Home
:
Book details
:
Book description
Description of
x64 Assembly Language and Reverse Engineering Practicals
Published 3/2024 Created by Paul Chin MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 104 Lectures ( 12h 51m ) | Size: 9.99 GB Understand x64 (64-bit) assembly code and apply knowledge to reversing x86 and x64 programs What you'll learn: x64 (64-bit) Assembly Language Reverse Engineering x64dbg debugging Modifying programs Injecting code into 64-bit exe files Hollowing out 64-bit exe files 64-bit registers 64-bit memory read and write access x64 calling conventions Creating x64 functions Creating keygens Reversing program code logic Trace highlighting and animation Stack manipulation Comment tracing debug technique Hooking WinAPI debug technique File Patching Enabling disabled buttons Removing Nag Screens Loop tracing techniques Defeating Anti-Debugger protection Reversing binary without strings Using Python to write Loaders and Memory Patcher Reversing Software Protected Binary without unpacking Requirements: Completed the first course in this series: Assembly Language Programming for Reverse Engineering Windows OS running Intel x86_86 architecture Oracle VirtualBox Running Windows 10 or 11 virtual machine Description: Who this course is for: Students who have completed my first course in this series: Assembly Language Programming for Reverse Engineering Anyone who already know x86 Assembly (32-bit) and want to learn x64 (64-bit) Assembly from a hacker's perspective Security researchers