Our great sponsors
-
ghidra-scripts
A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
As for reading these the Assembly of already compiled programs, you absolutely can! Debuggers like GDB can be used to look at the Assembly of an executable. To take it a step further, there are some tools that can almost fully revert a compiled executable back to its original code, like C/C++. GHIDRA is a reverse engineering tool developed by the NSA to do exactly that; take a conpiled executable and revert it back to its orginal code. (Did i mention that ITS FREE https://ghidra-sre.org/). It does depend on the file structure and what language was used, but Ghidra is a good for C/C++, Dotpeek is a decompiler for .NET/C# and JD-GUI is a decompiler for Java. Each language handles compilation and execution differently.
Something not yet mentioned (and which I haven't tried myself) which may be of interest it cosmopolitan