# Reverse Engineering Tutorial
A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
# PROMOTIONAL VIDEO - WATCH NOW HERE (opens new window) ON YOUTUBE
# Lesson 1: Assembly Language - Basic Malware Reverse Engineering (Part 1: Goals)
This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 2: Assembly Language - Basic Malware Reverse Engineering (Part 2: Techniques)
This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 3: Assembly Language - Basic Malware Reverse Engineering (Part 3: Types Of Malware)
This tutorial will address the basic forms of malware and how they work in simple terms.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 4: Assembly Language - Basic Malware Reverse Engineering (Part 4: x86 Assembly Intro)
This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 5: Assembly Language - Basic Malware Reverse Engineering (Part 5: Binary Number System)
This tutorial will address the very basics of the binary number system.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 6: Assembly Language - Basic Malware Reverse Engineering (Part 6: Hexadecimal Number System)
This tutorial will address the very basics of the hexadecimal number system.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 7: Assembly Language - Basic Malware Reverse Engineering (Part 7: Transistors And Memory)
This tutorial will address the basics of transistors and memory.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 8: Assembly Language - Basic Malware Reverse Engineering (Part 8 - Bytes, Words, Double Words, etc...)
This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 9: Assembly Language - Basic Malware Reverse Engineering (Part 9: x86 Basic Architecture)
This tutorial will address the basic architecture of an x86 processor.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 10: Assembly Language - Basic Malware Reverse Engineering (Part 10: General-purpose Registers)
This tutorial will address the general purpose x86 registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 11: Assembly Language - Basic Malware Reverse Engineering (Part 11: Segment Registers)
This tutorial will address the x86 segment registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 12: Assembly Language - Basic Malware Reverse Engineering (Part 12: Instruction Pointer Register)
This tutorial will address the x86 instruction pointer register.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 13: Assembly Language - Basic Malware Reverse Engineering (Part 13: Control Registers)
This tutorial will address the x86 control registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 14: Assembly Language - Basic Malware Reverse Engineering (Part 14: Flags)
This tutorial will address the status, control and systems flags.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 15: Assembly Language - Basic Malware Reverse Engineering (Part 15: Stack)
This tutorial will address the stack.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 16: Assembly Language - Basic Malware Reverse Engineering (Part 16: Heap)
This tutorial will address the heap.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 17: Assembly Language - Basic Malware Reverse Engineering (Part 17 – How To Install Linux)
This tutorial will address how to install Ubuntu Linux on both Windows and MAC.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 18: Assembly Language - Basic Malware Reverse Engineering (Part 18 - vim Text Editor)
This tutorial will address how to install the vim text editor.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 19: Assembly Language - Basic Malware Reverse Engineering (Part 19 - Why Learn Assembly)
This tutorial will address the age old question of why to bother understanding the basics of Assembly Language.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 20: Assembly Language - Basic Malware Reverse Engineering (Part 20 - Instruction Code Handling)
This tutorial will address op codes and instruction code handling.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 21: Assembly Language - Basic Malware Reverse Engineering (Part 21 - How To Compile A Program)
This tutorial will address how to compile a basic x86 Assembly Program.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 22: Assembly Language - Basic Malware Reverse Engineering (Part 22 - ASM Program 1 [Moving Immediate Data])
This tutorial will address how to create our first real Assembly Program by moving immediate data.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 23: Assembly Language - Basic Malware Reverse Engineering (Part 23 - ASM Debugging 1 [Moving Immediate Data])
This tutorial will address how to debug our first real Assembly Program by moving immediate data.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 24: Assembly Language - Basic Malware Reverse Engineering (Part 24 - ASM Hacking 1 [Moving Immediate Data])
This tutorial will address how to hack our first real Assembly Program by moving immediate data.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 25: Assembly Language - Basic Malware Reverse Engineering (Part 25 - ASM Program 2 [Moving Data Between Registers])
This tutorial will address how to create our second real Assembly Program by moving between registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 26: Assembly Language - Basic Malware Reverse Engineering (Part 26 - ASM Debugging 2 [Moving Data Between Registers])
This tutorial will address how to debug our second real Assembly Program by moving between registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 27: Assembly Language - Basic Malware Reverse Engineering (Part 27 - ASM Hacking 2 [Moving Data Between Registers])
This tutorial will address how to hack our second real Assembly Program by moving between registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 28: Assembly Language - Basic Malware Reverse Engineering (Part 28 - ASM Program 3 [Moving Data Between Memory And Registers])
This tutorial will address how to create our third real Assembly Program by moving between memory and registers
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 29: Assembly Language - Basic Malware Reverse Engineering (Part 29 - ASM Debugging 3 [Moving Data Between Memory And Registers])
This tutorial will address how to debug our third real Assembly Program by moving between memory and registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 30: Assembly Language - Basic Malware Reverse Engineering (Part 30 - ASM Hacking 3 [Moving Data Between Memory And Registers])
This tutorial will address how to hack our third real Assembly Program by moving between memory and registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 31: Assembly Language - Basic Malware Reverse Engineering (Part 31 - ASM Program 4 [Moving Data Between Registers And Memory])
