Reverse Engineering Course The Ultimate Training

Administration Team
DNA Moderator
DNA HERO
Joined
Nov 19, 2023
Messages
1,563
Reaction score
11,636
Points
113

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents
  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement

    To see this hidden content, you must reply and react with one of the following reactions : Like Like, Love Love, Wow Wow
 
  • Like
Reactions: qing, Mr_4you1, oswald and 10 others
New Member
Joined
Jan 12, 2024
Messages
2
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
good
 
Active Member
Joined
Nov 19, 2023
Messages
78
Reaction score
6
Points
8

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
woo
 
Member
Joined
Sep 27, 2023
Messages
15
Reaction score
2
Points
3

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
h
 
Member
Joined
Feb 26, 2024
Messages
6
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
 
Joined
Apr 12, 2024
Messages
21
Reaction score
5
Points
3

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]

very nice
 
Member
Joined
Apr 17, 2024
Messages
19
Reaction score
0
Points
1

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]

(y)
 
Advanced Member
Joined
Apr 17, 2024
Messages
121
Reaction score
6
Points
18

What We’ll Do/Learn:

This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.

About This Course

Reversing is made so much harder because of the lack of resources to learn it. Most content is outdated, overpriced, hard to follow, or low quality. Reversing is already considered by many to be a difficult field to get into. Something being difficult isn’t an issue, but when it gets needlessly difficult there is an issue. After reading multiple books, countless blog posts, extensive documentation, following multiple YouTube “tutorials”, and much more, I feel like it’s time for someone to make a dedicated course. I don’t think it should be that hard to learn one topic. I certainly don’t want people to have to go through the mess I went through, so I decided to make this course. I love this field and I wanted to give back to the community. Here’s my gift to you and the rest of the community. Hopefully there are a few people out there that this course can help.

Table Of Contents

  • Documentation
  • DOC
  • Plan
  • TODO
  • Files Needed
  • Files Needed
  • Chapter 6 - DLL
  • Chapter WIP - Malware
Chapter 1 - Introduction
  • 1.0 Introduction
  • 1.1 HowTo
  • 1.2 Setup
Chapter 2 - BinaryBasics
  • 2.0 BinaryBasics
  • 2.1 NumberSystems
  • 2.2 ASCII
  • 2.3 BitsAndBytes
  • 2.4 ProgrammingLanguages
  • 2.5 Bitwise Operations
  • 2.6 Mindset
Chapter 3 - Assembly
  • 3.0 Assembly
  • 3.1 Registers
  • 3.2 MemoryLayout
  • 3.3 Instructions
  • 3.4 Flags
  • 3.5 CallingConventions
  • 3.6 FinalNotes
Chapter 4 - Tools
  • 4.0 Tools
  • 4.1 ToolTypes
  • 4.2 Debugging
  • 4.3 ToolGuides
Chapter 5 - Basic Reversing
  • 5.0 BasicReversing
  • 5.1 BeforeWeBegin
  • 5.2 FunctionCall
  • 5.3 HelloWorld
  • 5.4 Loops
Chapter 6 - DLL
  • 6.00 DLL
  • 6.01 BeforeWeBegin
  • 6.02 DLLBasics
  • 6.03 Exports
  • 6.04 SayHello
  • 6.05 PrintArray
  • 6.06 InitializePlayer
  • 6.07 PrintPlayerStats
  • 6.08 MysteryFunc
  • 6.09 ImplementingPlayer
  • 6.10 FinalNotes
Chapter 7 - Windows - WIP
  • 7.0 Windows
  • 7.1 Virtual Memory
  • 7.2 Privileges
  • 7.3 Architecture - WIP
Chapter 8 - Generic Table - WIP
  • 8.00 Generic Table
  • 8.01 InitializeTable
  • 8.02 NumberGenericTableElements.md
  • 8.03 IsGenericTableEmpty.md
  • 8.04 GetElement



    [Hidden content]
 
  • Tags
    learn reverse reverse engineering windows
  • Top