Reverse Engineering Course The Ultimate Training

Hero Member
Infinity Member
Joined
November 19, 2023
Messages
2,718
Reaction score
27,421
Points
113

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents
  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement

    To see this hidden content, you must reply and react with one of the following reactions : Like Like, Love Love, Wow Wow
 
  • Like
Reactions: Zikerson, yduhgas, pulsebiter and 24 others
New Member
Joined
January 12, 2024
Messages
2
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
good
 
Active Member
Joined
November 19, 2023
Messages
91
Reaction score
10
Points
8

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
woo
 
Member
Joined
September 27, 2023
Messages
17
Reaction score
4
Points
3

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
h
 
Member
Joined
February 26, 2024
Messages
6
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
 
Joined
April 12, 2024
Messages
27
Reaction score
7
Points
3

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]

very nice
 
Member
Joined
April 17, 2024
Messages
19
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]

(y)
 
Advanced Member
Joined
April 17, 2024
Messages
154
Reaction score
9
Points
18

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
 
New Member
Joined
July 5, 2024
Messages
2
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
Finally a complete course ! Hope I'll be able to take it all :D Tks !
 
Advanced Member
Joined
July 29, 2024
Messages
134
Reaction score
11
Points
18

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
 
New Member
Joined
August 22, 2024
Messages
2
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
thx
 
New Member
Joined
September 3, 2024
Messages
2
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
lets see
 
  • Tags
    learn reverse reverse engineering windows
  • Top