protectaccount
Advanced Member
- Joined
- December 27, 2025
- Messages
- 354
- Reaction score
- 276
- Points
- 63
- Thread Author
- #1
What you will learn:
How to disassemble programs into assembly code
Dynamic Analysis
Setting breakpoints and stepping through code
Modify program behaviour
Patching programs
Intermodular Call Method
Call Stack Method
Hardware Breakpoints
Memory Patching
Patching EAX register values
Understanding Trial Period software
Understanding Software Registration process
Thank you and see you inside.
Who this course is for:
Computing students who want to learn how to disassemble and debug windows programs
Anyone who is interested in reverse engineering
Programmers who want to know how to fix bugs in programs without the source code
Requirements:
Preferably have Completed Reverse Engineering 1: x64dbg Debugger for Beginners, or already know how to use x64dbg
Windows PC
What you’ll learn:
Disassemble windows programs
Reversing jumps
Patching
Debugging windows programs
Solving crackme’s
NOP instructions
Modifying EAX register values
Setting Hardware Breakpoints
Memory Patching
Intermodular Call Method
Call Stack Method
Understand how Trial Period works
Understand how Software Registration process works
Remove Nag Screens
To see this hidden content, you must reply and react with one of the following reactions :
Like