Skip to content

A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

License

Notifications You must be signed in to change notification settings

juanhundo/Reverse-Engineering-Tutorial

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

image

Reverse Engineering Tutorial

A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

Lesson 1: Assembly Language - Basic Malware Reverse Engineering (Part 1: Goals)

This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language.

-> Click HERE to read the article on LinkedIn.

Lesson 2: Assembly Language - Basic Malware Reverse Engineering (Part 2: Techniques)

This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis.

-> Click HERE to read the article on LinkedIn.

Lesson 3: Assembly Language - Basic Malware Reverse Engineering (Part 3: Types Of Malware)

This tutorial will address the basic forms of malware and how they work in simple terms.

-> Click HERE to read the article on LinkedIn.

Lesson 4: Assembly Language - Basic Malware Reverse Engineering (Part 4: x86 Assembly Intro)

This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors.

-> Click HERE to read the article on LinkedIn.

Lesson 5: Assembly Language - Basic Malware Reverse Engineering (Part 5: Binary Number System)

This tutorial will address the very basics of the binary number system.

-> Click HERE to read the article on LinkedIn.

Lesson 6: Assembly Language - Basic Malware Reverse Engineering (Part 6: Hexadecimal Number System)

This tutorial will address the very basics of the hexidecimal number system.

-> Click HERE to read the article on LinkedIn.

Lesson 7: Assembly Language - Basic Malware Reverse Engineering (Part 7: Transistors And Memory)

This tutorial will address the basics of transistors and memory.

-> Click HERE to read the article on LinkedIn.

Lesson 8: Assembly Language - Basic Malware Reverse Engineering (Part 8 - Bytes, Words, Double Words, etc...)

This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions.

-> Click HERE to read the article on LinkedIn.

Lesson 9: Assembly Language - Basic Malware Reverse Engineering (Part 9: x86 Basic Architecture)

This tutorial will address the basic architecture of an x86 processor.

-> Click HERE to read the article on LinkedIn.

Lesson 10: Assembly Language - Basic Malware Reverse Engineering (Part 10: General-purpose Registers)

This tutorial will address the general purpose x86 registers.

-> Click HERE to read the article on LinkedIn.

Lesson 11: Assembly Language - Basic Malware Reverse Engineering (Part 11: Segment Registers)

This tutorial will address the x86 segment registers.

-> Click HERE to read the article on LinkedIn.

Lesson 12: Assembly Language - Basic Malware Reverse Engineering (Part 12: Instruction Pointer Register)

This tutorial will address the x86 instruction pointer register.

-> Click HERE to read the article on LinkedIn.

Lesson 13: Assembly Language - Basic Malware Reverse Engineering (Part 13: Control Registers)

This tutorial will address the x86 control registers.

-> Click HERE to read the article on LinkedIn.

Lesson 14: Assembly Language - Basic Malware Reverse Engineering (Part 14: Flags)

This tutorial will address the status, control and systems flags.

-> Click HERE to read the article on LinkedIn.

Lesson 15: Assembly Language - Basic Malware Reverse Engineering (Part 15: Stack)

This tutorial will address the stack.

-> Click HERE to read the article on LinkedIn.

Lesson 16: Assembly Language - Basic Malware Reverse Engineering (Part 16: Heap)

This tutorial will address the heap.

-> Click HERE to read the article on LinkedIn.

Lesson 17: Assembly Language - Basic Malware Reverse Engineering (Part 17 – How To Install Linux)

This tutorial will address how to install Ubuntu Linux on both Windows and MAC.

-> Click HERE to read the article on LinkedIn.

Lesson 18: Assembly Language - Basic Malware Reverse Engineering (Part 18 - vim Text Editor)

This tutorial will address how to install the vim text editor.

-> Click HERE to read the article on LinkedIn.

Lesson 19: Assembly Language - Basic Malware Reverse Engineering (Part 19 - Why Learn Assembly)

This tutorial will address the age old question of why to bother understanding the basics of Assembly Language.

-> Click HERE to read the article on LinkedIn.

Lesson 20: Assembly Language - Basic Malware Reverse Engineering (Part 20 - Instruction Code Handling)

This tutorial will address op codes and instruction code handling.

