الفريق العربي للهندسة العكسية

نسخة كاملة : x64 Assembly Language and Reverse Engineering Practicals by paul chin
أنت حالياً تتصفح نسخة خفيفة من المنتدى . مشاهدة نسخة كاملة مع جميع الأشكال الجمالية .

R333T

[صورة مرفقة: th_i8agRsUGlHkKKAiZA4Hw0WEt7p7apGoM.jpg]
Last updated 3/2024
Created by Paul Chin
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 105 Lectures ( 12h 52m ) | Size: 9.99 GB



 
Download from free file storage
NITROFLARE
Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9 Part 10 Part 11
RAPIDGATOR
Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9 Part 10 Part 11

nice

SOURCE: https://sanet.st/blogs/bonnytuts/x_assem...56498.html

R333T

1. Introduction
2. Intro to x64 architecture
3. Your First Program
4. Accessing Memory
5. Add Instructions
6. Partial MOV instructions
7. PUSH and POP instructions
8. MOV Instructions
9. XCHG Instructions
10. INC, DEC, NEG, ADD and SUB
11. Register Flags
12. Bitwise Logical Operations
13. Jump Instructions
14. Memory Arrays
15. MUL and DIV instructions
16. Creating Functions
17. Practicals on Reverse Engineering
18. Phishing for Passwords
19. How to reverse a jump and patch the file
20. The Comment Tracing method
21. Patch exe to change password
22. GUI Crackme Techniques
23. Deep Tracing Username and Password
24. Tracing EAX values and Stepping into Calls
25. Get the password
26. Loop Tracing Long Passwords
27. Loop Tracing GUI Crackme
28. Comment Tracking Techniques
29. How to Create Keygens
30. How to Create Keygens even though no Error MessageBox is shown
31. Fast Tracing by Toggling ZF flag
32. Removing Recurrent Nags and Defeating Anti-Debugger Protection
33. Self-Keygen Using Data Segment with printf Function
34. Tracing length of secret code and analyzing x64 Fastcall Parameters
35. Bypassing Encryption
36. Bypass UPX protection
37. Resources For Further Study