mytechnotalent/Reverse-Engineering-Tutorial
A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
repo name | mytechnotalent/Reverse-Engineering-Tutorial |
repo link | https://github.com/mytechnotalent/Reverse-Engineering-Tutorial |
homepage | |
language | C++ |
size (curr.) | 2408 kB |
stars (curr.) | 1090 |
created | 2020-02-14 |
license | Apache License 2.0 |
Reverse Engineering Tutorial
A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
PROMOTIONAL VIDEO - WATCH NOW HERE ON YOUTUBE
Lesson 1: Assembly Language - Basic Malware Reverse Engineering (Part 1: Goals)
This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language.
-> Click HERE to read the article on LinkedIn.
Lesson 2: Assembly Language - Basic Malware Reverse Engineering (Part 2: Techniques)
This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis.
-> Click HERE to read the article on LinkedIn.
Lesson 3: Assembly Language - Basic Malware Reverse Engineering (Part 3: Types Of Malware)
This tutorial will address the basic forms of malware and how they work in simple terms.
-> Click HERE to read the article on LinkedIn.
Lesson 4: Assembly Language - Basic Malware Reverse Engineering (Part 4: x86 Assembly Intro)
This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors.
-> Click HERE to read the article on LinkedIn.
Lesson 5: Assembly Language - Basic Malware Reverse Engineering (Part 5: Binary Number System)
This tutorial will address the very basics of the binary number system.
-> Click HERE to read the article on LinkedIn.
Lesson 6: Assembly Language - Basic Malware Reverse Engineering (Part 6: Hexadecimal Number System)
This tutorial will address the very basics of the hexadecimal number system.
-> Click HERE to read the article on LinkedIn.
Lesson 7: Assembly Language - Basic Malware Reverse Engineering (Part 7: Transistors And Memory)
This tutorial will address the basics of transistors and memory.
-> Click HERE to read the article on LinkedIn.
Lesson 8: Assembly Language - Basic Malware Reverse Engineering (Part 8 - Bytes, Words, Double Words, etc…)
This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions.
-> Click HERE to read the article on LinkedIn.
Lesson 9: Assembly Language - Basic Malware Reverse Engineering (Part 9: x86 Basic Architecture)
This tutorial will address the basic architecture of an x86 processor.
-> Click HERE to read the article on LinkedIn.
Lesson 10: Assembly Language - Basic Malware Reverse Engineering (Part 10: General-purpose Registers)
This tutorial will address the general purpose x86 registers.
-> Click HERE to read the article on LinkedIn.
Lesson 11: Assembly Language - Basic Malware Reverse Engineering (Part 11: Segment Registers)
This tutorial will address the x86 segment registers.
-> Click HERE to read the article on LinkedIn.
Lesson 12: Assembly Language - Basic Malware Reverse Engineering (Part 12: Instruction Pointer Register)
This tutorial will address the x86 instruction pointer register.
-> Click HERE to read the article on LinkedIn.
Lesson 13: Assembly Language - Basic Malware Reverse Engineering (Part 13: Control Registers)
This tutorial will address the x86 control registers.
-> Click HERE to read the article on LinkedIn.
Lesson 14: Assembly Language - Basic Malware Reverse Engineering (Part 14: Flags)
This tutorial will address the status, control and systems flags.
-> Click HERE to read the article on LinkedIn.
Lesson 15: Assembly Language - Basic Malware Reverse Engineering (Part 15: Stack)
This tutorial will address the stack.
-> Click HERE to read the article on LinkedIn.
Lesson 16: Assembly Language - Basic Malware Reverse Engineering (Part 16: Heap)
This tutorial will address the heap.
-> Click HERE to read the article on LinkedIn.
Lesson 17: Assembly Language - Basic Malware Reverse Engineering (Part 17 – How To Install Linux)
This tutorial will address how to install Ubuntu Linux on both Windows and MAC.
-> Click HERE to read the article on LinkedIn.
Lesson 18: Assembly Language - Basic Malware Reverse Engineering (Part 18 - vim Text Editor)
This tutorial will address how to install the vim text editor.
-> Click HERE to read the article on LinkedIn.
Lesson 19: Assembly Language - Basic Malware Reverse Engineering (Part 19 - Why Learn Assembly)
This tutorial will address the age old question of why to bother understanding the basics of Assembly Language.
-> Click HERE to read the article on LinkedIn.
Lesson 20: Assembly Language - Basic Malware Reverse Engineering (Part 20 - Instruction Code Handling)
This tutorial will address op codes and instruction code handling.
-> Click HERE to read the article on LinkedIn.
Lesson 21: Assembly Language - Basic Malware Reverse Engineering (Part 21 - How To Compile A Program)
This tutorial will address how to compile a basic x86 Assembly Program.
-> Click HERE to read the article on LinkedIn.
Lesson 22: Assembly Language - Basic Malware Reverse Engineering (Part 22 - ASM Program 1 [Moving Immediate Data])
This tutorial will address how to create our first real Assembly Program by moving immediate data.
-> Click HERE to read the article on LinkedIn.
Lesson 23: Assembly Language - Basic Malware Reverse Engineering (Part 23 - ASM Debugging 1 [Moving Immediate Data])
This tutorial will address how to debug our first real Assembly Program by moving immediate data.
-> Click HERE to read the article on LinkedIn.
Lesson 24: Assembly Language - Basic Malware Reverse Engineering (Part 24 - ASM Hacking 1 [Moving Immediate Data])
This tutorial will address how to hack our first real Assembly Program by moving immediate data.
-> Click HERE to read the article on LinkedIn.
Lesson 25: Assembly Language - Basic Malware Reverse Engineering (Part 25 - ASM Program 2 [Moving Data Between Registers])
This tutorial will address how to create our second real Assembly Program by moving between registers.
-> Click HERE to read the article on LinkedIn.
Lesson 26: Assembly Language - Basic Malware Reverse Engineering (Part 26 - ASM Debugging 2 [Moving Data Between Registers])
This tutorial will address how to debug our second real Assembly Program by moving between registers.
-> Click HERE to read the article on LinkedIn.
Lesson 27: Assembly Language - Basic Malware Reverse Engineering (Part 27 - ASM Hacking 2 [Moving Data Between Registers])
This tutorial will address how to hack our second real Assembly Program by moving between registers.
-> Click HERE to read the article on LinkedIn.
Lesson 28: Assembly Language - Basic Malware Reverse Engineering (Part 28 - ASM Program 3 [Moving Data Between Memory And Registers])
This tutorial will address how to create our third real Assembly Program by moving between memory and registers
-> Click HERE to read the article on LinkedIn.
Lesson 29: Assembly Language - Basic Malware Reverse Engineering (Part 29 - ASM Debugging 3 [Moving Data Between Memory And Registers])
This tutorial will address how to debug our third real Assembly Program by moving between memory and registers.
-> Click HERE to read the article on LinkedIn.
Lesson 30: Assembly Language - Basic Malware Reverse Engineering (Part 30 - ASM Hacking 3 [Moving Data Between Memory And Registers])
This tutorial will address how to hack our third real Assembly Program by moving between memory and registers.
-> Click HERE to read the article on LinkedIn.
Lesson 31: Assembly Language - Basic Malware Reverse Engineering (Part 31 - ASM Program 4 [Moving Data Between Registers And Memory])
This tutorial will address how to create our fourth real Assembly Program by moving between registers and memory.
-> Click HERE to read the article on LinkedIn.
Lesson 32: Assembly Language - Basic Malware Reverse Engineering (Part 32 - ASM Debugging 4 [Moving Data Between Registers And Memory])
This tutorial will address how to debug our fourth real Assembly Program by moving between registers and memory.
-> Click HERE to read the article on LinkedIn.
Lesson 33: Assembly Language - Basic Malware Reverse Engineering (Part 33 - ASM Hacking 4 [Moving Data Between Registers And Memory])
This tutorial will address how to hack our fourth real Assembly Program by moving between registers and memory.
-> Click HERE to read the article on LinkedIn.
Lesson 34: Assembly Language - Basic Malware Reverse Engineering (Part 34 - ASM Program 5 [Indirect Addressing With Registers])
This tutorial will address how to create our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE to read the article on LinkedIn.
Lesson 35: Assembly Language - Basic Malware Reverse Engineering (Part 35 - ASM Debugging 5 [Indirect Addressing With Registers])
This tutorial will address how to debug our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE to read the article on LinkedIn.
Lesson 36: Assembly Language - Basic Malware Reverse Engineering (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers])
This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE to read the article on LinkedIn.
Lesson 37: Assembly Language - Basic Malware Reverse Engineering (Part 37 - ASM Program 6 [CMOV Instructions])
This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.