-> Click HERE to read the article on LinkedIn.

Lesson 21: Assembly Language - Basic Malware Reverse Engineering (Part 21 - How To Compile A Program)

This tutorial will address how to compile a basic x86 Assembly Program.

-> Click HERE to read the article on LinkedIn.

Lesson 22: Assembly Language - Basic Malware Reverse Engineering (Part 22 - ASM Program 1 [Moving Immediate Data])

This tutorial will address how to create our first real Assembly Program by moving immediate data.

-> Click HERE to read the article on LinkedIn.

Lesson 23: Assembly Language - Basic Malware Reverse Engineering (Part 23 - ASM Debugging 1 [Moving Immediate Data])

This tutorial will address how to debug our first real Assembly Program by moving immediate data.

-> Click HERE to read the article on LinkedIn.

Lesson 24: Assembly Language - Basic Malware Reverse Engineering (Part 24 - ASM Hacking 1 [Moving Immediate Data])

This tutorial will address how to hack our first real Assembly Program by moving immediate data.

-> Click HERE to read the article on LinkedIn.

Lesson 25: Assembly Language - Basic Malware Reverse Engineering (Part 25 - ASM Program 2 [Moving Data Between Registers])

This tutorial will address how to create our second real Assembly Program by moving between registers.

-> Click HERE to read the article on LinkedIn.

Lesson 26: Assembly Language - Basic Malware Reverse Engineering (Part 26 - ASM Debugging 2 [Moving Data Between Registers])

This tutorial will address how to debug our second real Assembly Program by moving between registers.

-> Click HERE to read the article on LinkedIn.

Lesson 27: Assembly Language - Basic Malware Reverse Engineering (Part 27 - ASM Hacking 2 [Moving Data Between Registers])

This tutorial will address how to hack our second real Assembly Program by moving between registers.

-> Click HERE to read the article on LinkedIn.

Lesson 28: Assembly Language - Basic Malware Reverse Engineering (Part 28 - ASM Program 3 [Moving Data Between Memory And Registers])

This tutorial will address how to create our third real Assembly Program by moving between memory and registers

-> Click HERE to read the article on LinkedIn.

Lesson 29: Assembly Language - Basic Malware Reverse Engineering (Part 29 - ASM Debugging 3 [Moving Data Between Memory And Registers])

This tutorial will address how to debug our third real Assembly Program by moving between memory and registers.

-> Click HERE to read the article on LinkedIn.

Lesson 30: Assembly Language - Basic Malware Reverse Engineering (Part 30 - ASM Hacking 3 [Moving Data Between Memory And Registers])

This tutorial will address how to hack our third real Assembly Program by moving between memory and registers.

-> Click HERE to read the article on LinkedIn.

Lesson 31: Assembly Language - Basic Malware Reverse Engineering (Part 31 - ASM Program 4 [Moving Data Between Registers And Memory])

This tutorial will address how to create our fourth real Assembly Program by moving between registers and memory.

-> Click HERE to read the article on LinkedIn.

Lesson 32: Assembly Language - Basic Malware Reverse Engineering (Part 32 - ASM Debugging 4 [Moving Data Between Registers And Memory])

This tutorial will address how to debug our fourth real Assembly Program by moving between registers and memory.

-> Click HERE to read the article on LinkedIn.

Lesson 33: Assembly Language - Basic Malware Reverse Engineering (Part 33 - ASM Hacking 4 [Moving Data Between Registers And Memory])

This tutorial will address how to hack our fourth real Assembly Program by moving between registers and memory.

-> Click HERE to read the article on LinkedIn.

Lesson 34: Assembly Language - Basic Malware Reverse Engineering (Part 34 - ASM Program 5 [Indirect Addressing With Registers])

This tutorial will address how to create our fifth real Assembly Program by indirect addressing with registers.

-> Click HERE to read the article on LinkedIn.

Lesson 35: Assembly Language - Basic Malware Reverse Engineering (Part 35 - ASM Debugging 5 [Indirect Addressing With Registers])

This tutorial will address how to debug our fifth real Assembly Program by indirect addressing with registers.

-> Click HERE to read the article on LinkedIn.

