Reverse Engineering Course The Ultimate Training

Sauron

Sauron

Hero Member
Infinity Member
Joined
November 19, 2023
Messages
2,710
Reaction score
40,707
Points
113

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents
  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement

    To see this hidden content, you must reply and react with one of the following reactions : Like Like, Love Love, Wow Wow
 
  • Like
Reactions: CraftePxly, Zikerson, yduhgas and 25 others
A

Anubis

New Member
Joined
January 12, 2024
Messages
2
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
good
 
K

kalilinux

Active Member
Joined
November 19, 2023
Messages
98
Reaction score
10
Points
8

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
woo
 
H

hacker8254

Member
Joined
September 27, 2023
Messages
17
Reaction score
4
Points
3

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
h
 
M

malika

New Member
Joined
January 19, 2024
Messages
3
Reaction score
0
Points
1
thank you for sharing knowledge!
 
N

nirdarolmu

Member
Joined
February 26, 2024
Messages
6
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
 
R

rx0tshw100

Member
Joined
March 3, 2024
Messages
9
Reaction score
1
Points
3
O

oliviaprifti7514

Member
Joined
April 12, 2024
Messages
24
Reaction score
7
Points
3

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]

very nice
 
K

kingbaldwin

Active Member
Joined
January 25, 2024
Messages
80
Reaction score
3
Points
8
B

billi

Member
Joined
April 17, 2024
Messages
19
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]

(y)
 
O

oswald

Member
Joined
April 27, 2024
Messages
22
Reaction score
0
Points
1
M

Mr_4you1

Advanced Member
Joined
April 17, 2024
Messages
160
Reaction score
11
Points
18

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
 
Q

qing

Member
Joined
May 9, 2024
Messages
14
Reaction score
0
Points
1
russme

russme

Member
Joined
May 24, 2024
Messages
11
Reaction score
0
Points
1
good stuff, thanks and hope still alive.
 
ProtonNatsu

ProtonNatsu

New Member
Joined
July 5, 2024
Messages
2
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
Finally a complete course ! Hope I'll be able to take it all :D Tks !
 
mandlend314

mandlend314

Member
Joined
July 19, 2024
Messages
11
Reaction score
3
Points
3
registerdna

registerdna

Advanced Member
Joined
July 29, 2024
Messages
149
Reaction score
27
Points
18

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
 
S

sysMal

New Member
Joined
August 22, 2024
Messages
2
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
thx
 
invertedtriad

invertedtriad

New Member
Joined
September 3, 2024
Messages
2
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
lets see
 
  • Tags
    learn reverse reverse engineering windows
  • Top