This tutorial will address how to create our fourth real Assembly Program by moving between registers and memory.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 32: Assembly Language - Basic Malware Reverse Engineering (Part 32 - ASM Debugging 4 [Moving Data Between Registers And Memory])
This tutorial will address how to debug our fourth real Assembly Program by moving between registers and memory.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 33: Assembly Language - Basic Malware Reverse Engineering (Part 33 - ASM Hacking 4 [Moving Data Between Registers And Memory])
This tutorial will address how to hack our fourth real Assembly Program by moving between registers and memory.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 34: Assembly Language - Basic Malware Reverse Engineering (Part 34 - ASM Program 5 [Indirect Addressing With Registers])
This tutorial will address how to create our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 35: Assembly Language - Basic Malware Reverse Engineering (Part 35 - ASM Debugging 5 [Indirect Addressing With Registers])
This tutorial will address how to debug our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 36: Assembly Language - Basic Malware Reverse Engineering (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers])
This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 37: Assembly Language - Basic Malware Reverse Engineering (Part 37 - ASM Program 6 [CMOV Instructions])
This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 38: Assembly Language - Basic Malware Reverse Engineering (Part 38 - ASM Debugging 6 [CMOV Instructions])
This tutorial will address how to debug our sixth real Assembly Program with CMOV instructions.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 39: Assembly Language - Basic Malware Reverse Engineering (Part 39 - ASM Hacking 6 [CMOV Instructions])
This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 40: Assembly Language - Basic Malware Reverse Engineering (Part 40 - Conclusion)
This tutorial will conclude this x86 tutorial.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 41: ARM Assembly (Part 1 – The Meaning Of Life)
This tutorial will introduce our ARM Assembly tutorial series.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 42: ARM Assembly (Part 2 - Number Systems)
This tutorial will discuss number systems such as binary, decimal and hexadecimal in detail.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 43: ARM Assembly (Part 3 - Binary Addition)
This tutorial will discuss binary addition.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 44: ARM Assembly (Part 4 - Binary Subtraction)
This tutorial will discuss binary subtraction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 45: ARM Assembly (Part 5 - Word Lengths)
This tutorial will discuss word lengths.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 46: ARM Assembly (Part 6 - Registers)
This tutorial will discuss registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 47: ARM Assembly (Part 7 - Program Counter)
This tutorial will discuss the program counter.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 48: ARM Assembly (Part 8 - CPSR)
This tutorial will discuss the CPSR.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 49: ARM Assembly (Part 9 - Link Register)
This tutorial will discuss the Link Register.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 50: ARM Assembly (Part 10 - Stack Pointer)
This tutorial will discuss the Stack Pointer.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 51: ARM Assembly (Part 11 - ARM Firmware Boot Procedures)
This tutorial will discuss ARM Firmware Boot Procedures.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 52: ARM Assembly (Part 12 - Von Neumann Architecture)
This tutorial will discuss Von Neumann Architecture.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 53: ARM Assembly (Part 13 - Instruction Pipeline)
This tutorial will discuss the instruction pipeline.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 54: ARM Assembly (Part 14 - ADD)
This tutorial will discuss the add instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 55: ARM Assembly (Part 15 - Debugging ADD)
This tutorial will discuss debugging the add instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 56: ARM Assembly (Part 16 - Hacking ADD)
This tutorial will discuss hacking the add instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 57: ARM Assembly (Part 17 - ADDS)
This tutorial will discuss the adds instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 58: ARM Assembly (Part 18 – Debugging ADDS)
This tutorial will discuss debugging the adds instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 59: ARM Assembly (Part 19 – Hacking ADDS)
This tutorial will discuss hacking the adds instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 60: ARM Assembly (Part 20 – ADC)
This tutorial will discuss the ADC instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 61: ARM Assembly (Part 21 – Debugging ADC)
This tutorial will discuss debugging the ADC instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 62: ARM Assembly (Part 22 – Hacking ADC)
This tutorial will discuss hacking the ADC instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 63: ARM Assembly (Part 23 – SUB)
This tutorial will discuss the SUB instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 64: ARM Assembly (Part 24 – Debugging SUB)
This tutorial will discuss debugging the SUB instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 65: ARM Assembly (Part 25 – Hacking SUB)
This tutorial will discuss hacking the SUB instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 66: ARM Reverse Engineering (Part 1 – The Meaning Of Life Part 2)
This tutorial will introduce our ARM Reverse Engineering course.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 67: ARM Reverse Engineering (Part 2 – Number Systems)
This tutorial will discuss number systems.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 68: ARM Reverse Engineering (Part 3 – Binary Addition)
This tutorial will discuss binary addition.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 69: ARM Reverse Engineering (Part 4 – Binary Subtraction)
This tutorial will discuss binary subtraction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 70: ARM Reverse Engineering (Part 5 – Word Lengths)
This tutorial will discuss word lengths.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 71: ARM Reverse Engineering (Part 6 – Registers)