Lesson 36: Assembly Language - Basic Malware Reverse Engineering (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers])

This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers.

-> Click HERE to read the article on LinkedIn.

Lesson 37: Assembly Language - Basic Malware Reverse Engineering (Part 37 - ASM Program 6 [CMOV Instructions])

This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.

-> Click HERE to read the article on LinkedIn.

Lesson 38: Assembly Language - Basic Malware Reverse Engineering (Part 38 - ASM Debugging 6 [CMOV Instructions])

This tutorial will address how to debug our sixth real Assembly Program with CMOV instructions.

-> Click HERE to read the article on LinkedIn.

Lesson 39: Assembly Language - Basic Malware Reverse Engineering (Part 39 - ASM Hacking 6 [CMOV Instructions])

This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.

-> Click HERE to read the article on LinkedIn.

Lesson 40: Assembly Language - Basic Malware Reverse Engineering (Part 40 - Conclusion)

This tutorial will conclude this x86 tutorial.

-> Click HERE to read the article on LinkedIn.

Lesson 41: ARM Assembly (Part 1 – The Meaning Of Life)

This tutorial will introduce our ARM Assembly tutorial series.

-> Click HERE to read the article on LinkedIn.

Lesson 42: ARM Assembly (Part 2 - Number Systems)

This tutorial will discuss number systems such as binary, decimal and hexidecimal in detail.

-> Click HERE to read the article on LinkedIn.

Lesson 43: ARM Assembly (Part 3 - Binary Addition)

This tutorial will discuss binary addition.

-> Click HERE to read the article on LinkedIn.

Lesson 44: ARM Assembly (Part 4 - Binary Subtraction)

This tutorial will discuss binary subtraction.

-> Click HERE to read the article on LinkedIn.

Lesson 45: ARM Assembly (Part 5 - Word Lengths)

This tutorial will discuss word lengths.

-> Click HERE to read the article on LinkedIn.

Lesson 46: ARM Assembly (Part 6 - Registers)

This tutorial will discuss registers.

-> Click HERE to read the article on LinkedIn.

Lesson 47: ARM Assembly (Part 7 - Program Counter)

This tutorial will discuss the program counter.

-> Click HERE to read the article on LinkedIn.

Lesson 48: ARM Assembly (Part 8 - CPSR)

This tutorial will discuss the CPSR.

-> Click HERE to read the article on LinkedIn.

Lesson 49: ARM Assembly (Part 9 - Link Register)

This tutorial will discuss the Link Register.

-> Click HERE to read the article on LinkedIn.

Lesson 50: ARM Assembly (Part 10 - Stack Pointer)

This tutorial will discuss the Stack Pointer.

-> Click HERE to read the article on LinkedIn.

Lesson 51: ARM Assembly (Part 11 - ARM Firmware Boot Procedures)

This tutorial will discuss ARM Firmware Boot Procedures.

-> Click HERE to read the article on LinkedIn.

Lesson 52: ARM Assembly (Part 12 - Von Neumann Architecture)

This tutorial will discuss Von Neumann Architecture.

-> Click HERE to read the article on LinkedIn.

Lesson 53: ARM Assembly (Part 13 - Instruction Pipeline)

This tutorial will discuss the instruction pipeline.

-> Click HERE to read the article on LinkedIn.

Lesson 54: ARM Assembly (Part 14 - ADD)

This tutorial will discuss the add instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 55: ARM Assembly (Part 15 - Debugging ADD)

This tutorial will discuss debugging the add instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 56: ARM Assembly (Part 16 - Hacking ADD)

This tutorial will discuss hacking the add instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 57: ARM Assembly (Part 17 - ADDS)

This tutorial will discuss the adds instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 58: ARM Assembly (Part 18 – Debugging ADDS)

This tutorial will discuss debugging the adds instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 59: ARM Assembly (Part 19 – Hacking ADDS)

This tutorial will discuss hacking the adds instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 60: ARM Assembly (Part 20 – ADC)

This tutorial will discuss the ADC instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 61: ARM Assembly (Part 21 – Debugging ADC)

This tutorial will discuss debugging the ADC instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 62: ARM Assembly (Part 22 – Hacking ADC)

This tutorial will discuss hacking the ADC instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 63: ARM Assembly (Part 23 – SUB)

This tutorial will discuss the SUB instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 64: ARM Assembly (Part 24 – Debugging SUB)

This tutorial will discuss debugging the SUB instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 65: ARM Assembly (Part 25 – Hacking SUB)

This tutorial will discuss hacking the SUB instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 66: ARM Reverse Engineering (Part 1 – The Meaning Of Life Part 2)

This tutorial will introduce our ARM Reverse Engineering course.

-> Click HERE to read the article on LinkedIn.

Lesson 67: ARM Reverse Engineering (Part 2 – Number Systems)

This tutorial will discuss number systems.

-> Click HERE to read the article on LinkedIn.

Lesson 68: ARM Reverse Engineering (Part 3 – Binary Addition)

This tutorial will discuss binary addition.

-> Click HERE to read the article on LinkedIn.

Lesson 69: ARM Reverse Engineering (Part 4 – Binary Subtraction)

This tutorial will discuss binary subtraction.

-> Click HERE to read the article on LinkedIn.

Lesson 70: ARM Reverse Engineering (Part 5 – Word Lengths)

This tutorial will discuss word lengths.

-> Click HERE to read the article on LinkedIn.

Lesson 71: ARM Reverse Engineering (Part 6 – Registers)

This tutorial will discuss registers.

-> Click HERE to read the article on LinkedIn.

Lesson 72: ARM Reverse Engineering (Part 7 – Program Counter)

This tutorial will discuss program counter.

-> Click HERE to read the article on LinkedIn.

Lesson 73: ARM Reverse Engineering (Part 8 - CPSR)

This tutorial will discuss the CPSR.

-> Click HERE to read the article on LinkedIn.

Lesson 74: ARM Reverse Engineering (Part 9 - Link Register)

This tutorial will discuss the link register.

-> Click HERE to read the article on LinkedIn.

Lesson 75: ARM Reverse Engineering (Part 10 - Stack Pointer)

This tutorial will discuss the stack pointer.

-> Click HERE to read the article on LinkedIn.

Lesson 76: ARM Reverse Engineering (Part 11 - Firmware Boot Procedures)

This tutorial will discuss the firmware boot procedures.

-> Click HERE to read the article on LinkedIn.

Lesson 77: ARM Reverse Engineering (Part 12 - Von Neumann Architecture)

This tutorial will discuss the Von Neumann Architecture.

-> Click HERE to read the article on LinkedIn.

Lesson 78: ARM Reverse Engineering (Part 13 - Instruction Pipeline)

This tutorial will discuss the instruction pipeline.

-> Click HERE to read the article on LinkedIn.

Lesson 79: ARM Reverse Engineering (Part 14 - Hello World)

This tutorial will discuss the basics of a hello world program in ARM 32-bit.

-> Click HERE to read the article on LinkedIn.

Lesson 80: ARM Reverse Engineering (Part 15 - Debugging Hello World)

This tutorial will discuss debugging hello world.

-> Click HERE to read the article on LinkedIn.

Lesson 81: ARM Reverse Engineering (Part 16 - Hacking Hello World)

This tutorial will discuss hacking hello world.

-> Click HERE to read the article on LinkedIn.

Lesson 82: ARM Reverse Engineering (Part 17 - Constants)

This tutorial will discuss constants.

-> Click HERE to read the article on LinkedIn.

Lesson 83: ARM Reverse Engineering (Part 18 – Debugging Constants)

This tutorial will discuss debugging constants.

-> Click HERE to read the article on LinkedIn.

Lesson 84: ARM Reverse Engineering (Part 19 – Hacking Constants)

This tutorial will discuss hacking constants.

-> Click HERE to read the article on LinkedIn.

Lesson 85: ARM Reverse Engineering (Part 20 – Character Variables)

This tutorial will discuss character variables.

-> Click HERE to read the article on LinkedIn.

Lesson 86: ARM Reverse Engineering (Part 21 – Debugging Character Variables)

This tutorial will discuss debugging character variables.

-> Click HERE to read the article on LinkedIn.

