سرفصل های مجموعه : What is reverse engineering? Introducing OllyDBG Using OllyDBG, Part 1 Using OllyDBG, Part 2 Our First (Sort Of) Crack Our First (True) Crack More Crackmes Frame Of Reference No Strings Attached Solution to “No Strings Attached” The Levels of Patching Breaking In Our Noob Skills A Tougher NOOBy Example Cracking a Real Program How to remove nag screens Using the Call Stack Dealing with Windows Messages Self Modifying Code Bruteforcing. Working with Delphi Binaries Time Trials and Hardware Breakpoints Creating patchers Dealing with Visual Basic Binaries, Part 1 Dealing with Visual Basic Binaries, Part 2 Anti-Debugging Techniques Code Caves and PE Sections TLS Callbacks آموزش های تکمیلی :‌ Creating a code cave to show a custom splash on an application Adding a menu item to an existing binary. Making a Window Non-Closeable. Opening message boxes every time a user tries to close a program. Adding an opening message box through DLL injection Adding a splash bitmap through DLL injection Cracking DriverFinder Unpacking PELock v1.06 Bypassing a keyfile Bypassing a Serial and server Check Bypassing a Serial in a Delphi Binary Finding a serial using bitmaps. Easy unpacking. Where and How to pacth a serial routine. Patching a server check, 30 day time trial, and a nag. Serialfishing a correct serial. Another way of finding the patch Why it’s so important to search for pointers. .NET Crackme with tutorial .NET Crackme (no tutorial)