Jump to content
Tuts 4 You

About This File

A collection of tutorials aimed particularly for newbie reverse engineers.

01. Olly + assembler + patching a basic reverseme
02. Keyfiling the reverseme + assembler
03. Basic nag removal + header problems 
04. Basic + aesthetic patching
05. Comparing on changes in cond jumps, animate over/in, breakpoints
06. "The plain stupid patching method", searching for textstrings
07. Intermediate level patching, Kanal in PEiD 
08. Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor
09. Explaining the Visual Basic concept, introduction to SmartCheck and configuration
10. Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick
11. Intermediate patching using Olly's "pane window"
12. Guiding a program by multiple patching. 
13. The use of API's in software, avoiding doublechecking tricks
14. More difficult schemes and an introduction to inline patching
15. How to study behaviour in the code, continued inlining using a pointer
16. Reversing using resources
17. Insights and practice in basic (self)keygenning
18. Diversion code, encryption/decryption, selfmodifying code and polymorphism
19. Debugger detected and anti-anti-techniques
20. Packers and protectors : an introduction
21. Imports rebuilding
22. API Redirection
23. Stolen bytes
24. Patching at runtime using loaders from lena151 original
25. Continued patching at runtime & unpacking armadillo standard protection
26. Machine specific loaders, unpacking & debugging armadillo
27. tElock + advanced patching
28. Bypassing & killing server checks
29. Killing & inlining a more difficult server check
30. SFX, Run Trace & more advanced string searching
31. Delphi in Olly & DeDe
32. Author tricks, HIEW & approaches in inline patching
33. The FPU, integrity checks & loader versus patcher
34. Reversing techniques in packed software & a S&R loader for ASProtect
35. Inlining inside polymorphic code
36. Keygenning
37. In-depth unpacking & anti-anti-debugging a combination packer / protector
38. Unpacking continued & debugger detection by DLL's and TLS
39. Inlining a blowfish scheme in a packed & CRC protected dll + unpacking Asprotect SKE 2.2
40. Obfuscation and algorithm hiding

  • Like 29
  • Thanks 10
  • Sad 1

User Feedback

Recommended Comments

IamAJoke2U?

Posted

Really thanks man i am learning this step by step i am really new kid in this. ♥

Nohj

Posted (edited)

This series is a classic. Preserve it for as long as you can!

Edited by Nohj
  • Confused 1
old pizza

Posted

Thanks. I've been looking for this. I had it years ago. 👀

  • Sad 1
0DAYtug

Posted

Thank you !

  • Like 1
Yodaa

Posted

Thank you very much for sharing!

  • Confused 1
cheez

Posted

Thank you for uploading these. I was unable to find them elsewhere.

Rehizner Kother

Posted

Thanks!

  • Like 1
demberto

Posted

Tut 3 - RegisterMe.Oops.exe loads just fine in x64dbg, without any header errors.

Admin-

Posted

I registered just to say thank you for this.

Also, I plan to contribute as much as I can.

If not, then I can at least give likes where they are deserved :)

  • Like 1
  • Confused 1
enrty

Posted

thanks

  • Like 1
kamal kumark

Posted

thx

  • Like 1
Amyy

Posted

dont really always comment but
THANK YOU SOOOOOOOOOO MUCH 

  • Like 1

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...