-> Click HERE to read the article on LinkedIn.
Lesson 38: Assembly Language - Basic Malware Reverse Engineering (Part 38 - ASM Debugging 6 [CMOV Instructions])
This tutorial will address how to debug our sixth real Assembly Program with CMOV instructions.
-> Click HERE to read the article on LinkedIn.
Lesson 39: Assembly Language - Basic Malware Reverse Engineering (Part 39 - ASM Hacking 6 [CMOV Instructions])
This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.
-> Click HERE to read the article on LinkedIn.
Lesson 40: Assembly Language - Basic Malware Reverse Engineering (Part 40 - Conclusion)
This tutorial will conclude this x86 tutorial.
-> Click HERE to read the article on LinkedIn.
Lesson 41: ARM Assembly (Part 1 – The Meaning Of Life)
This tutorial will introduce our ARM Assembly tutorial series.
-> Click HERE to read the article on LinkedIn.
Lesson 42: ARM Assembly (Part 2 - Number Systems)
This tutorial will discuss number systems such as binary, decimal and hexadecimal in detail.
-> Click HERE to read the article on LinkedIn.
Lesson 43: ARM Assembly (Part 3 - Binary Addition)
This tutorial will discuss binary addition.
-> Click HERE to read the article on LinkedIn.
Lesson 44: ARM Assembly (Part 4 - Binary Subtraction)
This tutorial will discuss binary subtraction.
-> Click HERE to read the article on LinkedIn.
Lesson 45: ARM Assembly (Part 5 - Word Lengths)
This tutorial will discuss word lengths.
-> Click HERE to read the article on LinkedIn.
Lesson 46: ARM Assembly (Part 6 - Registers)
This tutorial will discuss registers.
-> Click HERE to read the article on LinkedIn.
Lesson 47: ARM Assembly (Part 7 - Program Counter)
This tutorial will discuss the program counter.
-> Click HERE to read the article on LinkedIn.
Lesson 48: ARM Assembly (Part 8 - CPSR)
This tutorial will discuss the CPSR.
-> Click HERE to read the article on LinkedIn.
Lesson 49: ARM Assembly (Part 9 - Link Register)
This tutorial will discuss the Link Register.
-> Click HERE to read the article on LinkedIn.
Lesson 50: ARM Assembly (Part 10 - Stack Pointer)
This tutorial will discuss the Stack Pointer.
-> Click HERE to read the article on LinkedIn.
Lesson 51: ARM Assembly (Part 11 - ARM Firmware Boot Procedures)
This tutorial will discuss ARM Firmware Boot Procedures.
-> Click HERE to read the article on LinkedIn.
Lesson 52: ARM Assembly (Part 12 - Von Neumann Architecture)
This tutorial will discuss Von Neumann Architecture.
-> Click HERE to read the article on LinkedIn.
Lesson 53: ARM Assembly (Part 13 - Instruction Pipeline)
This tutorial will discuss the instruction pipeline.
-> Click HERE to read the article on LinkedIn.
Lesson 54: ARM Assembly (Part 14 - ADD)
This tutorial will discuss the add instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 55: ARM Assembly (Part 15 - Debugging ADD)
This tutorial will discuss debugging the add instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 56: ARM Assembly (Part 16 - Hacking ADD)
This tutorial will discuss hacking the add instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 57: ARM Assembly (Part 17 - ADDS)
This tutorial will discuss the adds instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 58: ARM Assembly (Part 18 – Debugging ADDS)
This tutorial will discuss debugging the adds instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 59: ARM Assembly (Part 19 – Hacking ADDS)
This tutorial will discuss hacking the adds instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 60: ARM Assembly (Part 20 – ADC)
This tutorial will discuss the ADC instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 61: ARM Assembly (Part 21 – Debugging ADC)
This tutorial will discuss debugging the ADC instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 62: ARM Assembly (Part 22 – Hacking ADC)
This tutorial will discuss hacking the ADC instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 63: ARM Assembly (Part 23 – SUB)
This tutorial will discuss the SUB instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 64: ARM Assembly (Part 24 – Debugging SUB)
This tutorial will discuss debugging the SUB instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 65: ARM Assembly (Part 25 – Hacking SUB)
This tutorial will discuss hacking the SUB instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 66: ARM Reverse Engineering (Part 1 – The Meaning Of Life Part 2)
This tutorial will introduce our ARM Reverse Engineering course.
