protectaccount
Advanced Member
- Joined
- December 27, 2025
- Messages
- 354
- Reaction score
- 288
- Points
- 63
- Thread Author
- #1
Features of this course:
Designed with beginners in mind.
Simple windows and Linux Crackme’s designed to learn reverse engineering legally
Practical and hands-on
Using free tools only
Suitable for:
Reverse Engineering and Malware Analysis Students
Anyone interested to learn to use Cutter for Reverse Engineering
Security researchers
Prerequisite:
Windows PC
Basic Assembly and C/C++ language would be helpful but not mandatory
Familiarity with basic Linux commands would be useful but not mandatory
Everything you need to know is covered in the course
Enroll now and I will see you inside!
Who this course is for:
Anyone interested to learn to use Cutter for Reverse Engineering
Reverse engineering and malware analysis students
Security researchers
What you’ll learn
Reverse Engineering
Assembly Language
Decompiling Binary to C code
Register and Memory Analysis
Disassembling binary to assembly code
Reversing Jumps
Using NOPs to disable instructions
Windows API
C/C++ functions
Static analysis
Dynamic debugging analysis
Setting breakpoints and stepping through code
Strings search
Graphical view analysis
Defining functions from assembly code
Solving crackmes
Reverse debugging (stepping backwards)
Stepping over and analyzing the stack, register and memory hexdumps
Patching and replacing jumps with NOPs
Patching using xor eax, eax
Gui-Crackme: String search method, defining functions and windows API
Phishing for passwords and serial keys
Renaming variables for static analysis
Using the Rizin console and the rax2 command
Linux crackme2: Using the Debuggee Console
Stepping into function calls
and more…
To see this hidden content, you must reply and react with one of the following reactions :
Like