Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Reverse Engineering 2: Windows GUI Programs

    Posted By: Sigha
    Reverse Engineering 2: Windows GUI Programs

    Reverse Engineering 2: Windows GUI Programs
    Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 3 GB
    Genre: eLearning Video | Duration: 40 lectures (4 hour, 2 mins) | Language: English

    Reverse engineer Windows Graphical User Interface programs with xdbg


    What you'll learn

    Disassemble windows programs
    Reversing jumps
    Patching
    Debugging windows programs
    Solving crackme's
    NOP instructions
    Modifying EAX register values
    Setting Hardware Breakpoints
    Memory Patching
    Intermodular Call Method
    Call Stack Method
    Understand how Trial Period works
    Understand how Software Registration process works
    Remove Nag Screens

    Requirements

    Preferably have Completed Reverse Engineering 1: x64dbg Debugger for Beginners, or already know how to use x64dbg
    Windows PC

    Description

    In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme's that I have written for you to practice reversing.

    What you will learn:

    How to disassemble programs into assembly code

    Dynamic Analysis

    Setting breakpoints and stepping through code

    Modify program behaviour

    Patching programs

    Intermodular Call Method

    Call Stack Method

    Hardware Breakpoints

    Memory Patching

    Patching EAX register values

    Understanding Trial Period software

    Understanding Software Registration process

    Thank you and see you inside.

    Who this course is for:

    Computing students who want to learn how to disassemble and debug windows programs
    Anyone who is interested in reverse engineering
    Programmers who want to know how to fix bugs in programs without the source code

    Reverse Engineering 2: Windows GUI Programs


    For More Courses Visit & Bookmark Your Preferred Language Blog
    From Here: English - Français - Italiano - Deutsch - Español - Português - Polski - Türkçe - Русский


    Download Links