reverse engineering

  1. protectaccount

    Course Reverse Engineering: Cutter for Beginners

    If you are completely new to Cutter and want to get up and running fast then this course is for you. In this course, we will cover how to use Cutter for Windows and Linux. Cutter is an an advanced, GUI-based, free and open-source reverse-engineering platform designed to take the pain out of...
  2. protectaccount

    Course Reverse Engineering and Malware Analysis x64/32: CRMA+ 2022

    Learn Malware Analysis and Reverse Engineering Deeply with CRMA+ 2022 Course. Breaking something down and putting it back together is a process that helps people understand how things were made. A person would be able to redo and reproduce an origami by unfolding it first. Knowing how cars work...
  3. protectaccount

    Course Reverse Engineering: Ghidra For Beginners

    If you have never used Ghidra before and want to learn how get started with using Ghidra to reverse engineer and analyse programs, then this is the course for you. Ghidra is the strong competitor to IDA Pro and is used by NSA itself for Reverse Engineering. And the best thing is that it is...
  4. protectaccount

    Course Reverse Engineering 6: Reversing .NET with dnSpy

    If you are interested in reverse engineering and want to learn how to decompile and debug .NET programs, then this course is for you. In this course, I will introduce you to the exciting world of reversing and in particular, reverse engineering .NET programs. In this course, you will learn how...
  5. protectaccount

    Course Reverse Engineering 2: Windows GUI Programs

    In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be...
  6. protectaccount

    Course Reverse Engineering 1: x64dbg Debugger for Beginners

    If you had always wanted to learn how use x64dbg to reverse engineer and debug software, then this is the course for you. x64dbg is one of the most popular modern debugger in use today and has superseded OllyDbg. It is used for Reverse Engineering, Malware Analysis and Software Debugging. In...
  7. protectaccount

    Course Reverse Engineering 4: Software Protection

    If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to...
  8. protectaccount

    Course Reverse Engineering 3: x64dbg Graphical Static Analysis

    If you had always wanted to learn how to reverse engineer a program and understand how it works from the inside out, then this is the course for you. Except for IDA Pro, many other debuggers out there are not capable of performing graphical representation of a disassembled software. x64dbg...
  9. REDEYE

    [REVERSE ENGINEERING] X2X WORKSHOP #1 (WAYS OF UNPACKING .NET APPS)

    Hidden content
  10. REDEYE

    ✨CRACKING SOFTWARE WITH REVERSE ENGINEERING ✨

    Hidden content
  11. REDEYE

    (GUIDE)REVERSE ENGINEERING FOR EVERYONE

    Reverse Engineering For Everyone You can learn about reverse engineering. enjoy Hidden content
  12. REDEYE

    .NET REVERSING [BEGINNER REFERENCES]

    Hidden content
  13. Code0

    SNAPCHAT WEB TOKEN REVERSE LEAKED

    Hidden content Enjoy Reversed it a bit ago stripped out some work so skids can't make cracker off the bat
  14. Code0

    ✨ REVERSE TOOL KIT ✨

    Reverse Tool kit Reverse Engineer's Toolkit Download: Hidden content
  15. SudoDragon

    ⚡LEARN REVERSE ENGINEERING⚡ ☄️HQ COURSE LEAKED☄️

    Hidden content
  16. SudoDragon

    REVERSE ENGINEERING FULL COURSE

    Hidden content
  17. SudoDragon

    REVERSE ENGINEERING FOR BEGINNERS

    A reverse engineering guide for complete beginners. What it covers: - What is reverse engineering(basic theory) - Static & Dynamic analysis - Decompilation & when you should use it Hidden content
  18. SudoDragon

    WHATSAPP WEB REVERSE ENGINEERED

    This project intends to provide a complete description and re-implementation of the WhatsApp Web API, which will eventually lead to a custom client. WhatsApp Web internally works using WebSockets; this project does as well. Hidden content
  19. SudoDragon

    TUTORIAL: REVERSE ENGINEERING WEBSITE PRIVATE API (ALSO WORKS FOR APPS)

    In this small tutorial you'll learn how to: access data that isn't displayed on the front-end - can be used for OSINT purposes Also works on https-encrypted requests If you have access to another computer on your network you can use this tutorial to monitor traffic Required knowledge: know...
  20. SUB-ZER0

    DECOMPILE .NET/.EXE PROGRAMS

    Hidden content
  21. SUB-ZER0

    ANDROID REVERSE ENGINEERING

    Reverse engineering, Malware and goodware analysis of Android applications and more. Hidden content
  22. SUB-ZER0

    [RE. PYTHON] OPEN SOURCE,TOOL FOR PYTHON REVERSE ENGINEERING

    What is de4py? . This project is maintained by Fadi002 and AdvDebug. Features Deobfuscation: de4py supports popular obfuscators like Jawbreaker, BlankOBF, PlusOBF, Wodx, Hyperion, and pyobfuscate.com obfuscator. Pycode Execution: Execute your Python code within the process, enabling you to...
  23. SudoDragon