This tutorial will discuss registers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 72: ARM Reverse Engineering (Part 7 – Program Counter)
This tutorial will discuss program counter.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 73: ARM Reverse Engineering (Part 8 - CPSR)
This tutorial will discuss the CPSR.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 74: ARM Reverse Engineering (Part 9 - Link Register)
This tutorial will discuss the link register.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 75: ARM Reverse Engineering (Part 10 - Stack Pointer)
This tutorial will discuss the stack pointer.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 76: ARM Reverse Engineering (Part 11 - Firmware Boot Procedures)
This tutorial will discuss the firmware boot procedures.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 77: ARM Reverse Engineering (Part 12 - Von Neumann Architecture)
This tutorial will discuss the Von Neumann Architecture.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 78: ARM Reverse Engineering (Part 13 - Instruction Pipeline)
This tutorial will discuss the instruction pipeline.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 79: ARM Reverse Engineering (Part 14 - Hello World)
This tutorial will discuss the basics of a hello world program in ARM 32-bit.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 80: ARM Reverse Engineering (Part 15 - Debugging Hello World)
This tutorial will discuss debugging hello world.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 81: ARM Reverse Engineering (Part 16 - Hacking Hello World)
This tutorial will discuss hacking hello world.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 82: ARM Reverse Engineering (Part 17 - Constants)
This tutorial will discuss constants.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 83: ARM Reverse Engineering (Part 18 – Debugging Constants)
This tutorial will discuss debugging constants.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 84: ARM Reverse Engineering (Part 19 – Hacking Constants)
This tutorial will discuss hacking constants.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 85: ARM Reverse Engineering (Part 20 – Character Variables)
This tutorial will discuss character variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 86: ARM Reverse Engineering (Part 21 – Debugging Character Variables)
This tutorial will discuss debugging character variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 87: ARM Reverse Engineering (Part 22 – Hacking Character Variables)
This tutorial will discuss hacking character variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 88: ARM Reverse Engineering (Part 23 – Boolean Variables)
This tutorial will discuss boolean variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 89: ARM Reverse Engineering (Part 24 – Debugging Boolean Variables)
This tutorial will discuss debugging boolean variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 90: ARM Reverse Engineering (Part 25 – Hacking Boolean Variables)
This tutorial will discuss hacking boolean variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 91: ARM Reverse Engineering (Part 26 – Integer Variables)
This tutorial will discuss integer variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 92: ARM Reverse Engineering (Part 27 – Debugging Integer Variables)
This tutorial will discuss debugging integer variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 93: ARM Reverse Engineering (Part 28 – Hacking Integer Variables)
This tutorial will discuss hacking integer variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 94: ARM Reverse Engineering (Part 29 – Float Variables)
This tutorial will discuss float variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 95: ARM Reverse Engineering (Part 30 – Debugging Float Variables)
This tutorial will discuss debugging float variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 96: ARM Reverse Engineering (Part 31 – Hacking Float Variables)
This tutorial will discuss hacking float variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 97: ARM Reverse Engineering (Part 32 – Double Variables)
This tutorial will discuss double variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 98: ARM Reverse Engineering (Part 33 – Debugging Double Variables)
This tutorial will discuss debugging double variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 99: ARM Reverse Engineering (Part 34 – Hacking Double Variables)
This tutorial will discuss hacking double variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 100: ARM Reverse Engineering (Part 35 – SizeOf Operator)
This tutorial will discuss the sizeof operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 101: ARM Reverse Engineering (Part 36 – Debugging SizeOf Operator)
This tutorial will discuss debugging sizeof operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 102: ARM Reverse Engineering (Part 37 – Hacking SizeOf Operator)
This tutorial will discuss hacking sizeof operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 103: ARM Reverse Engineering (Part 38 – Pre-Increment Operator)
This tutorial will discuss the pre-increment operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 104: ARM Reverse Engineering (Part 39 – Debugging Pre-Increment Operator)
This tutorial will discuss debugging pre-increment operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 105: ARM Reverse Engineering (Part 40 – Hacking Pre-Increment Operator)
This tutorial will discuss hacking pre-increment operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 106: ARM Reverse Engineering (Part 41 – Post-Increment Operator)
This tutorial will discuss the post-increment operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 107: ARM Reverse Engineering (Part 42 – Debugging Post-Increment Operator)
This tutorial will discuss debugging post-increment operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 108: ARM Reverse Engineering (Part 43 – Hacking Post-Increment Operator)
This tutorial will discuss hacking post-increment operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 109: ARM Reverse Engineering (Part 44 – Pre-Decrement Operator)
This tutorial will discuss the pre-decrement operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 110: ARM Reverse Engineering (Part 45 – Debugging Pre-Decrement Operator)
This tutorial will discuss debugging pre-decrement operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 111: ARM Reverse Engineering (Part 46 – Hacking Pre-Decrement Operator)
This tutorial will discuss hacking pre-decrement operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-46-hacking-pre-decrement-kevin-m-thomas/ to read the article on LinkedIn.