-> Click HERE to read the article on LinkedIn.
Lesson 67: ARM Reverse Engineering (Part 2 – Number Systems)
This tutorial will discuss number systems.
-> Click HERE to read the article on LinkedIn.
Lesson 68: ARM Reverse Engineering (Part 3 – Binary Addition)
This tutorial will discuss binary addition.
-> Click HERE to read the article on LinkedIn.
Lesson 69: ARM Reverse Engineering (Part 4 – Binary Subtraction)
This tutorial will discuss binary subtraction.
-> Click HERE to read the article on LinkedIn.
Lesson 70: ARM Reverse Engineering (Part 5 – Word Lengths)
This tutorial will discuss word lengths.
-> Click HERE to read the article on LinkedIn.
Lesson 71: ARM Reverse Engineering (Part 6 – Registers)
This tutorial will discuss registers.
-> Click HERE to read the article on LinkedIn.
Lesson 72: ARM Reverse Engineering (Part 7 – Program Counter)
This tutorial will discuss program counter.
-> Click HERE to read the article on LinkedIn.
Lesson 73: ARM Reverse Engineering (Part 8 - CPSR)
This tutorial will discuss the CPSR.
-> Click HERE to read the article on LinkedIn.
Lesson 74: ARM Reverse Engineering (Part 9 - Link Register)
This tutorial will discuss the link register.
-> Click HERE to read the article on LinkedIn.
Lesson 75: ARM Reverse Engineering (Part 10 - Stack Pointer)
This tutorial will discuss the stack pointer.
-> Click HERE to read the article on LinkedIn.
Lesson 76: ARM Reverse Engineering (Part 11 - Firmware Boot Procedures)
This tutorial will discuss the firmware boot procedures.
-> Click HERE to read the article on LinkedIn.
Lesson 77: ARM Reverse Engineering (Part 12 - Von Neumann Architecture)
This tutorial will discuss the Von Neumann Architecture.
-> Click HERE to read the article on LinkedIn.
Lesson 78: ARM Reverse Engineering (Part 13 - Instruction Pipeline)
This tutorial will discuss the instruction pipeline.
-> Click HERE to read the article on LinkedIn.
Lesson 79: ARM Reverse Engineering (Part 14 - Hello World)
This tutorial will discuss the basics of a hello world program in ARM 32-bit.
-> Click HERE to read the article on LinkedIn.
Lesson 80: ARM Reverse Engineering (Part 15 - Debugging Hello World)
This tutorial will discuss debugging hello world.
-> Click HERE to read the article on LinkedIn.
Lesson 81: ARM Reverse Engineering (Part 16 - Hacking Hello World)
This tutorial will discuss hacking hello world.
-> Click HERE to read the article on LinkedIn.
Lesson 82: ARM Reverse Engineering (Part 17 - Constants)
This tutorial will discuss constants.
-> Click HERE to read the article on LinkedIn.
Lesson 83: ARM Reverse Engineering (Part 18 – Debugging Constants)
This tutorial will discuss debugging constants.
-> Click HERE to read the article on LinkedIn.
Lesson 84: ARM Reverse Engineering (Part 19 – Hacking Constants)
This tutorial will discuss hacking constants.
-> Click HERE to read the article on LinkedIn.
Lesson 85: ARM Reverse Engineering (Part 20 – Character Variables)
This tutorial will discuss character variables.
-> Click HERE to read the article on LinkedIn.
Lesson 86: ARM Reverse Engineering (Part 21 – Debugging Character Variables)
This tutorial will discuss debugging character variables.
-> Click HERE to read the article on LinkedIn.
Lesson 87: ARM Reverse Engineering (Part 22 – Hacking Character Variables)
This tutorial will discuss hacking character variables.
-> Click HERE to read the article on LinkedIn.
Lesson 88: ARM Reverse Engineering (Part 23 – Boolean Variables)
This tutorial will discuss boolean variables.
-> Click HERE to read the article on LinkedIn.
Lesson 89: ARM Reverse Engineering (Part 24 – Debugging Boolean Variables)
This tutorial will discuss debugging boolean variables.
-> Click HERE to read the article on LinkedIn.
Lesson 90: ARM Reverse Engineering (Part 25 – Hacking Boolean Variables)
This tutorial will discuss hacking boolean variables.
