Zaloguj się bądź zarejestruj
Reverse Engineering 2: Windows Gui Programs
Started by charlie


Rate this topic
  • 0 głosów - średnia: 0
  • 1
  • 2
  • 3
  • 4
  • 5


0 posts in this topic
charlie
Klasa Światowa
*****


0
5 621 posts 5 621 threads Dołączył: Nov 2025
07-01-2026, 07:38 -
#1
[center]
[Obrazek: 370f2cb3afca4b2adfb48ded1c7b16cb.jpg]
Reverse Engineering 2: Windows Gui Programs
Last updated 12/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.45 GB [/center] | Duration: 4h 3m
Reverse engineer Windows Graphical User Interface programs with xdbg
What you'll learn
Disassemble windows programs
Reversing jumps
Patching
Debugging windows programs
Solving crackme's
NOP instructions
Modifying EAX register values
Setting Hardware Breakpoints
Memory Patching
Intermodular Call Method
Call Stack Method
Understand how Trial Period works
Understand how Software Registration process works
Remove Nag Screens
Requirements
Preferably have Completed Reverse Engineering 1: x64dbg Debugger for Beginners, or already know how to use x64dbg
Windows PC
Description
In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme's that I have written for you to practice reversing.What you will learn:How to disassemble programs into assembly codeDynamic AnalysisSetting breakpoints and stepping through codeModify program behaviourPatching programsIntermodular Call MethodCall Stack MethodHardware BreakpointsMemory PatchingPatching EAX register valuesUnderstanding Trial Period softwareUnderstanding Software Registration processThank you and see you inside.
Computing students who want to learn how to disassemble and debug windows programs,Anyone who is interested in reverse engineering,Programmers who want to know how to fix bugs in programs without the source code

Cytat:https://rapidgator.net/file/165b16aea11d...5.rar.html
https://rapidgator.net/file/e0ac6d958975...4.rar.html
https://rapidgator.net/file/aa237f8013a4...3.rar.html
https://rapidgator.net/file/03b3bafda935...2.rar.html
https://rapidgator.net/file/03f583799c6a...1.rar.html

https://nitroflare.com/view/4952B39E564D....part5.rar
https://nitroflare.com/view/31D83738415B....part4.rar
https://nitroflare.com/view/EF6960B2EA2B....part3.rar
https://nitroflare.com/view/572E79413DD7....part2.rar
https://nitroflare.com/view/9098D8BF9305....part1.rar


Skocz do:


Użytkownicy przeglądający ten wątek: 1 gości