ELF documentation

.ELF is an extension which could either be a .ELF libary or a Nintendo DS extension, maybe same, don’t know.

Commands:
sudo vim filename.elf
sudo apt-get install gcc-multilib
./filename.elf
file
wine
chmod
readelf
gdb
objdump
run
ltrace
strings
strace (-E LD_PRELOAD=./face.so ./filename.elf)
gcc (install gcc-multilib)

Sources:
https://reverseengineering.stackexchange.com/questions/3815/reversing-elf-64-bit-lsb-executable-x86-64-gdb/3816
https://stackoverflow.com/questions/14494957/how-do-i-pass-a-command-line-argument-while-starting-up-gdb-in-linux/14495000
https://stackoverflow.com/questions/5244509/no-debugging-symbols-found-when-using-gdb
http://www.yolinux.com/TUTORIALS/GDB-Commands.html
https://0xax.gitbooks.io/linux-insides/content/Theory/linux-theory-2.html
https://www.google.dk/search?source=hp&ei=6XIOXO_wCIbIsQH43reoDA&q=elf64&btnK=Google-s%C3%B8gning&oq=elf64&gs_l=psy-ab.3..0j0i30l9.468.1681..5965…0.0..0.85.396.5……0….1..gws-wiz…..0..0i131j0i10.-X_Sl4ri6YM
https://stackoverflow.com/questions/40458246/how-do-i-run-an-extensionless-maybe-elf-file-on-ubuntu
https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/
http://dbp-consulting.com/tutorials/debugging/linuxProgramStartup.html
https://0x00sec.org/t/dissecting-and-exploiting-elf-files/7267
http://manoharvanga.com/hackme/
https://anee.me/reversing-an-elf-from-the-ground-up-4fe1ec31db4a
https://medium.com/@jacob16682/reverse-engineering-using-radare2-588775ea38d5
https://github.com/avast-tl/retdec
https://retdec.com/
https://github.com/yellowbyte/reverse-engineering-reference-manual/blob/master/contents/file-formats/ELF_Files.md
http://www.yolinux.com/TUTORIALS/GDB-Commands.html
https://www.google.dk/search?biw=1920&bih=919&ei=UokPXMfpJ4WosgHisJuYDw&q=nanosleep+.elf&oq=nanosleep+.elf&gs_l=psy-ab.3…1481246.1487285..1487696…5.0..0.81.867.17……0….1..gws-
wiz…….0j0i131j0i10j0i19j0i10i19j0i30j0i22i30.yxfkJqp72gk
http://visualgdb.com/gdbreference/commands/disassemble
https://books.google.dk/books?id=yqHVAwAAQBAJ&pg=PA193&lpg=PA193&dq=gdb+function+pust+mov+sub+callq&source=bl&ots=r1KEZsrzFE&sig=iibgFny2D_RxEZzMmRfLOCvzTBs&hl=da&sa=X&ved=2ahUKEwjBk6KpzJffAhXQqIsKHVV7BWwQ6AEwAnoECAMQAQ#v=onepage&q=gdb%20function%20pust%20mov%20sub%20callq&f=false

Other for other things:
https://29a.ch/photo-forensics/