Assembly Language Programming for Reverse Engineering - نسخة قابلة للطباعة +- الفريق العربي للهندسة العكسية (https://www.at4re.net/f) +-- قسم : ENGLISH FORUM (https://www.at4re.net/f/forum-6.html) +--- قسم : Tutorials (https://www.at4re.net/f/forum-14.html) +--- الموضوع : Assembly Language Programming for Reverse Engineering (/thread-3827.html) |
Assembly Language Programming for Reverse Engineering - R333T - 16-04-2024 Understand assembly code and modify exe files to add new functionality using x64dbg What you'll learn Assembly Language Basics Reverse Engineering xdbg debugging basics Modifying programs Injecting code into exe files Hollowing out an exe file CPU registers Basic Addition INC, DEC, MUL and DIV instructions Accessing main memory (RAM) The Stack Function Calls Input and Output Functions Code Caves Functions that returns a value The Flags Register Jumps Compare Instructions Structured Programming Signed Operations and more . . . DOWNLOAD Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9 Last updated 3/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Language: English | Duration: 15h 6m | Size: 8.3 GB |