Course Reverse Engineering 2: Windows GUI Programs

protectaccount

protectaccount

Advanced Member
Joined
December 27, 2025
Messages
354
Reaction score
272
Points
63
Ou-Atzdyu-Og-RBW4JSzhs-WKrc2i50m4DRJ.jpg

In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme’s that I have written for you to practice reversing.

What you will learn:


How to disassemble programs into assembly code
Dynamic Analysis
Setting breakpoints and stepping through code
Modify program behaviour
Patching programs
Intermodular Call Method
Call Stack Method
Hardware Breakpoints
Memory Patching
Patching EAX register values
Understanding Trial Period software
Understanding Software Registration process
Thank you and see you inside.


Who this course is for:


Computing students who want to learn how to disassemble and debug windows programs
Anyone who is interested in reverse engineering
Programmers who want to know how to fix bugs in programs without the source code

Requirements:


Preferably have Completed Reverse Engineering 1: x64dbg Debugger for Beginners, or already know how to use x64dbg
Windows PC


What you’ll learn:

Disassemble windows programs
Reversing jumps
Patching
Debugging windows programs
Solving crackme’s
NOP instructions
Modifying EAX register values
Setting Hardware Breakpoints
Memory Patching
Intermodular Call Method
Call Stack Method
Understand how Trial Period works
Understand how Software Registration process works
Remove Nag Screens


To see this hidden content, you must reply and react with one of the following reactions : Like Like
 
  • Like
Reactions: B0nB0n2
B

B0nB0n2

Advanced Member
Joined
January 10, 2026
Messages
195
Reaction score
2
Points
18
  • Tags
    course reverse engineering reverse engineering windows gui
  • Top