    - ⭐ - PRACTICE REVERSE ENGINEERING AND BINARY EXPLOITATION - ⭐ -

    - ⭐ - PRACTICE REVERSE ENGINEERING AND BINARY EXPLOITATION - ⭐ - Hidden content
  24. SudoDragon

    HOW TO HACK THE HACKER / REVERSE ENGINEERING

    If you feel like you have been a victim who has been hacked, I am going to tell you exactly how to check if you have any rats, viruses, trojans, ransomware, etc. In this tutorial you will learn how to check if you have been hacked, or have spyware on your device, how to remove it and find out...
  25. SudoDragon

    [VIDEO TUTORIAL] COMPLETE GHIDRA TUTORIAL - BEGINNER TO ADVANCE - 2025

    Hidden content
  26. NinjaNet

    SRE Framework + Source Code

    Github link Hidden content
  27. Nightmare

    Reversing: Secrets of Reverse Engineering

    Hidden content
  28. Nightmare

    Malware Analysis and Reverse Engineering

    Hidden content
  29. Nightmare

    A collection of resources for linux reverse engineering

    Hidden content
  30. Nightmare

    Awesome Reversing ~ Collection of reverese engineering & hacking resourses

    Awesome Reversing ~ Collection of reverese engineering & hacking resourses https://github.com/vitalysim/Awesome-Hacking-Resources
  31. RX19

    [RX19] 🌟 Reverse Engineering Resources About All Platforms 🌟 2025 NEW

    Hidden content
  32. Nightmare

    Awesome Hacking Resources and Reverese engineering Websites

    Awesome Hacking Resources A collection of hacking / penetration testing resources to make you better! Let's make it the biggest resource repository for our community. Learning the Skills Name Description CS 642: Intro to Computer Security academic content, full semester course, includes...
  33. Nightmare

    13 GB PRATICALS CRACKING LESSONS - PATCHING SOFTWARE BASICS

    PRATICALS CRACKING LESSONS - PATCHING SOFTWARE BASICS Hidden content
  34. iMaredd

    RED GATE SMARTASSEMBLY | OBFUSCATION | FUD | SOFTWARE ASSEMBLY | REVERSE ENGINEERING

    Hidden content
  35. RX19

    ⭐ [NEW] ⭐ Reverse Engineering For Free now 2024 ⭐

    Hidden content
  36. RX19

    ⭐ [NEW] ⭐ Reverse Engineering Resources 2024 ⭐ RX | SVR

    Hidden content
  37. Sauron

    Reverse Engineering Windows Applications [ru]

    Reverse engineering is considered one of the most complex areas in information security (IS). In the book, the author offers to lift the veil of secrecy over this topic and, using practical examples, consider how applications work under Windows OS, as well as understand how to exploit buffer...
  38. Sauron

    REVERSE ENGINEERING AND EXPLOIT DEVELOPMENT

    Hidden content
  39. Sauron

    Rootkits and bootkits. Reverse Engineering Malware and Next Generation Threats [RU]

    Rootkits and bootkits. Reverse Engineering Malware and Next Generation Threats [RU] : This book is dedicated to the detection, analysis and reverse engineering of malware. The first part describes examples of rootkits that show how an attacker sees the operating system from the inside and...
  40. Sauron

    Mobile App Reverse Engineering

    Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world’s evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to...
  41. Sauron

    Blue Fox: Arm Assembly Internals and Reverse Engineering

    Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including...
  42. ASMODEUS

    Reverse Engineering 3: x64dbg Graphical Static Analysis

    If you had always wanted to learn how to reverse engineer a program and understand how it works from the inside out, then this is the course for you. Except for IDA Pro, many other debuggers out there are not capable of performing graphical representation of a disassembled software. x64dbg...
  43. ASMODEUS

    Reverse Engineering 4: Software Protection

    Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to...
  44. Sauron

    Reverse Engineering 4 - Software Protection

    Hidden content
  45. Sauron

    Reverse Engineering Tutorials

    What is Reverse Engineering? Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia So here we go: Tutorials...
  46. Mr.Robot

    (GUIDE)REVERSE ENGINEERING FOR EVERYONE

    Reverse Engineering For Everyone You can learn about reverse engineering. enjoy Hidden content
  47. Sauron

    Reverse Engineering Course The Ultimate Training

    What We’ll Do/Learn: This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations...
  48. Sauron

    Reverse Engineering For Beginners With Resources

    Hidden content
  49. Sauron

    Learn Reverse Engineering With Android Malware Analysis

    What you’ll learn Learn how Android applications are developed Learn how to reverse engineer Android applications and malware Learn how to extract applications and malware from a running device Gain access to premium cheat sheets, study guides, and books Develop your skills with challenges that...
Top