الفريق العربي للهندسة العكسية

نسخة كاملة : Windows GUI Programs
أنت حالياً تتصفح نسخة خفيفة من المنتدى . مشاهدة نسخة كاملة مع جميع الأشكال الجمالية .
[صورة مرفقة: gui2.png.534a216da7a2c540aa62b80bc595f014.png]
 Size: 3.00 GB
Description

In the first course in this series entitled x64dbg Debugger for Beginners (https://www.at4re.net/f/thread-3519.html), you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme’s that I have written for you to practice reversing.

What you will learn:
How to disassemble programs into assembly code
Dynamic Analysis
Setting breakpoints and stepping through code
Modify program behaviour
Patching programs
Intermodular Call Method
Call Stack Method
Hardware Breakpoints
Memory Patching
Patching EAX register values
Understanding Trial Period software
Understanding Software Registration process

HOMEPAGE – https://www.udemy.com/course/reverse-eng...w-program/

 
https://drive.google.com/file/d/11JhvokcX2zdIa8TmddQ0f0xCtyNSvByI/view?usp=share_link

Password: revteam.re