A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Join DC540 Discord HERE
turbo-scanner HERE
turbo-attack HERE
DC540 Hacking Challenge 0x00001 HERE
DC540 Hacking Challenge 0x00002 [MicroPython CTF] HERE
DC540 Hacking Challenge 0x00003 [C CTF] HERE
DC540 Hacking Challenge 0x00004 [C CTF] HERE
DC540 Hacking Challenge 0x00005a HERE
DC540 Hacking Challenge 0x00005b [Assembler CTF] HERE
Reverse Engineering E-BOOK HERE
Reverse Engineering PDF HERE
Assembled by @0xInfection (Twitter)
Pico MicroPython Debug Template HERE
C Pico Project Template HERE
MicroPython Pico Project Template HERE
STEM Reverse Engineering Demo HERE
AArch64 Bytes HERE
ToyOS HERE
TOR Everything HERE
Hacking Windows E-BOOK HERE
Go Hacking E-BOOK HERE
Zeek Network Security Monitor HERE
Fundamental C++ PDF HERE
Python For Kids PDF HERE
This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the basic forms of malware and how they work in simple terms.
-> Click HERE to read the article on LinkedIn.
This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the very basics of the binary number system.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the very basics of the hexadecimal number system.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the basics of transistors and memory.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the basic architecture of an x86 processor.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the general purpose x86 registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the x86 segment registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the x86 instruction pointer register.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the x86 control registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the status, control and systems flags.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the stack.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the heap.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to install Ubuntu Linux on both Windows and MAC.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to install the vim text editor.
-> Click HERE to read the article on LinkedIn.
This tutorial will address the age old question of why to bother understanding the basics of Assembly Language.
-> Click HERE to read the article on LinkedIn.
This tutorial will address op codes and instruction code handling.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to compile a basic x86 Assembly Program.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to create our first real Assembly Program by moving immediate data.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to debug our first real Assembly Program by moving immediate data.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to hack our first real Assembly Program by moving immediate data.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to create our second real Assembly Program by moving between registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to debug our second real Assembly Program by moving between registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to hack our second real Assembly Program by moving between registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to create our third real Assembly Program by moving between memory and registers
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to debug our third real Assembly Program by moving between memory and registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to hack our third real Assembly Program by moving between memory and registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to create our fourth real Assembly Program by moving between registers and memory.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to debug our fourth real Assembly Program by moving between registers and memory.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to hack our fourth real Assembly Program by moving between registers and memory.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to create our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to debug our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to debug our sixth real Assembly Program with CMOV instructions.
-> Click HERE to read the article on LinkedIn.
This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.
-> Click HERE to read the article on LinkedIn.
This tutorial will conclude this x86 tutorial.
-> Click HERE to read the article on LinkedIn.
This tutorial will introduce our ARM-32 Course 1 tutorial series.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss number systems such as binary, decimal and hexadecimal in detail.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary addition.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary subtraction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss word lengths.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the program counter.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the CPSR.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the Link Register.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the Stack Pointer.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss ARM Firmware Boot Procedures.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss Von Neumann Architecture.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the instruction pipeline.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the add instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging the add instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking the add instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the adds instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging the adds instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking the adds instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the ADC instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging the ADC instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking the ADC instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the SUB instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging the SUB instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking the SUB instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will introduce our ARM-32 Course 2 course.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss number systems.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary addition.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary subtraction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss word lengths.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss registers.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss program counter.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the CPSR.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the link register.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the stack pointer.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the firmware boot procedures.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the Von Neumann Architecture.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the instruction pipeline.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the basics of a hello world program in ARM 32-bit.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging hello world.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking hello world.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss constants.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging constants.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking constants.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss character variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging character variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking character variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss boolean variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging boolean variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking boolean variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss integer variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging integer variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking integer variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss float variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging float variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking float variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss double variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging double variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking double variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the sizeof operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging sizeof operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking sizeof operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the pre-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging pre-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking pre-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the post-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging post-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking post-increment operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the pre-decrement operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging pre-decrement operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking pre-decrement operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss post-decrement operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss debugging post-decrement operator.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking post-decrement operator.
-> Click HERE to read the article on LinkedIn.
ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux. -> Click HERE to read the project on GitHub.
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux. -> Click HERE to read the project on GitHub.
ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux. -> Click HERE to read the project on GitHub.
ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux. -> Click HERE to read the project on GitHub.
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux. -> Click HERE to read the project on GitHub.
ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux. -> Click HERE to read the project on GitHub.
This tutorial will discuss the cyber revolution.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss transistors.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss logic gates.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss number systems.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary addition.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss binary subtraction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss word lengths.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the general architecture.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss calling conventions.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss boolean instructions.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss pointers.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss load effective address.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the data segment.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the shl instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the shr instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss rol instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the ror instruction.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more boot sector basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss c++ code as it relates to 64-bit assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more c++ code as it relates to 64-bit assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss more c++ code as it relates to 64-bit assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss c and how it relates to x64 assembly.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss x64 networking basics.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss the power of the c language.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking hello world.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking variables.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking branches.
-> Click HERE to read the article on LinkedIn.
This tutorial will discuss hacking pointers.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the course concepts and the meaning of life.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss how to set up our development in 64-bit ARM with Kali Linux.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss how to write and compile a simple hello world program in C++.
-> Click HERE to read the article on LinkedIn.
In this lesson we will debug our simple hello world program.
-> Click HERE to read the article on LinkedIn.
In this lesson we will hack our simple hello world program.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss how to write and compile a simple basicio program in C++ and discuss basic input validation.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss how to debug a simple basicio program in C++ and discuss basic input validation.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss how to hack a simple basicio program in C++ and discuss basic input validation.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the char primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss debugging the char primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss hacking the char primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the boolean primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss debugging the boolean primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss hacking the boolean primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the float primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss debugging the float primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss hacking the float primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the double primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss debugging the double primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss hacking the double primitive datatype.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the basic setup of the development environment for the Raspberry Pi Pico.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the basic Hello World program.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss debugging the basic Hello World program.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss hacking the basic Hello World program.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the char data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss debugging the char data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss hacking the char data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the int data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss debugging the int data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss hacking the int data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the float data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss debugging the float data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss hacking the float data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss the double data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss debugging the double data type.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss hacking the double data type.
-> Click HERE to read the article on LinkedIn.
Lesson 200: Pico Hacking Course (Part 17 - "ABSOLUTE POWER CORRUPTS ABSOLUTELY!", The Tragic Tale Of Input...)
In this lesson we will discuss the concept of proper input handling.
-> Click HERE to read the article on LinkedIn.
Lesson 201: Pico Hacking Course (Part 18 - "FOR 800 YEARS HAVE I TRAINED JEDI!", The FORCE That IS Input...)
In this lesson we will discuss the importance of proper input handling in addition to breaking down our custom input function.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss creating an effective input architecture.
-> Click HERE to read the article on LinkedIn.
In this lesson we will discuss debugging input.
-> Click HERE to read the article on LinkedIn.
In this bite we learn about what happens at the very core of a 32-bit AArch64 instruction by reversing the exit Linux syscall.
-> Click HERE to read the article on Medium.
In this bite we learn about how to handle moving a 64-bit immediate value into a 64-bit register.
-> Click HERE to read the article on Medium.
In this bite we learn how to create a simple parsing algorithm to convert a string's lowercase chars to uppercase, timeless Assembler example.
-> Click HERE to read the article on Medium.
ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.
-> Click HERE
This chapter covers the basics of designing a very simple Windows Assembly Language message box program in pure Assembly for both x86 and x64 architectures.
-> Click HERE to read the FREE pdf book.
This chapter covers the dynamic reverse engineering analysis, debugging, of the Hello World app in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers the dynamic reverse engineering analysis, hacking, of the Hello World app in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers the dynamic reverse engineering analysis, debugging, of the Hello World app in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers the dynamic reverse engineering analysis, hacking, of the Hello World app in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers reviewing the Windows API CreateDirectoryW and RemoveDirectoryW functions in C.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers reviewing the Windows API CopyFileW function in C.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CopyFileW function in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CopyFileW function in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CopyFileW function in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CopyFileW function in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers reviewing the Windows API MoveFileW function in C.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API MoveFileW function in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API MoveFileW function in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API MoveFileW function in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API MoveFileW function in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers reviewing the Windows API CreateFileW function in C.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateFileW function in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateFileW function in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateFileW function in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateFileW function in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers reviewing the Windows API WriteFile function in C.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API WriteFile function in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API WriteFile function in x86 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API WriteFile function in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API WriteFile function in x64 Assembly.
-> Click HERE to read the FREE pdf book.
This chapter covers the basics of setting up a dev environment and basic hello world style Go program for the x64 architecture.
-> Click HERE to read the FREE pdf book.
This chapter covers debugging of the basic hello world style Go program for the x64 architecture.
