❗The content presented here is sourced directly from Udemy platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.
Updated in [July 17th, 2023]
This course, Reverse Engineering Memory Hacking and Software Protection, is designed to teach students how to reverse and patch packed programs without unpacking them. It is a follow-up from the earlier course on Reverse Engineering & Memory Hacking and is the practical application of what was learnt in the first course. Students will learn how to test the effectiveness of several popular packers by packing crackmes and then reversing them without unpacking. They will also learn how to debug packed programs in spite of anti-debugging being implemented, as well as how to do break and trace to identify algorithms for reversing, identify addresses to do memory patching, write custom trainers (loaders) using Cheat Engine to hack and patch memory, modify program behavior, process patching programs, create Lua scripts for process patching, and test the effectiveness of anti-debugging technology. Prerequisites for this course include familiarity with x64dbg and Cheat Engine, a Windows PC, and some knowledge of Assembly (though this is not compulsory).
Course Syllabus
Introduction
Basics of Memory Hacking
Using and Evaluating VMP Protect
Using and Evaluating Enigma
Using and Evaluating Themida Code Virtualizer
Resources For Further Study