

**Reverse Engineering 1: x64dbg Debugger for Beginners**
**What You’ll Learn:**
* Debug programs with x64dbg
* Reverse-engineer applications
* Solve CrackMe challenges
* Disassemble programs into assembly code
* Set breakpoints and step through code
* Modify program behavior
* Create software patches
—
**Reverse Engineering 2: Windows GUI Applications**
**What You’ll Learn:**
* Disassemble applications into assembly
* Perform dynamic analysis
* Set breakpoints and step through code
* Modify program behavior
* Create software patches
* Module-to-module calling techniques
* Call stack analysis
* Hardware breakpoints
* Memory patching
* Patching EAX register values
* Understand trial-version software
* Understand software registration processes
—
**Reverse Engineering 3: Software Protection**
**What You’ll Learn:**
* Crack protected programs
* Bypass debuggers
* Create software patches
* Dump memory contents to files
* Use the x64dbg debugger effectively
* Use the ScyllaHide anti-debug plugin
* Three methods to break layered protection
* Handling programs that fail to launch
* Use loaders for patching
* And much more…
—
**Reverse Engineering 4: Decompiling Visual Basic**
**What You’ll Learn:**
* Remove nag screens
* Compile and rebuild VB programs
* Create software patches
* Generate keygens
* Debug VB P-Code
* Work with VB6 P-Code and native code
* Reverse-engineer serial keys
* And more…
—
**Reverse Engineering 5: .NET Reversing with dnSpy**
**What You’ll Learn:**
* Fundamentals of .NET applications
* Install and configure dnSpy
* Patch .NET binaries with dnSpy
* “Phishing” serial numbers
* Generate keygens for .NET apps
* Understand .NET software protection schemes
* Deobfuscate assemblies
* Unpack and dump .NET assemblies
* Prevent .NET programs from being decompiled
* And much more…
—
**Reverse Engineering 6: Static Analysis with x64dbg for Beginners**
**What You’ll Learn:**
* Use x64dbg for static code analysis
* Graphical analysis of code flow
* Essential reverse-engineering tools
* Debug and fix bugs in binaries
* Create software patches
* Mod existing software
—
**Reverse Engineering 7: Ghidra for Beginners**
**What You’ll Learn:**
* Core reverse-engineering concepts
* Ghidra fundamentals
* Solve Linux and Windows CrackMes
* Understand Windows API calls
* Identify entry points, `main` and `WinMain` functions
* Analyze with function graphs and call trees
* Search for and define string references
* Work with Windows API functions
* Generate function call graphs
* Create and modify functions
* Convert data types
* Edit function signatures
* Cross-reference function calls and strings
* And much more…