-> Click HERE to read the FREE pdf book.
This chapter covers hacking of the basic hello world style Go program for the x64 architecture.
-> Click HERE to read the FREE pdf book.
This chapter covers Golang primitive types for the x64 architecture.
-> Click HERE to read the FREE pdf book.
This chapter covers Golang debugging of the primitive types for the x64 architecture.
-> Click HERE to read the FREE pdf book.
This chapter covers Golang hacking of the primitive types for the x64 architecture.
-> Click HERE to read the FREE pdf book.
This chapter covers Golang control flow for the x64 architecture.
-> Click HERE to read the FREE pdf book.
This chapter covers Golang debugging control flow for the x64 architecture.
-> Click HERE to read the FREE pdf book.
IN DEVELOPMENT... MORE TO COME SOON!!!
In this lesson we set up a basic Ubuntu computer connected directly to an inexpensive tap which connects to your home router. I have provided products you can purchase if you do not have existing parts however please feel free to use any network tap of your choosing and/or any additional Ethernet adapters or cables of your choosing.
-> Click HERE to read the article on Medium.
In this lesson we create an alert by logging all notices that Zeek deems worthy of your attention to the notice.log file in addition to sending you an email.
-> Click HERE to read the article on Medium.
In this lesson we will show the source IP addresses and ports and their destination IP addresses and ports.
-> Click HERE to read the article on Medium.
In this lesson we will show the source IP addresses that generated the most network traffic, organized in descending order.
-> Click HERE to read the article on Medium.
In this lesson we will show the destination ports that received the most network traffic, organized in descending order.
-> Click HERE to read the article on Medium.
In this lesson we will show the number of connections per protocol service.
-> Click HERE to read the article on Medium.
In this lesson we will show the distinct browsers used by the hosts.
-> Click HERE to read the article on Medium.
In this lesson we will show the source and destination IP addresses of all UDP and TCP connections that lasted more than 90 seconds.
-> Click HERE to read the article on Medium.
In this lesson we will show whether there any web servers operating on non-standardized ports.
-> Click HERE to read the article on Medium.
In this lesson we will show the state history of connections as a string of letters.
-> Click HERE to read the article on Medium.
In this lesson we will discuss the basics of C++ output.
-> Click HERE to read the FREE pdf book.
Fundamental C++ Course (Chapter 2 - Variables, Constants, Arrays, Vectors, Statements, Operators, Strings)
In this lesson we will discuss variables, constants, arrays, vectors, statements, operators and strings.
-> Click HERE to read the FREE pdf book.
In this lesson we will discuss the basics of program flow.
-> Click HERE to read the FREE pdf book.
In this lesson we will discuss functions.
-> Click HERE to read the FREE pdf book.
In this lesson we will discuss pointers.
-> Click HERE to read the FREE pdf book.
In this lesson we will discuss proper input validation.
-> Click HERE to read the FREE pdf book.
In this lesson we will discuss class basics.
-> Click HERE to read the FREE pdf book.
This lesson will begin with the basic concepts of why kids should learn to program in Python.
-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.
This lesson will step-by-step code our first program to have our little microcontroller say hello to the world!
-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.
This lesson will step-by-step code a FUN image making program where our little microcontroller will make various faces to his new friend.
-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.
This lesson will step-by-step code a FUN program where we will work with numbers and learn about how to make variables with them.
-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.
This lesson will step-by-step code a FUN program where we will work with words and learn about how to make variables with them.
-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.
This lesson will step-by-step code a FUN program where we will work with word lists and learn about how to make variables with them.
-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.
This lesson will step-by-step code a FUN song making program where our little microcontroller will play various songs to his new friend.
-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.
This lesson will step-by-step interact with a FUN talking robot where we can ask him questions and he will respond to us using his voice.
-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.
This lesson will discuss MicroPython basic input and output for the micro:bit.
-> Click HERE to read the lesson in PDF format.
This lesson will discuss MicroPython datatypes and numbers for the micro:bit.
-> Click HERE to read the lesson in PDF format.
This lesson will discuss MicroPython conditional logic and application flow chart design for the micro:bit.
-> Click HERE to read the lesson in PDF format.
This lesson will discuss MicroPython lists, tuples, dictionaries and loops for the micro:bit.
-> Click HERE to read the lesson in PDF format.
This lesson will discuss MicroPython functions for the micro:bit.
-> Click HERE to read the lesson in PDF format.
This lesson will discuss MicroPython classes for the micro:bit.
-> Click HERE to read the lesson in PDF format.
This lesson will discuss MicroPython unittest for the micro:bit.
-> Click HERE to read the lesson in PDF format.