-> Click HERE to read the article on LinkedIn.
Lesson 91: ARM Reverse Engineering (Part 26 – Integer Variables)
This tutorial will discuss integer variables.
-> Click HERE to read the article on LinkedIn.
Lesson 92: ARM Reverse Engineering (Part 27 – Debugging Integer Variables)
This tutorial will discuss debugging integer variables.
-> Click HERE to read the article on LinkedIn.
Lesson 93: ARM Reverse Engineering (Part 28 – Hacking Integer Variables)
This tutorial will discuss hacking integer variables.
-> Click HERE to read the article on LinkedIn.
Lesson 94: ARM Reverse Engineering (Part 29 – Float Variables)
This tutorial will discuss float variables.
-> Click HERE to read the article on LinkedIn.
Lesson 95: ARM Reverse Engineering (Part 30 – Debugging Float Variables)
This tutorial will discuss debugging float variables.
-> Click HERE to read the article on LinkedIn.
Lesson 96: ARM Reverse Engineering (Part 31 – Hacking Float Variables)
This tutorial will discuss hacking float variables.
-> Click HERE to read the article on LinkedIn.
Lesson 97: ARM Reverse Engineering (Part 32 – Double Variables)
This tutorial will discuss double variables.
-> Click HERE to read the article on LinkedIn.
Lesson 98: ARM Reverse Engineering (Part 33 – Debugging Double Variables)
This tutorial will discuss debugging double variables.
-> Click HERE to read the article on LinkedIn.
Lesson 99: ARM Reverse Engineering (Part 34 – Hacking Double Variables)
This tutorial will discuss hacking double variables.
-> Click HERE to read the article on LinkedIn.
Lesson 100: ARM Reverse Engineering (Part 35 – SizeOf Operator)
This tutorial will discuss the sizeof operator.
-> Click HERE to read the article on LinkedIn.
Lesson 101: ARM Reverse Engineering (Part 36 – Debugging SizeOf Operator)
This tutorial will discuss debugging sizeof operator.
-> Click HERE to read the article on LinkedIn.
Lesson 102: ARM Reverse Engineering (Part 37 – Hacking SizeOf Operator)
This tutorial will discuss hacking sizeof operator.
-> Click HERE to read the article on LinkedIn.
Lesson 103: ARM Reverse Engineering (Part 38 – Pre-Increment Operator)
This tutorial will discuss the pre-increment operator.
-> Click HERE to read the article on LinkedIn.
Lesson 104: ARM Reverse Engineering (Part 39 – Debugging Pre-Increment Operator)
This tutorial will discuss debugging pre-increment operator.
-> Click HERE to read the article on LinkedIn.
Lesson 105: ARM Reverse Engineering (Part 40 – Hacking Pre-Increment Operator)
This tutorial will discuss hacking pre-increment operator.
-> Click HERE to read the article on LinkedIn.
Lesson 106: ARM Reverse Engineering (Part 41 – Post-Increment Operator)
This tutorial will discuss the post-increment operator.
-> Click HERE to read the article on LinkedIn.
Lesson 107: ARM Reverse Engineering (Part 42 – Debugging Post-Increment Operator)
This tutorial will discuss debugging post-increment operator.
-> Click HERE to read the article on LinkedIn.
Lesson 108: ARM Reverse Engineering (Part 43 – Hacking Post-Increment Operator)
This tutorial will discuss hacking post-increment operator.
-> Click HERE to read the article on LinkedIn.
Lesson 109: ARM Reverse Engineering (Part 44 – Pre-Decrement Operator)
This tutorial will discuss the pre-decrement operator.
-> Click HERE to read the article on LinkedIn.
Lesson 110: ARM Reverse Engineering (Part 45 – Debugging Pre-Decrement Operator)
This tutorial will discuss debugging pre-decrement operator.
-> Click HERE to read the article on LinkedIn.
Lesson 111: ARM Reverse Engineering (Part 46 – Hacking Pre-Decrement Operator)
This tutorial will discuss hacking pre-decrement operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-46-hacking-pre-decrement-kevin-m-thomas/ to read the article on LinkedIn.
Lesson 112: ARM Reverse Engineering (Part 47 – Post-Decrement Operator)
This tutorial will discuss post-decrement operator.
-> Click HERE to read the article on LinkedIn.
Lesson 113: ARM Reverse Engineering (Part 48 – Debugging Post-Decrement Operator)
This tutorial will discuss debugging post-decrement operator.
