सभी के लिए Reverse Engineering
(0xinfection.github.io)परिचय
-
x86 कोर्स
- Part 1: लक्ष्य
- Part 2: तकनीक
- Part 3: malware के प्रकार
- Part 4: x86 assembly का परिचय
- Part 5: binary system
- Part 6: hexadecimal system
- Part 7: transistor और memory
- Part 8: byte, word, double word आदि
- Part 9: x86 basic architecture
- Part 10: general-purpose register
- Part 11: segment register
- Part 12: instruction pointer register
- Part 13: control register
- Part 14: flags
- Part 15: stack
- Part 16: heap
- Part 17: Linux install करने का तरीका
- Part 18: vim text editor
- Part 19: assembly सीखने का कारण
- Part 20: opcode processing
- Part 21: program compile करने का तरीका
- Part 22: ASM program 1 [immediate data move]
- Part 23: ASM debugging 1 [immediate data move]
- Part 24: ASM hacking 1 [immediate data move]
- Part 25: ASM program 2 [registers के बीच data move]
- Part 26: ASM debugging 2 [registers के बीच data move]
- Part 27: ASM hacking 2 [registers के बीच data move]
- Part 28: ASM program 3 [memory और register के बीच data move]
- Part 29: ASM debugging 3 [memory और register के बीच data move]
- Part 30: ASM hacking 3 [memory और register के बीच data move]
- Part 31: ASM program 4 [register और memory के बीच data move]
- Part 32: ASM debugging 4 [register और memory के बीच data move]
- Part 33: ASM hacking 4 [register और memory के बीच data move]
- Part 34: ASM program 5 [register के माध्यम से indirect addressing]
- Part 35: ASM debugging 5 [register के माध्यम से indirect addressing]
- Part 36: ASM hacking 5 [register के माध्यम से indirect addressing]
- Part 37: ASM program 6 [CMOV instruction]
- Part 38: ASM debugging 6 [CMOV instruction]
- Part 39: ASM hacking 6 [CMOV instruction]
- Part 40: निष्कर्ष
-
ARM-32 कोर्स 1
- Part 1: जीवन का अर्थ
- Part 2: number system
- Part 3: binary addition
- Part 4: binary subtraction
- Part 5: word length
- Part 6: register
- Part 7: program counter
- Part 8: CPSR
- Part 9: link register
- Part 10: stack pointer
- Part 11: ARM firmware boot प्रक्रिया
- Part 12: Von Neumann architecture
- Part 13: instruction pipeline
- Part 14: ADD
- Part 15: ADD debugging
- Part 16: ADD hacking
- Part 17: ADDS
- Part 18: ADDS debugging
- Part 19: ADDS hacking
- Part 20: ADC
- Part 21: ADC debugging
- Part 22: ADC hacking
- Part 23: SUB
- Part 24: SUB debugging
- Part 25: SUB hacking
-
ARM-32 कोर्स 2
- Part 1: जीवन का अर्थ Part 2
- Part 2: number system
- Part 3: binary addition
- Part 4: binary subtraction
- Part 5: word length
- Part 6: register
- Part 7: program counter
- Part 8: CPSR
- Part 9: link register
- Part 10: stack pointer
- Part 11: firmware boot प्रक्रिया
- Part 12: Von Neumann architecture
- Part 13: instruction pipeline
- Part 14: Hello World
- Part 15: Hello World debugging
- Part 16: Hello World hacking
- Part 17: constants
- Part 18: constants debugging
- Part 19: constants hacking
- Part 20: character variable
- Part 21: character variable debugging
- Part 22: character variable hacking
- Part 23: boolean variable
- Part 24: boolean variable debugging
- Part 25: boolean variable hacking
- Part 26: integer variable
- Part 27: integer variable debugging
- Part 28: integer variable hacking
- Part 29: floating-point variable
- Part 30: floating-point variable debugging
- Part 31: floating-point variable hacking
- Part 32: double variable
- Part 33: double variable debugging
- Part 34: double variable hacking
- Part 35: SizeOf operator
- Part 36: SizeOf operator debugging
- Part 37: SizeOf operator hacking
- Part 38: pre-increment operator
- Part 39: pre-increment operator debugging
- Part 40: pre-increment operator hacking
- Part 41: post-increment operator
- Part 42: post-increment operator debugging
- Part 43: post-increment operator hacking
- Part 44: pre-decrement operator
- Part 45: pre-decrement operator debugging
- Part 46: pre-decrement operator hacking
- Part 47: post-decrement operator
- Part 48: post-decrement operator debugging
- Part 49: post-decrement operator hacking
-
x64 कोर्स
- Part 1: cyber revolution
- Part 2: transistor
- Part 3: logic gate
- Part 4: number system
- Part 5: binary addition
- Part 6: binary subtraction
- Part 7: word length
- Part 8: general architecture
- Part 9: calling convention
- Part 10: boolean instruction
- Part 11: pointer
- Part 12: load effective address
- Part 13: data segment
- Part 14: SHL instruction
- Part 15: SHR instruction
- Part 16: ROL instruction
- Part 17: ROR instruction
- Part 18: boot sector basics [Part 1]
- Part 19: boot sector basics [Part 2]
- Part 20: boot sector basics [Part 3]
- Part 21: boot sector basics [Part 4]
- Part 22: boot sector basics [Part 5]
- Part 23: boot sector basics [Part 6]
- Part 24: boot sector basics [Part 7]
- Part 25: boot sector basics [Part 8]
- Part 26: boot sector basics [Part 9]
- Part 27: x64 assembly [Part 1]
- Part 28: x64 assembly [Part 2]
- Part 29: x64 assembly [Part 3]
- Part 30: x64 assembly [Part 4]
- Part 31: x64 assembly [Part 5]
- Part 32: x64 assembly [Part 6]
- Part 33: x64 assembly [Part 7]
- Part 34: x64 C++ 1 code [Part 1]
- Part 35: x64 C++ 2 debug [Part 2]
- Part 36: x64 C++ 3 hacking [Part 3]
- Part 37: x64 C & जीवन की उत्पत्ति
- Part 38: x64 networking basics
- Part 39: C ही क्यों?
