Practical Binary Analysis

Practical Binary Analysis covers all major binary analysis topics in an accessible way, from binary formats, disassembly, and basic analysis to advanced techniques like binary instrumentation, taint analysis, and symbolic execution. Order a hardcopy or ebook online at Amazon or directly from No Starch Press.

Cover of Practical Binary Analysis. Table of contents.

Virtual Machine

The book comes with a virtual machine that contains all the examples and software. You can download it from this torrent. The username and password for the VM are both “binary”. To use the VM you'll need VirtualBox. You can also download just the example code.


  • Virtual machine with all code samples and software (username/password “binary”) Magnet link Torrent file
  • Archive with all code samples Archive (.tar.gz)
  • Patch for libdft Patch file
  • Virtual machine (direct download w/ limited bandwidth, please use only if you can't use the torrent) VM (.ova)

Book a Talk, Training or Workshop

To book me for a talk, training or workshop on binary or malware analysis, contact me at 52%5D2%3F5C%3A6DD6o76H%5DGF%5D%3F%3Dda.andriesse‹ατ›

PGP key

Here's my [PGP key].

PGP key fingerprint

A82C A27D 4A27 CF84 7C23
BC58 BAD7 CA8E F693 94DD

Author Bio

Dennis Andriesse has a Ph.D. in system and network security and uses binary analysis daily in his research. He is one of the main contributors to PathArmor, a Control-Flow Integrity system which defends against control-flow hijacking attacks such as ROP. Some of his research on binary analysis has been integrated into Binary Ninja. Andriesse was also one of the attack developers involved in the takedown of the GameOver Zeus P2P botnet. Find his academic website here.