-> Click HERE to read the article on LinkedIn.
Lesson 114: ARM Reverse Engineering (Part 49 – Hacking Post-Decrement Operator)
This tutorial will discuss hacking post-decrement operator.
-> Click HERE to read the article on LinkedIn.
Lesson 115: x64 Reverse Engineering (Part 1 – The Cyber Revolution)
This tutorial will discuss the cyber revolution.
-> Click HERE to read the article on LinkedIn.
Lesson 116: x64 Reverse Engineering (Part 2 - Transistors)
This tutorial will discuss transistors.
-> Click HERE to read the article on LinkedIn.
Lesson 117: x64 Reverse Engineering (Part 3 - Logic Gates)
This tutorial will discuss logic gates.
-> Click HERE to read the article on LinkedIn.
Lesson 118: x64 Reverse Engineering (Part 4 - Number Systems)
This tutorial will discuss number systems.
-> Click HERE to read the article on LinkedIn.
Lesson 119: x64 Reverse Engineering (Part 5 - Binary Addition)
This tutorial will discuss binary addition.
-> Click HERE to read the article on LinkedIn.
Lesson 120: x64 Reverse Engineering (Part 6 - Binary Subtraction)
This tutorial will discuss binary subtraction.
-> Click HERE to read the article on LinkedIn.
Lesson 121: x64 Reverse Engineering (Part 7 - Word Lengths)
This tutorial will discuss word lengths.
-> Click HERE to read the article on LinkedIn.
Lesson 122: x64 Reverse Engineering (Part 8 - General Architecture)
This tutorial will discuss the general architecture.
-> Click HERE to read the article on LinkedIn.
Lesson 123: x64 Reverse Engineering (Part 9 - Calling Conventions)
This tutorial will discuss calling conventions.
-> Click HERE to read the article on LinkedIn.
Lesson 124: x64 Reverse Engineering (Part 10 - Boolean Instructions)
This tutorial will discuss boolean instructions.
-> Click HERE to read the article on LinkedIn.
Lesson 125: x64 Reverse Engineering (Part 11 - Pointers)
This tutorial will discuss pointers.
-> Click HERE to read the article on LinkedIn.
Lesson 126: x64 Reverse Engineering (Part 12 - Load Effective Address)
This tutorial will discuss load effective address.
-> Click HERE to read the article on LinkedIn.
Lesson 127: x64 Reverse Engineering (Part 13 - The Data Segment)
This tutorial will discuss the data segment.
-> Click HERE to read the article on LinkedIn.
Lesson 128: x64 Reverse Engineering (Part 14 - SHL Instruction)
This tutorial will discuss the shl instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 129: x64 Reverse Engineering (Part 15 - SHR Instruction)
This tutorial will discuss the shr instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 130: x64 Reverse Engineering (Part 16 - ROL Instruction)
This tutorial will discuss rol instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 131: x64 Reverse Engineering (Part 17 - ROR Instruction)
This tutorial will discuss the ror instruction.
-> Click HERE to read the article on LinkedIn.
Lesson 132: x64 Reverse Engineering (Part 18 - Boot Sector Basics [Part 1])
This tutorial will discuss boot sector basics.
-> Click HERE to read the article on LinkedIn.
Lesson 133: x64 Reverse Engineering (Part 19 - Boot Sector Basics [Part 2])
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
Lesson 134: x64 Reverse Engineering (Part 20 - Boot Sector Basics [Part 3])
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
Lesson 135: x64 Reverse Engineering (Part 21 - Boot Sector Basics [Part 4])
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
Lesson 136: x64 Reverse Engineering (Part 22 - Boot Sector Basics [Part 5])
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
Lesson 137: x64 Reverse Engineering (Part 23 - Boot Sector Basics [Part 6])
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
Lesson 138: x64 Reverse Engineering (Part 24 - Boot Sector Basics [Part 7])
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
Lesson 139: x64 Reverse Engineering (Part 25 - Boot Sector Basics [Part 8])
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
Lesson 140: x64 Reverse Engineering (Part 26 - Boot Sector Basics [Part 9])
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
Lesson 141: x64 Reverse Engineering (Part 27 - x64 Assembly [Part 1])
This tutorial will discuss x64 assembly.
-> Click HERE to read the article on LinkedIn.
