x64 Assembly Language and Reverse Engineering Practicals
Understand x64 (64-bit) assembly code and apply knowledge to reversing x86 and x64 programs
Created by Paul Chin | 13 hours on-demand video course
If you’ve been using debuggers to reverse-engineer programs and wish you had a better understanding of Assembly Language, or if you’re just looking to learn Assembly Language in a fun and exciting way, then this x64 Assembly Language and Reverse Engineering Practicals course is for you. Embark on a journey to master the intricacies of x64 assembly language with this specialized course, designed for those aiming to elevate their reverse engineering skills.
This is the second course in this series after the first one: Assembly Language Programming for Reverse Engineering. In that earlier course the focus was on x86 basics where we covered 32-bit assembly. In this x64 Assembly Language and Reverse Engineering course, we continue the journey by learning x64 (64-bit assembly). In the second half of this course, we will apply all the knowledge from the first course, as well as new insights from this course, to hands-on reverse-engineering exercises with executable binaries. Taking the first course is preferable but not mandatory. You could just jump straight into this x64 course and learn the differences with x86 as you go along.
What you’ll learn
- x64 (64-bit) Assembly Language
- Reverse Engineering
- x64dbg debugging
- Modifying programs
- Injecting code into 64-bit exe files
- Hollowing out 64-bit exe files
- 64-bit registers
- 64-bit memory read and write access
- x64 calling conventions
- Creating x64 functions
- Password phishing without strings
- Creating keygens
- Reversing program code logic
- Trace highlighting and animation
- Stack manipulation
- Comment tracing debug technique
- Hooking WinAPI debug technique
- File Patching
- Enabling disabled buttons
- Removing Nag Screens
- Deep Tracing to Phish out passwords
- Loop tracing techniques
- Defeating Anti-Debugger protection
- Reversing binary without strings
- Using Python to write Loaders and Memory Patcher
- Reversing Software Protected Binary without unpacking
- and more . .
Recommended Course by Paul Chin
Assembly Language Programming for Reverse Engineering Best seller
Reverse Engineering and Malware Analysis Fundamentals Best seller
Who this course is for:
- Students who have completed my first course in this series: Assembly Language Programming for Reverse Engineering
- Anyone who already know x86 Assembly (32-bit) and want to learn x64 (64-bit) Assembly from a hacker’s perspective
- Security researchers