Reviews of approaches and methods. List of tools. Notes on mastering. Deprotection examples and guides.
Actual programs for reverse and an overview of their capabilities.