# Lesson 112: ARM Reverse Engineering (Part 47 – Post-Decrement Operator)
This tutorial will discuss post-decrement operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 113: ARM Reverse Engineering (Part 48 – Debugging Post-Decrement Operator)
This tutorial will discuss debugging post-decrement operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 114: ARM Reverse Engineering (Part 49 – Hacking Post-Decrement Operator)
This tutorial will discuss hacking post-decrement operator.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 115: x64 Reverse Engineering (Part 1 – The Cyber Revolution)
This tutorial will discuss the cyber revolution.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 116: x64 Reverse Engineering (Part 2 - Transistors)
This tutorial will discuss transistors.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 117: x64 Reverse Engineering (Part 3 - Logic Gates)
This tutorial will discuss logic gates.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 118: x64 Reverse Engineering (Part 4 - Number Systems)
This tutorial will discuss number systems.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 119: x64 Reverse Engineering (Part 5 - Binary Addition)
This tutorial will discuss binary addition.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 120: x64 Reverse Engineering (Part 6 - Binary Subtraction)
This tutorial will discuss binary subtraction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 121: x64 Reverse Engineering (Part 7 - Word Lengths)
This tutorial will discuss word lengths.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 122: x64 Reverse Engineering (Part 8 - General Architecture)
This tutorial will discuss the general architecture.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 123: x64 Reverse Engineering (Part 9 - Calling Conventions)
This tutorial will discuss calling conventions.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 124: x64 Reverse Engineering (Part 10 - Boolean Instructions)
This tutorial will discuss boolean instructions.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 125: x64 Reverse Engineering (Part 11 - Pointers)
This tutorial will discuss pointers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 126: x64 Reverse Engineering (Part 12 - Load Effective Address)
This tutorial will discuss load effective address.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 127: x64 Reverse Engineering (Part 13 - The Data Segment)
This tutorial will discuss the data segment.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 128: x64 Reverse Engineering (Part 14 - SHL Instruction)
This tutorial will discuss the shl instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 129: x64 Reverse Engineering (Part 15 - SHR Instruction)
This tutorial will discuss the shr instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 130: x64 Reverse Engineering (Part 16 - ROL Instruction)
This tutorial will discuss rol instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 131: x64 Reverse Engineering (Part 17 - ROR Instruction)
This tutorial will discuss the ror instruction.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 132: x64 Reverse Engineering (Part 18 - Boot Sector Basics [Part 1])
This tutorial will discuss boot sector basics.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 133: x64 Reverse Engineering (Part 19 - Boot Sector Basics [Part 2])
This tutorial will discuss more boot sector basics.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 134: x64 Reverse Engineering (Part 20 - Boot Sector Basics [Part 3])
This tutorial will discuss more boot sector basics.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 135: x64 Reverse Engineering (Part 21 - Boot Sector Basics [Part 4])
This tutorial will discuss more boot sector basics.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 136: x64 Reverse Engineering (Part 22 - Boot Sector Basics [Part 5])
This tutorial will discuss more boot sector basics.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 137: x64 Reverse Engineering (Part 23 - Boot Sector Basics [Part 6])
This tutorial will discuss more boot sector basics.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 138: x64 Reverse Engineering (Part 24 - Boot Sector Basics [Part 7])
This tutorial will discuss more boot sector basics.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 139: x64 Reverse Engineering (Part 25 - Boot Sector Basics [Part 8])
This tutorial will discuss more boot sector basics.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 140: x64 Reverse Engineering (Part 26 - Boot Sector Basics [Part 9])
This tutorial will discuss more boot sector basics.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 141: x64 Reverse Engineering (Part 27 - x64 Assembly [Part 1])
