. 5: PRNGs and Writeups
  6. 3. Spring 25
    1. 3.1. Crypto
      1. 3.1.1. 1: Intro to Cryptography
      2. 3.1.2. 2: Symmetric Cryptography
      3. 3.1.3. 3: Advanced Symmetric Cryptography
    2. 3.2. Rev / Pwn
      1. 3.2.1. 1: Intro to Reverse Engineering
      2. 3.2.2. 2-3: Intro to Assembly
      3. 3.2.3. 4: GDB
    3. 3.3. Web
      1. 3.3.1. 1-2: CSS Exfiltration Attack
      2. 3.3.2. 3: JWT
  7. 4. Resources
    1. 4.1. General
    2. 4.2. Cryptography
    3. 4.3. Web Exploitation
    4. 4.4. Reverse Engineering
    5. 4.5. Binary Exploitation
    6. 4.6. Miscellaneous
      1. 4.6.1. Forensics
      2. 4.6.2. OSINT
      3. 4.6.3. Blockchain
  8. 5. Appendix

Psi Beta Rho Wiki

Reverse Engineering

Resources

Introduction to Reverse Engineering: https://0xinfection.github.io/reversing/

Microcorruption

https://microcorruption.com/

Nightmare

https://guyinatuxedo.github.io/index.html

crackmes

https://crackmes.one/

Ghidra Golf

https://ghidra.golf/

Reverse Engineering For Beginners

https://www.begin.re/

Linux syscall table

https://chromium.googlesource.com/chromiumos/docs/+/master/constants/syscalls.md

Tools

Binary Ninja

https://binary.ninja/

Binary Ninja Cloud

https://cloud.binary.ninja/

Ghidra

https://ghidra-sre.org/

gef

https://github.com/hugsy/gef

Articles

https://blog.akenofu.me/security-arch/