Lesson 87: ARM Reverse Engineering (Part 22 – Hacking Character Variables)

This tutorial will discuss hacking character variables.

-> Click HERE to read the article on LinkedIn.

Lesson 88: ARM Reverse Engineering (Part 23 – Boolean Variables)

This tutorial will discuss boolean variables.

-> Click HERE to read the article on LinkedIn.

Lesson 89: ARM Reverse Engineering (Part 24 – Debugging Boolean Variables)

This tutorial will discuss debugging boolean variables.

-> Click HERE to read the article on LinkedIn.

Lesson 90: ARM Reverse Engineering (Part 25 – Hacking Boolean Variables)

This tutorial will discuss hacking boolean variables.

-> Click HERE to read the article on LinkedIn.

Lesson 91: ARM Reverse Engineering (Part 26 – Integer Variables)

This tutorial will discuss integer variables.

-> Click HERE to read the article on LinkedIn.

Lesson 92: ARM Reverse Engineering (Part 27 – Debugging Integer Variables)

This tutorial will discuss debugging integer variables.

-> Click HERE to read the article on LinkedIn.

Lesson 93: ARM Reverse Engineering (Part 28 – Hacking Integer Variables)

This tutorial will discuss hacking integer variables.

-> Click HERE to read the article on LinkedIn.

Lesson 94: ARM Reverse Engineering (Part 29 – Float Variables)

This tutorial will discuss float variables.

-> Click HERE to read the article on LinkedIn.

Lesson 95: ARM Reverse Engineering (Part 30 – Debugging Float Variables)

This tutorial will discuss debugging float variables.

-> Click HERE to read the article on LinkedIn.

Lesson 96: ARM Reverse Engineering (Part 31 – Hacking Float Variables)

This tutorial will discuss hacking float variables.

-> Click HERE to read the article on LinkedIn.

Lesson 97: ARM Reverse Engineering (Part 32 – Double Variables)

This tutorial will discuss double variables.

-> Click HERE to read the article on LinkedIn.

Lesson 98: ARM Reverse Engineering (Part 33 – Debugging Double Variables)

This tutorial will discuss debugging double variables.

-> Click HERE to read the article on LinkedIn.

Lesson 99: ARM Reverse Engineering (Part 34 – Hacking Double Variables)

This tutorial will discuss hacking double variables.

-> Click HERE to read the article on LinkedIn.

Lesson 100: ARM Reverse Engineering (Part 35 – SizeOf Operator)

This tutorial will discuss the sizeof operator.

-> Click HERE to read the article on LinkedIn.

Lesson 101: ARM Reverse Engineering (Part 36 – Debugging SizeOf Operator)

This tutorial will discuss debugging sizeof operator.

-> Click HERE to read the article on LinkedIn.

Lesson 102: ARM Reverse Engineering (Part 37 – Hacking SizeOf Operator)

This tutorial will discuss hacking sizeof operator.

-> Click HERE to read the article on LinkedIn.

Lesson 103: ARM Reverse Engineering (Part 38 – Pre-Increment Operator)

This tutorial will discuss the pre-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 104: ARM Reverse Engineering (Part 39 – Debugging Pre-Increment Operator)

This tutorial will discuss debugging pre-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 105: ARM Reverse Engineering (Part 40 – Hacking Pre-Increment Operator)

This tutorial will discuss hacking pre-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 106: ARM Reverse Engineering (Part 41 – Post-Increment Operator)

This tutorial will discuss the post-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 107: ARM Reverse Engineering (Part 42 – Debugging Post-Increment Operator)

This tutorial will discuss debugging post-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 108: ARM Reverse Engineering (Part 43 – Hacking Post-Increment Operator)

This tutorial will discuss hacking post-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 109: ARM Reverse Engineering (Part 44 – Pre-Decrement Operator)

This tutorial will discuss the pre-decrement operator.

-> Click HERE to read the article on LinkedIn.

Lesson 110: ARM Reverse Engineering (Part 45 – Debugging Pre-Decrement Operator)

This tutorial will discuss debugging pre-decrement operator.

-> Click HERE to read the article on LinkedIn.

