x64 Assembly Language and Reverse Engineering Practicals by paul chin - نسخة قابلة للطباعة +- الفريق العربي للهندسة العكسية (https://www.at4re.net/f) +-- قسم : ENGLISH FORUM (https://www.at4re.net/f/forum-6.html) +--- قسم : General Discussion (https://www.at4re.net/f/forum-13.html) +--- الموضوع : x64 Assembly Language and Reverse Engineering Practicals by paul chin (/thread-3799.html) |
x64 Assembly Language and Reverse Engineering Practicals by paul chin - R333T - 29-03-2024 Last updated 3/2024 Created by Paul Chin MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 105 Lectures ( 12h 52m ) | Size: 9.99 GB Download from free file storage NITROFLARE Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9 Part 10 Part 11 RAPIDGATOR Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9 Part 10 Part 11 SOURCE: https://sanet.st/blogs/bonnytuts/x_assembly_language_and_reverse_engineering_practicals.4756498.html RE: x64 Assembly Language and Reverse Engineering Practicals by paul chin - R333T - 03-04-2024 1. Introduction 2. Intro to x64 architecture 3. Your First Program 4. Accessing Memory 5. Add Instructions 6. Partial MOV instructions 7. PUSH and POP instructions 8. MOV Instructions 9. XCHG Instructions 10. INC, DEC, NEG, ADD and SUB 11. Register Flags 12. Bitwise Logical Operations 13. Jump Instructions 14. Memory Arrays 15. MUL and DIV instructions 16. Creating Functions 17. Practicals on Reverse Engineering 18. Phishing for Passwords 19. How to reverse a jump and patch the file 20. The Comment Tracing method 21. Patch exe to change password 22. GUI Crackme Techniques 23. Deep Tracing Username and Password 24. Tracing EAX values and Stepping into Calls 25. Get the password 26. Loop Tracing Long Passwords 27. Loop Tracing GUI Crackme 28. Comment Tracking Techniques 29. How to Create Keygens 30. How to Create Keygens even though no Error MessageBox is shown 31. Fast Tracing by Toggling ZF flag 32. Removing Recurrent Nags and Defeating Anti-Debugger Protection 33. Self-Keygen Using Data Segment with printf Function 34. Tracing length of secret code and analyzing x64 Fastcall Parameters 35. Bypassing Encryption 36. Bypass UPX protection 37. Resources For Further Study RE: x64 Assembly Language and Reverse Engineering Practicals by paul chin - ashrafonlinenow - 03-04-2024 downloadly.ir part1 part2 part3 part4 part5 |