What is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
What is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
What is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
What is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
okayWhat is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
wowWhat is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
What is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
CoolWhat is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
HwWhat is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
..What is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
niceWhat is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
What is Reverse Engineering?
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
Olly + assembler + patching a basic reverseme Keyfiling the reverseme + assembler Basic nag removal + header problems Basic + aesthetic patching Comparing on changes in cond jumps, animate over/in, breakpoints “The plain stupid patching method”, searching for textstrings Intermediate level patching, Kanal in PEiD Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor Explaining the Visual Basic concept, introduction to SmartCheck and configuration Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick Intermediate patching using Olly’s “pane window” Guiding a program by multiple patching. The use of API’s in software, avoiding doublechecking tricks More difficult schemes and an introduction to inline patching How to study behaviour in the code, continued inlining using a pointer Reversing using resources Insights and practice in basic (self)keygenning Diversion code, encryption/decryption, selfmodifying code and polymorphism Debugger detected and anti-anti-techniques Packers and protectors : an introduction Imports rebuilding API Redirection Stolen bytes Patching at runtime using loaders from lena151 original Continued patching at runtime & unpacking armadillo standard protection Machine specific loaders, unpacking & debugging armadillo tElock + advanced patching Bypassing & killing server checks Killing & inlining a more difficult server check SFX, Run Trace & more advanced string searching Delphi in Olly & DeDe Author tricks, HIEW & approaches in inline patching The FPU, integrity checks & loader versus patcher Reversing techniques in packed software & a S&R loader for ASProtect Inlining inside polymorphic code Keygenning <— (This one i liked the most) In-depth unpacking & anti-anti-debugging a combination packer / protector Unpacking continued & debugger detection by DLL’s and TLS Inlining a blowfish scheme in a packed & CRC protected dll
[Hidden content]
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?