Lesson 142: x64 Reverse Engineering (Part 28 - x64 Assembly [Part 2])
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
Lesson 143: x64 Reverse Engineering (Part 29 - x64 Assembly [Part 3])
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
Lesson 144: x64 Reverse Engineering (Part 30 - x64 Assembly [Part 4])
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
Lesson 145: x64 Reverse Engineering (Part 31 - x64 Assembly [Part 5])
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
Lesson 146: x64 Reverse Engineering (Part 32 - x64 Assembly [Part 6])
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
Lesson 147: x64 Reverse Engineering (Part 33 - x64 Assembly [Part 7])
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
Lesson 148: x64 Reverse Engineering (Part 34 - x64 C++ 1 Code [Part 1])
This tutorial will discuss c++ code as it relates to 64-bit assembly.
-> Click HERE to read the article on LinkedIn.
Lesson 149: x64 Reverse Engineering (Part 35 - x64 C++ 2 Debug [Part 2])
This tutorial will discuss more c++ code as it relates to 64-bit assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-35-c-1-debug-2-kevin-m-thomas/ to read the article on LinkedIn.
Lesson 150: x64 Reverse Engineering (Part 36 - x64 C++ 3 Hacking [Part 3])
This tutorial will discuss more c++ code as it relates to 64-bit assembly.
-> Click HERE to read the article on LinkedIn.
Lesson 151: x64 Reverse Engineering (Part 37 - x64 C & Genesis Of Life)
This tutorial will discuss c and how it relates to x64 assembly.
-> Click HERE to read the article on LinkedIn.
Lesson 152: x64 Reverse Engineering (Part 38 - x64 Networking Basics)
This tutorial will discuss x64 networking basics.
-> Click HERE to read the article on LinkedIn.
Lesson 153: x64 Reverse Engineering (Part 39 - Why C?)
This tutorial will discuss the power of the c language.
-> Click HERE to read the article on LinkedIn.
Lesson 154: x64 Reverse Engineering (Part 40 - Hacking Hello World!)
This tutorial will discuss hacking hello world.
-> Click HERE to read the article on LinkedIn.
Lesson 155: x64 Reverse Engineering (Part 41 - Hacking Variables!)
This tutorial will discuss hacking variables.
-> Click HERE to read the article on LinkedIn.
Lesson 156: x64 Reverse Engineering (Part 42 - Hacking Branches!)
This tutorial will discuss hacking branches.
-> Click HERE to read the article on LinkedIn.
Lesson 157: x64 Reverse Engineering (Part 43 - Hacking Pointers!)
This tutorial will discuss hacking pointers.
-> Click HERE to read the article on LinkedIn.
Lesson 158: Hacking C++ ARM 64 (Part 1 - The Meaning Of Life)
In this lesson we will discuss the course concepts and the meaning of life.
-> Click HERE to read the article on LinkedIn.
Lesson 159: Hacking C++ ARM 64 (Part 2 - Development Setup)
In this lesson we will discuss how to set up our development in 64-bit ARM with Kali Linux.
-> Click HERE to read the article on LinkedIn.
Lesson 160: Hacking C++ ARM 64 (Part 3 - “Hello World”)
In this lesson we will discuss how to write and compile a simple hello world program in C++.
-> Click HERE to read the article on LinkedIn.
Lesson 161: Hacking C++ ARM 64 (Part 4 - Debugging “Hello World”)
In this lesson we will debug our simple hello world program.
-> Click HERE to read the article on LinkedIn.
Supplimental 32-bit ARM - Hacking Hello World
This tutorial hacks a 32-bit ARM hello world program.
-> Click HERE to read the GitHub tutorial.
Supplimental 32-bit ARM - Hacking Int
This tutorial hacks a 32-bit ARM int program.
-> Click HERE to read the GitHub tutorial.
Supplimental 32-bit ARM - Hacking Float
This tutorial hacks a 32-bit ARM float program.
-> Click HERE to read the GitHub tutorial.
Supplimental 32-bit ARM - Hacking Double
This tutorial hacks a 32-bit ARM double program.
-> Click HERE to read the GitHub tutorial.
Supplimental 32-bit ARM - Hacking Char
This tutorial hacks a 32-bit ARM char program.
-> Click HERE to read the GitHub tutorial.
Supplimental 32-bit ARM - Hacking Char Pointer
This tutorial hacks a 32-bit ARM char pointer program.
-> Click HERE to read the GitHub tutorial.