Lesson 111: ARM Reverse Engineering (Part 46 – Hacking Pre-Decrement Operator)

This tutorial will discuss hacking pre-decrement operator.

-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-46-hacking-pre-decrement-kevin-m-thomas/ to read the article on LinkedIn.

Lesson 112: ARM Reverse Engineering (Part 47 – Post-Decrement Operator)

This tutorial will discuss post-decrement operator.

-> Click HERE to read the article on LinkedIn.

Lesson 113: ARM Reverse Engineering (Part 48 – Debugging Post-Decrement Operator)

This tutorial will discuss debugging post-decrement operator.

-> Click HERE to read the article on LinkedIn.

Lesson 114: ARM Reverse Engineering (Part 49 – Hacking Post-Decrement Operator)

This tutorial will discuss hacking post-decrement operator.

-> Click HERE to read the article on LinkedIn.

Lesson 115: x64 Reverse Engineering (Part 1 – The Cyber Revolution)

This tutorial will discuss the cyber revolution.

-> Click HERE to read the article on LinkedIn.

Lesson 116: x64 Reverse Engineering (Part 2 - Transistors)

This tutorial will discuss transistors.

-> Click HERE to read the article on LinkedIn.

Lesson 117: x64 Reverse Engineering (Part 3 - Logic Gates)

This tutorial will discuss logic gates.

-> Click HERE to read the article on LinkedIn.

Lesson 118: x64 Reverse Engineering (Part 4 - Number Systems)

This tutorial will discuss number systems.

-> Click HERE to read the article on LinkedIn.

Lesson 119: x64 Reverse Engineering (Part 5 - Binary Addition)

This tutorial will discuss binary addition.

-> Click HERE to read the article on LinkedIn.

Lesson 120: x64 Reverse Engineering (Part 6 - Binary Subtraction)

This tutorial will discuss binary subtraction.

-> Click HERE to read the article on LinkedIn.

Lesson 121: x64 Reverse Engineering (Part 7 - Word Lengths)

This tutorial will discuss word lengths.

-> Click HERE to read the article on LinkedIn.

Lesson 122: x64 Reverse Engineering (Part 8 - General Architecture)

This tutorial will discuss the general architecture.

-> Click HERE to read the article on LinkedIn.

Lesson 123: x64 Reverse Engineering (Part 9 - Calling Conventions)

This tutorial will discuss calling conventions.

-> Click HERE to read the article on LinkedIn.

Lesson 124: x64 Reverse Engineering (Part 10 - Boolean Instructions)

This tutorial will discuss boolean instructions.

-> Click HERE to read the article on LinkedIn.

Lesson 125: x64 Reverse Engineering (Part 11 - Pointers)

This tutorial will discuss pointers.

-> Click HERE to read the article on LinkedIn.

Lesson 126: x64 Reverse Engineering (Part 12 - Load Effective Address)

This tutorial will discuss load effective address.

-> Click HERE to read the article on LinkedIn.

Lesson 127: x64 Reverse Engineering (Part 13 - The Data Segment)

This tutorial will discuss the data segment.

-> Click HERE to read the article on LinkedIn.

Lesson 128: x64 Reverse Engineering (Part 14 - SHL Instruction)

This tutorial will discuss the shl instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 129: x64 Reverse Engineering (Part 15 - SHR Instruction)

This tutorial will discuss the shr instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 130: x64 Reverse Engineering (Part 16 - ROL Instruction)

This tutorial will discuss rol instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 131: x64 Reverse Engineering (Part 17 - ROR Instruction)

This tutorial will discuss the ror instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 132: x64 Reverse Engineering (Part 18 - Boot Sector Basics [Part 1])

This tutorial will discuss boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 133: x64 Reverse Engineering (Part 19 - Boot Sector Basics [Part 2])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 134: x64 Reverse Engineering (Part 20 - Boot Sector Basics [Part 3])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 135: x64 Reverse Engineering (Part 21 - Boot Sector Basics [Part 4])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 136: x64 Reverse Engineering (Part 22 - Boot Sector Basics [Part 5])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 137: x64 Reverse Engineering (Part 23 - Boot Sector Basics [Part 6])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 138: x64 Reverse Engineering (Part 24 - Boot Sector Basics [Part 7])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 139: x64 Reverse Engineering (Part 25 - Boot Sector Basics [Part 8])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 140: x64 Reverse Engineering (Part 26 - Boot Sector Basics [Part 9])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 141: x64 Reverse Engineering (Part 27 - x64 Assembly [Part 1])

