Udemy Reverse Engineering 2 Windows GUI Programs 2022 - 11

0dayddl

U P L O A D E R

359020115_tuto.jpg


Udemy Reverse Engineering 2 Windows GUI Programs 2022-11
Language: English | Size:2.44 GB
Genre:eLearning

Files Included :
001 Introduction.mp4 (16.88 MB)
MP4
001 Introduction to windows gui programs.mp4 (11.95 MB)
MP4
001 Analyzing PE files.mp4 (40.03 MB)
MP4
001 Setting up x64dbg.mp4 (3.86 MB)
MP4
001 Setting breakpoints on strings.mp4 (95.78 MB)
MP4
001 Windows API functions.mp4 (77.41 MB)
MP4
001 Pushing parameters to the stack.mp4 (58.59 MB)
MP4
001 Bypassing messages.mp4 (97.07 MB)
MP4
001 Bypassing using xor assembly.mp4 (116.91 MB)
MP4
001 Breakpoints on Intermodular Calls.mp4 (55.17 MB)
MP4
001 Breakpoints from Call Stack.mp4 (48.76 MB)
MP4
001 Registration file checks.mp4 (4.57 MB)
MP4
001 Analyzing crackme 2.mp4 (32.68 MB)
MP4
001 Registration checks.mp4 (91.43 MB)
MP4
001 Software registration.mp4 (38.81 MB)
MP4
001 Removing Nag screens.mp4 (8.46 MB)
MP4
001 Analyzing crackme 3.mp4 (37.44 MB)
MP4
001 Removing Nag screen 1.mp4 (119.39 MB)
MP4
001 Removing Nag screen 2.mp4 (58.77 MB)
MP4
001 Setting Registration Status.mp4 (82.71 MB)
MP4
001 Trial Periods.mp4 (7.67 MB)
MP4
001 Analyzing Trial Periods.mp4 (15 MB)
MP4
001 059-extending-beyond-30-days.mp4 (49.49 MB)
MP4
001 Extending Trial Periods.mp4 (71.49 MB)
MP4
001 Autogenerated serial keys.mp4 (16.88 MB)
MP4
001 Autogenerated serial keys 2.mp4 (110.18 MB)
MP4
001 Practical Exercise - TDC.mp4 (16.7 MB)
MP4
002 Practical Exercise - TDC - part 2.mp4 (28.14 MB)
MP4
003 Practical Exercise - TDC - part 3.mp4 (107.04 MB)
MP4
001 067-patching-eax-register-values.mp4 (6.6 MB)
MP4
001 Patching EAX register values.mp4 (7.95 MB)
MP4
002 Patching EAX register values - part 2.mp4 (147.67 MB)
MP4
001 Hardware Breakpoints.mp4 (10.11 MB)
MP4
002 Hardware Breakpoints - part 2.mp4 (217.16 MB)
MP4
001 Memory Patching.mp4 (14.26 MB)
MP4
002 Memory Patching - part 2.mp4 (132.81 MB)
MP4
001 xanalyzer-plugins.zip (1.06 MB)
ZIP
001 xAnalyzer.mp4 (58.76 MB)
MP4
002 Configuring xAnalyzer.mp4 (48.87 MB)
MP4
001 Intro to Serial Phishing.mp4 (5.96 MB)
MP4
002 Analyzing the CreateFile API function.mp4 (118.97 MB)
MP4
003 Serial Phising.mp4 (194.64 MB)
MP4
001 Bonus Lecture.mp4 (10.08 MB)
MP4

T1XfeHV3_t.jpg


363506399_rg.png



Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
374886620_1dl.png



Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

f040b69c80414d98b45748dfbbedaa3a.jpg

Reverse Engineering 2: Windows GUI Programs
Last updated 11/2022
Duration: 4h 6m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 2.43 GB
Genre: eLearning | Language: English​

Reverse engineer Windows Graphical User Interface programs with xdbg

What you'll learn
Disassemble windows programs
Reversing jumps
Patching
Debugging windows programs
Solving crackme's
NOP instructions
Modifying EAX register values
Setting Hardware Breakpoints
Memory Patching
Intermodular Call Method
Call Stack Method
Understand how Trial Period works
Understand how Software Registration process works
Remove Nag Screens

Requirements
Preferably have Completed Reverse Engineering 1: x64dbg Debugger for Beginners, or already know how to use x64dbg
Windows PC
Description
In the first course in this series entitled
Reverse Engineering 1:

x64dbg Debugger for Beginners,
you learnt how to reverse engineer a
command line program
and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning
how to reverse engineer graphical user interface programs
. As usual,
we will work with crackme's that I have written for you
to practice reversing.
What you will learn:
How to disassemble programs into assembly code
Dynamic Analysis
Setting breakpoints and stepping through code
Modify program behaviour
Patching programs
Intermodular Call Method
Call Stack Method
Hardware Breakpoints
Memory Patching
Patching EAX register values
Understanding Trial Period software
Understanding Software Registration process
Thank you and see you inside.
Who this course is for:
Computing students who want to learn how to disassemble and debug windows programs
Anyone who is interested in reverse engineering
Programmers who want to know how to fix bugs in programs without the source code

Bitte Anmelden oder Registrieren um Links zu sehen.


bl7MTpjh_o.jpg



TurboBit
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
FileFactory
 
Kommentar

bac1c2c7234a62d4044cbe1f6e414e3e.jpg

Reverse Engineering 2: Windows GUI Programs
Last updated 11/2022
Duration: 4h 6m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 2.43 GB
Genre: eLearning | Language: English​

Reverse engineer Windows Graphical User Interface programs with xdbg

What you'll learn
Disassemble windows programs
Reversing jumps
Patching
Debugging windows programs
Solving crackme's
NOP instructions
Modifying EAX register values
Setting Hardware Breakpoints
Memory Patching
Intermodular Call Method
Call Stack Method
Understand how Trial Period works
Understand how Software Registration process works
Remove Nag Screens

Requirements
Preferably have Completed Reverse Engineering 1: x64dbg Debugger for Beginners, or already know how to use x64dbg
Windows PC
Description
In the first course in this series entitled
Reverse Engineering 1:

x64dbg Debugger for Beginners,
you learnt how to reverse engineer a
command line program
and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning
how to reverse engineer graphical user interface programs
. As usual,
we will work with crackme's that I have written for you
to practice reversing.
What you will learn:
How to disassemble programs into assembly code
Dynamic Analysis
Setting breakpoints and stepping through code
Modify program behaviour
Patching programs
Intermodular Call Method
Call Stack Method
Hardware Breakpoints
Memory Patching
Patching EAX register values
Understanding Trial Period software
Understanding Software Registration process
Thank you and see you inside.
Who this course is for:
Computing students who want to learn how to disassemble and debug windows programs
Anyone who is interested in reverse engineering
Programmers who want to know how to fix bugs in programs without the source code

Bitte Anmelden oder Registrieren um Links zu sehen.


tWF6mjRz_o.jpg



RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
NitroFlare
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
DDownload
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten