OSCE Study Plan (https://www.abatchy.com/2017/03/osce-study-plan)
https://repo.zenk-security.com/Reversing%20.%20cracking/Practical%20Reverse%20Engineering.pdf
http://www.c-jump.com/CIS77/ASM/Instructions/
https://www.cs.virginia.edu/~evans/cs216/guides/x86.html
https://www.aldeid.com/wiki/X86-assembly/Instructions/jnz
http://www.ee.hacettepe.edu.tr/~alkar/EE212/w3[2006].pdf
http://docs.neu.edu.tr/staff/jamal.fathi/mikrodenetleyici_9.pdf
http://web.karabuk.edu.tr/emelkocak/indir/MTM305/Kontrol_Komutları.pdf
http://eng.harran.edu.tr/~nbesli/RBT/helptr.htm
Tools:
Immunity Debugger or OllyDbg
LordPE or PE explorer
XVI32
https://dl.packetstormsecurity.net/papers/bypass/bypassing-av.pdf
https://captmeelo.com/exploitdev/osceprep/2018/07/16/backdoor101-part1.html
https://captmeelo.com/exploitdev/osceprep/2018/07/21/backdoor101-part2.html
https://blog.kowalczyk.info/articles/pefileformat.html
https://pentest.blog/art-of-anti-detection-1-introduction-to-av-detection-techniques/
https://pentest.blog/art-of-anti-detection-2-pe-backdoor-manufacturing/
https://sector876.blogspot.com/2013/03/backdooring-pe-files-part-1.html
https://www.fuzzysecurity.com/tutorials/expDev/4.html
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
https://deceiveyour.team/2018/10/15/vulnserver-kstet-ws2_32-recv-function-re-use/