Jump to content
Tuts 4 You

About This File

R4ndom’s Beginning Reverse Engineering Tutorials

Tutorial #1 -    What is reverse engineering?
Tutorial #2 -    Introducing OllyDBG
Tutorial #3 -    Using OllyDBG, Part 1
Tutorial #4 -    Using OllyDBG, Part 2
Tutorial #5 -    Our First (Sort Of) Crack
Tutorial #6 -    Our First (True) Crack
Tutorial #7 -    More Crackmes
Tutorial #8 -    Frame Of Reference
Tutorial #9 -    No Strings Attached
Tutorial #10 -    The Levels of Patching
Tutorial #11 -    Breaking In Our Noob Skills
Tutorial #12 -    A Tougher NOOBy Example
Tutorial #13 -    Cracking a Real Program
Tutorial #14 -    How to remove nag screens
Tutorial #15 -    Using the Call Stack.
Tutorial #16A -    Dealing with Windows Messages.
Tutorial #16B -    Self Modifying Code.
Tutorial #16C -    Bruteforcing.
Tutorial #17 -    Working with Delphi Binaries.
Tutorial #18 -  Time Trials and Hardware Breakpoints.
Tutorial #19 -    Creating patchers.
Tutorial #20A -    Dealing with Visual Basic Binaries, Part 1.
Tutorial #20B -    Dealing with Visual Basic Binaries, Part 2.
Tutorial #21 -    Anti-Debugging Techniques.
Tutorial #22 -    Code Caves and PE Sections.
Tutorial #23 -    TLS Callbacks.

Modifying Binaries For Fun And Profit

Adding a Splash Screen -    Creating a code cave to show a custom splash on an application
Adding a Menu Item -    Adding a menu item to an existing binary.
Making a Window Non-Closeable -    Making a Window Non-Closeable.
The Never Ending Program -    Opening message boxes every time a user tries to close a program.
DLL Injection 1 -    Adding an opening message box through DLL injection.
DLL Injection 2 -    Adding a splash bitmap through DLL injection.

R4ndom’s Guide to RadASM

Installing and setting up -    Installing RadASM and configuring the environment.
Creating our first project -    Creating our first project.
Adding an Icon and Menu -    Adding an Icon and Menu.

Miscellaneous

The Reverse Engineer’s Toolkit -    Tools every reverse engineer should know about.
Shrinking C++ Binaries -    Shrinking binaries through Visual Studio.

Other Tutorials

Author     Tutorial     
XOR06     Cracking DriverFinder
nwokiller     Unpacking PELock v1.06
XOR06     Bypassing a keyfile
XOR06     Bypassing a Serial and server Check
XOR06     Bypassing a Serial in a Delphi Binary
XOR06     Finding a serial using bitmaps.
XOR06     Easy unpacking.
XOR06     Where and How to pacth a serial routine.
XOR06     Patching a server check, 30 day time trial, and a nag.
XOR06     Serialfishing a correct serial.
XOR06     Another way of finding the patch.
XOR06     Why it’s so important to search for pointers.
XOR06     .NET Crackme with tutorial
XOR06     .NET Crackme (no tutorial)

 

  • Like 1

User Feedback

Recommended Comments

There are no comments to display.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...