good
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
woogood
woo
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
h
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
Finally a complete course ! Hope I'll be able to take it all :D Tks !
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
thx
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
lets see
What We’ll Do/Learn:This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
About This CourseReversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.
Table Of Contents
Documentation DOC Plan TODO Files Needed Files Needed Chapter 6 - DLL Chapter WIP - MalwareChapter 1 - Introduction
1.0 Introduction 1.1 HowTo 1.2 SetupChapter 2 - BinaryBasics
2.0 BinaryBasics 2.1 NumberSystems 2.2 ASCII 2.3 BitsAndBytes 2.4 ProgrammingLanguages 2.5 Bitwise Operations 2.6 MindsetChapter 3 - Assembly
3.0 Assembly 3.1 Registers 3.2 MemoryLayout 3.3 Instructions 3.4 Flags 3.5 CallingConventions 3.6 FinalNotesChapter 4 - Tools
4.0 Tools 4.1 ToolTypes 4.2 Debugging 4.3 ToolGuidesChapter 5 - Basic Reversing
5.0 BasicReversing 5.1 BeforeWeBegin 5.2 FunctionCall 5.3 HelloWorld 5.4 LoopsChapter 6 - DLL
6.00 DLL 6.01 BeforeWeBegin 6.02 DLLBasics 6.03 Exports 6.04 SayHello 6.05 PrintArray 6.06 InitializePlayer 6.07 PrintPlayerStats 6.08 MysteryFunc 6.09 ImplementingPlayer 6.10 FinalNotesChapter 7 - Windows - WIP
7.0 Windows 7.1 Virtual Memory 7.2 Privileges 7.3 Architecture - WIPChapter 8 - Generic Table - WIP
8.00 Generic Table 8.01 InitializeTable 8.02 NumberGenericTableElements.md 8.03 IsGenericTableEmpty.md 8.04 GetElement
[Hidden content]
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?