- Part 40: Hello World hacking!
- Part 41: variable hacking!
- Part 42: branch hacking!
- Part 43: pointer hacking!
-
ARM-64 कोर्स
- Part 1: जीवन का अर्थ
- Part 2: development environment setup
- Part 3: "Hello World"
- Part 4: "Hello World" debugging
- Part 5: "Hello World" hacking
- Part 6: basic I/O
- Part 7: basic I/O debugging
- Part 8: basic I/O hacking
- Part 9: character primitive data type
- Part 10: character primitive data type debugging
- Part 11: character primitive data type hacking
- Part 12: boolean primitive data type
- Part 13: boolean primitive data type debugging
- Part 14: boolean primitive data type hacking
- Part 15: floating-point primitive data type
- Part 16: floating-point primitive data type debugging
- Part 17: floating-point primitive data type hacking
- Part 18: double primitive data type
- Part 19: double primitive data type debugging
- Part 20: double primitive data type hacking
-
Pico hacking कोर्स
- Part 1: कारण और तरीका
- Part 2: Hello World
- Part 3: Hello World debugging
- Part 4: Hello World hacking
- Part 5: char
- Part 6: char debugging
- Part 7: char hacking
- Part 8: int
- Part 9: int debugging
- Part 10: int hacking
- Part 11: float
- Part 12: float debugging
- Part 13: float hacking
- Part 14: double
- Part 15: double debugging
- Part 16: double hacking
- Part 17: "पूर्ण शक्ति पूर्ण रूप से भ्रष्ट करती है!", input की दुखद कहानी
- Part 18: "800 साल से मैं Jedi को प्रशिक्षित कर रहा हूँ!", input की शक्ति
- Part 19: input
- Part 20: input debugging
-
Reverse Engineering For Everyone!
- Reverse Engineering क्या है?
- Wikipedia के अनुसार, reverse engineering एक ऐसी प्रक्रिया है जिसमें किसी कृत्रिम वस्तु को खोलकर उसकी design, architecture, code आदि को समझा जाता है या उस वस्तु से ज्ञान निकाला जाता है। यह प्राकृतिक घटनाओं का अध्ययन करने वाले वैज्ञानिक शोध के समान है।
- यह tutorial set reverse engineering को यथासंभव आसान बनाने के लिए मौजूद है।
- यह व्यापक reverse engineering tutorial set x86, x64, 32-bit ARM और 64-bit architecture को कवर करता है।
- यह शुरुआती लोगों को reverse engineering की बुनियादी अवधारणाएँ सीखने में मदद करता है, और उन लोगों के लिए भी उपयोगी है जो अवधारणाओं की दोबारा समीक्षा करना चाहते हैं।
- पूरे tutorial set को PDF या MOBI format में डाउनलोड किया जा सकता है।
- Reverse Engineering क्या है?
GN⁺ की संक्षिप्त जानकारी
- यह लेख x86, x64, ARM-32, ARM-64 और Pico hacking कोर्स सहित विभिन्न reverse engineering tutorials को कवर करता है।
- यह शुरुआती से लेकर मध्यम स्तर तक reverse engineering skills सीखने वाले लोगों के लिए उपयोगी संसाधन है।
- cyber security क्षेत्र में reverse engineering skills बहुत महत्वपूर्ण हैं।
- tutorials को PDF और MOBI format में उपलब्ध कराया गया है, जिससे उनकी accessibility बढ़ती है।
- समान कार्यक्षमता वाले projects में "Practical Reverse Engineering" और "Reversing: Secrets of Reverse Engineering" शामिल हैं।
अभी कोई टिप्पणी नहीं है.