This tutorial will discuss x64 assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 142: x64 Reverse Engineering (Part 28 - x64 Assembly [Part 2])
This tutorial will discuss more x64 assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 143: x64 Reverse Engineering (Part 29 - x64 Assembly [Part 3])
This tutorial will discuss more x64 assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 144: x64 Reverse Engineering (Part 30 - x64 Assembly [Part 4])
This tutorial will discuss more x64 assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 145: x64 Reverse Engineering (Part 31 - x64 Assembly [Part 5])
This tutorial will discuss more x64 assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 146: x64 Reverse Engineering (Part 32 - x64 Assembly [Part 6])
This tutorial will discuss more x64 assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 147: x64 Reverse Engineering (Part 33 - x64 Assembly [Part 7])
This tutorial will discuss more x64 assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 148: x64 Reverse Engineering (Part 34 - x64 C++ 1 Code [Part 1])
This tutorial will discuss c++ code as it relates to 64-bit assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 149: x64 Reverse Engineering (Part 35 - x64 C++ 2 Debug [Part 2])
This tutorial will discuss more c++ code as it relates to 64-bit assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 150: x64 Reverse Engineering (Part 36 - x64 C++ 3 Hacking [Part 3])
This tutorial will discuss more c++ code as it relates to 64-bit assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 151: x64 Reverse Engineering (Part 37 - x64 C & Genesis Of Life)
This tutorial will discuss c and how it relates to x64 assembly.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 152: x64 Reverse Engineering (Part 38 - x64 Networking Basics)
This tutorial will discuss x64 networking basics.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 153: x64 Reverse Engineering (Part 39 - Why C?)
This tutorial will discuss the power of the c language.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 154: x64 Reverse Engineering (Part 40 - Hacking Hello World!)
This tutorial will discuss hacking hello world.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 155: x64 Reverse Engineering (Part 41 - Hacking Variables!)
This tutorial will discuss hacking variables.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 156: x64 Reverse Engineering (Part 42 - Hacking Branches!)
This tutorial will discuss hacking branches.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 157: x64 Reverse Engineering (Part 43 - Hacking Pointers!)
This tutorial will discuss hacking pointers.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 158: Hacking C++ ARM 64 (Part 1 - The Meaning Of Life)
In this lesson we will discuss the course concepts and the meaning of life.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 159: Hacking C++ ARM 64 (Part 2 - Development Setup)
In this lesson we will discuss how to set up our development in 64-bit ARM with Kali Linux.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 160: Hacking C++ ARM 64 (Part 3 - "Hello World")
In this lesson we will discuss how to write and compile a simple hello world program in C++.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 161: Hacking C++ ARM 64 (Part 4 - Debugging "Hello World")
In this lesson we will debug our simple hello world program.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 162: Hacking C++ ARM 64 (Part 5 - Hacking "Hello World")
In this lesson we will hack our simple hello world program.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 163: Hacking C++ ARM 64 (Part 6 - Basic I/O)
In this lesson we will discuss how to write and compile a simple basicio program in C++ and discuss basic input validation.
-> Click HERE (opens new window) to read the article on LinkedIn.
# Lesson 164: COMING SOON!
# Supplimental 32-bit ARM - Hacking Hello World
This tutorial hacks a 32-bit ARM hello world program.
-> Click HERE (opens new window) to read the GitHub tutorial.
# Supplimental 32-bit ARM - Hacking Int
This tutorial hacks a 32-bit ARM int program.
-> Click HERE (opens new window) to read the GitHub tutorial.
# Supplimental 32-bit ARM - Hacking Float
This tutorial hacks a 32-bit ARM float program.
-> Click HERE (opens new window) to read the GitHub tutorial.
# Supplimental 32-bit ARM - Hacking Double
This tutorial hacks a 32-bit ARM double program.
-> Click HERE (opens new window) to read the GitHub tutorial.
# Supplimental 32-bit ARM - Hacking Char
This tutorial hacks a 32-bit ARM char program.
-> Click HERE (opens new window) to read the GitHub tutorial.
# Supplimental 32-bit ARM - Hacking Char Pointer
This tutorial hacks a 32-bit ARM char pointer program.
-> Click HERE (opens new window) to read the GitHub tutorial.