03-04-2024, 04:47 PM
1. Introduction
2. Intro to x64 architecture
3. Your First Program
4. Accessing Memory
5. Add Instructions
6. Partial MOV instructions
7. PUSH and POP instructions
8. MOV Instructions
9. XCHG Instructions
10. INC, DEC, NEG, ADD and SUB
11. Register Flags
12. Bitwise Logical Operations
13. Jump Instructions
14. Memory Arrays
15. MUL and DIV instructions
16. Creating Functions
17. Practicals on Reverse Engineering
18. Phishing for Passwords
19. How to reverse a jump and patch the file
20. The Comment Tracing method
21. Patch exe to change password
22. GUI Crackme Techniques
23. Deep Tracing Username and Password
24. Tracing EAX values and Stepping into Calls
25. Get the password
26. Loop Tracing Long Passwords
27. Loop Tracing GUI Crackme
28. Comment Tracking Techniques
29. How to Create Keygens
30. How to Create Keygens even though no Error MessageBox is shown
31. Fast Tracing by Toggling ZF flag
32. Removing Recurrent Nags and Defeating Anti-Debugger Protection
33. Self-Keygen Using Data Segment with printf Function
34. Tracing length of secret code and analyzing x64 Fastcall Parameters
35. Bypassing Encryption
36. Bypass UPX protection
37. Resources For Further Study
2. Intro to x64 architecture
3. Your First Program
4. Accessing Memory
5. Add Instructions
6. Partial MOV instructions
7. PUSH and POP instructions
8. MOV Instructions
9. XCHG Instructions
10. INC, DEC, NEG, ADD and SUB
11. Register Flags
12. Bitwise Logical Operations
13. Jump Instructions
14. Memory Arrays
15. MUL and DIV instructions
16. Creating Functions
17. Practicals on Reverse Engineering
18. Phishing for Passwords
19. How to reverse a jump and patch the file
20. The Comment Tracing method
21. Patch exe to change password
22. GUI Crackme Techniques
23. Deep Tracing Username and Password
24. Tracing EAX values and Stepping into Calls
25. Get the password
26. Loop Tracing Long Passwords
27. Loop Tracing GUI Crackme
28. Comment Tracking Techniques
29. How to Create Keygens
30. How to Create Keygens even though no Error MessageBox is shown
31. Fast Tracing by Toggling ZF flag
32. Removing Recurrent Nags and Defeating Anti-Debugger Protection
33. Self-Keygen Using Data Segment with printf Function
34. Tracing length of secret code and analyzing x64 Fastcall Parameters
35. Bypassing Encryption
36. Bypass UPX protection
37. Resources For Further Study