Udemy – x64 Assembly Language and Reverse Engineering Practicals 2024-8

Udemy – x64 Assembly Language and Reverse Engineering Practicals 2024-8 Downloadly IRSpace

Udemy – x64 Assembly Language and Reverse Engineering Practicals 2024-8
Udemy – x64 Assembly Language and Reverse Engineering Practicals 2024-8

x64 Assembly Language and Reverse Engineering Practicals, If you’ve been using debuggers to reverse-engineer programs and wish you had a better understanding of Assembly Language, or if you’re just looking to learn Assembly Language in a fun and exciting way, then this course is for you. Embark on a journey to master the intricacies of x64 assembly language with this specialized course, designed for those aiming to elevate their reverse engineering skills. This is the second course in this series after the first one: Assembly Language Programming for Reverse Engineering. In that earlier course the focus was on x86 basics where we covered 32-bit assembly. In this course, we continue the journey by learning x64 (64-bit assembly). In the second half of this course, we will apply all the knowledge from the first course, as well as new insights from this course, to hands-on reverse-engineering exercises with executable binaries. Taking the first course is preferable but not mandatory. You could just jump straight into this x64 course and learn the differences with x86 as you go along. While traditional assembly language courses focus on writing code from scratch using assemblers like NASM or FASM, they often leave a knowledge gap when it comes to applying that expertise to real-world reverse engineering. This course is tailored to fill this gap, providing you with the knowledge to modify and extend the functionality of existing 32-bit and 64-bit applications.

What you’ll learn

  • x64 (64-bit) Assembly Language
  • Reverse Engineering
  • x64dbg debugging
  • Modifying programs
  • Injecting code into 64-bit exe files
  • Hollowing out 64-bit exe files
  • 64-bit registers
  • 64-bit memory read and write access
  • x64 calling conventions
  • Creating x64 functions
  • Password phishing without strings
  • Creating keygens
  • Reversing program code logic
  • Trace highlighting and animation
  • Stack manipulation
  • Comment tracing debug technique
  • Hooking WinAPI debug technique
  • File Patching
  • Enabling disabled buttons
  • Removing Nag Screens
  • Deep Tracing to Phish out passwords
  • Loop tracing techniques
  • Defeating Anti-Debugger protection

Who this course is for

  • Students who have completed my first course in this series: Assembly Language Programming for Reverse Engineering
  • Anyone who already know x86 Assembly (32-bit) and want to learn x64 (64-bit) Assembly from a hacker’s perspective
  • Security researchers

Specificatoin of x64 Assembly Language and Reverse Engineering Practicals

  • Publisher : Udemy
  • Teacher : Paul Chin
  • Language : English
  • Level : Beginner
  • Number of Course : 108
  • Duration : 13 hours and 14 minutes

Content on 2024-12

x64 Assembly Language and Reverse Engineering Practicals

Requirements

  • Preferably completed the first course in this series: Assembly Language Programming for Reverse Engineering
  • Windows OS running Intel x86_86 architecture
  • Oracle VirtualBox Running Windows 10 or 11 virtual machine

Pictures

x64 Assembly Language and Reverse Engineering Practicals

Sample Clip

Installation Guide

Extract the files and watch with your favorite player

Subtitle : English

Quality: 720p

The 2024/8 version has an increase of 3 lessons and 22 minutes in duration compared to 2024/3. Subtitles have also been added.

Download Links

Download Part 1 – 2 GB

Download Part 2 – 2 GB

Download Part 3 – 2 GB

Download Part 4 – 2 GB

Download Part 5 – 1.88 GB

File size

9.8 GB