This tutorial will discuss x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 142: x64 Reverse Engineering (Part 28 - x64 Assembly [Part 2])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 143: x64 Reverse Engineering (Part 29 - x64 Assembly [Part 3])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 144: x64 Reverse Engineering (Part 30 - x64 Assembly [Part 4])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 145: x64 Reverse Engineering (Part 31 - x64 Assembly [Part 5])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 146: x64 Reverse Engineering (Part 32 - x64 Assembly [Part 6])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 147: x64 Reverse Engineering (Part 33 - x64 Assembly [Part 7])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 148: x64 Reverse Engineering (Part 34 - x64 C++ 1 Code [Part 1])

This tutorial will discuss c++ code as it relates to 64-bit assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 149: x64 Reverse Engineering (Part 35 - x64 C++ 2 Debug [Part 2])

This tutorial will discuss more c++ code as it relates to 64-bit assembly.

-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-35-c-1-debug-2-kevin-m-thomas/ to read the article on LinkedIn.

Lesson 150: x64 Reverse Engineering (Part 36 - x64 C++ 3 Hacking [Part 3])

This tutorial will discuss more c++ code as it relates to 64-bit assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 151: x64 Reverse Engineering (Part 37 - x64 C & Genesis Of Life)

This tutorial will discuss c and how it relates to x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 152: x64 Reverse Engineering (Part 38 - x64 Networking Basics)

This tutorial will discuss x64 networking basics.

-> Click HERE to read the article on LinkedIn.

Lesson 153: x64 Reverse Engineering (Part 39 - Why C?)

This tutorial will discuss the power of the c language.

-> Click HERE to read the article on LinkedIn.

Lesson 154: x64 Reverse Engineering (Part 40 - Hacking Hello World!)

This tutorial will discuss hacking hello world.

-> Click HERE to read the article on LinkedIn.

Lesson 155: x64 Reverse Engineering (Part 41 - Hacking Variables!)

This tutorial will discuss hacking variables.

-> Click HERE to read the article on LinkedIn.

Lesson 156: x64 Reverse Engineering (Part 42 - Hacking Branches!)

This tutorial will discuss hacking branches.

-> Click HERE to read the article on LinkedIn.

Lesson 157: x64 Reverse Engineering (Part 43 - Hacking Pointers!)

This tutorial will discuss hacking pointers.

-> Click HERE to read the article on LinkedIn.

Lesson 158: Hacking C++ ARM 64 (Part 1 - The Meaning Of Life)

In this lesson we will discuss the course concepts and the meaning of life.

-> Click HERE to read the article on LinkedIn.

Lesson 159: Hacking C++ ARM 64 (Part 2 - Development Setup)

In this lesson we will discuss how to set up our development in 64-bit ARM with Kali Linux.

-> Click HERE to read the article on LinkedIn.

Supplimental 32-bit ARM - Hacking Hello World

This tutorial hacks a 32-bit ARM hello world program.

-> Click HERE to read the GitHub tutorial.

Supplimental 32-bit ARM - Hacking Int

This tutorial hacks a 32-bit ARM int program.

-> Click HERE to read the GitHub tutorial.

Supplimental 32-bit ARM - Hacking Float

This tutorial hacks a 32-bit ARM float program.

-> Click HERE to read the GitHub tutorial.

Supplimental 32-bit ARM - Hacking Double

This tutorial hacks a 32-bit ARM double program.

-> Click HERE to read the GitHub tutorial.

Supplimental 32-bit ARM - Hacking Char

This tutorial hacks a 32-bit ARM char program.

-> Click HERE to read the GitHub tutorial.

Supplimental 32-bit ARM - Hacking Char Pointer

This tutorial hacks a 32-bit ARM char pointer program.

-> Click HERE to read the GitHub tutorial.

License

Apache License, Version 2.0

About

A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C++ 100.0%