🚨Squally Has Finally Left Early Access!
📚New Patch Contains 4 New Chapters
🎮Learn Game Hacking with this 2D Puzzle RPG
🛠 It teaches the basics of assembly, binary & hex
🕵Buy it on Steam or bundled with a GH subscription
🔗
Squally is an x86 assembly puzzle game in early access made by
@zcanann
. You complete quests and beat enemies by solving assembly puzzles.
Support the project by picking up a copy:
🚨Writing Exploits for IoT N-Days
The amazing
@_stigward
has blessed our channel with another excellent video, this time exploiting a Zyxel NAS.
🥇Analyzing CVE-2023-35138
🥈Reversing the Firmware
🥉Developing the Exploit
👉
🚀Join us as we complete
@cyberdefenders
RE101
📚6 Challenges for Beginner Malware Analysts
🔍Extracting Encrypted Flags
🔓Decoding in CyberChef
🔧Fixing file headers
🔎Used a debugger to find a flag
🔐Xor Encrypted Strings
🔗
🏆Guided Hacking Member Spotlight
@_stigward
📚 Frida Hooking Tutorial
🔧 Writing Exploits for IoT N-Days
🍏 MacOS Game Hacking
🎮 Vuln Research in Video Games
🦀 Rust-Lang Game Hacking
🌐 HTML5 Game Hacking
🔗 Full Playlist:
🔍 Unpacking Ramnit's Custom Packer
🎬 Tutorial demonstrates the steps in 7 mins
🔧 Open in IDA, find encrypted code, attach debugger
🕵️♀️ Keep an eye on VirtualAlloc, inspect copied files
💡 Suspended svchost -> process injection
🔗
🍎 MacOS Game Hacking with Rust-Lang
👨💻 Learn How To Use the Mach Kernel API
🛠️ Bit Slicer = MacOS Cheat Engine Alternative
🧠 Best Crates for MacOSX Memory Manipulation
💻 Learn How to Manipulate Game Memory
✨ Develop and test a basic Rust trainer
👉
📣 Shoutout to
@fr3dhk
for a phenomenal year of developing top-notch Malware Analysis tutorials.
📚 39 video tutorials covering a wide range of topics, all listed below with many more on the way!
👇Find them all here free on YouTube:
🔗
🏆 Guided Hacking Member Spotlight
@fr3dhk
🛠️ How to Setup CAPEV2 Sandbox
🔍 Top 5 IDA Pro Plugins for Malware Analysis
🎯 Cobalt Strike XSS Vulnerability Explained
🐍 KLBanker String Decryption with Python
👇 Find all 42 videos free on Youtube:
👾Bypassing ASLR - Exploit Dev Chapter 8
📚Read/write primitive for ASLR bypass
🛠 Use ws2_32!recv for initial analysis
🔍Ghidra for reversing recv() behavior
💡 Identify remote buffer size
📊Get control over RCX & RAX
🔗
ChatGPT was only trained on 500GB of data
DARPA had AI running on a quantum computer, with access to Google's 666 petabyte database 9 years ago
It's already nuked Earth, our reality is just a simulation running on a a moon base docker server whose solar panels haven't died yet
🔍PECompact Unpacking Tutorial
🧩Main function was small, packed
🔧Breakpoints on VirtualAllocate, VirtualProtect
💡 Executed in new memory region
👁🗨Saw strings appear, unpacking finished
📍 Found original entry point
✅Good dump confirmed in IDA
🔗
🔥 Our Latest Malware Analysis Content
🛡️ De-Obfuscate In IDA Pro
🔐 How To Rebuild The IAT
💻 How To Dump Malware At OEP
🔍 How To Use PE-Sieve
🛠️ How To Find ShellCode
🔧 CyberChef For Malware Analysis
🔎 API Monitor For Malware Analysis
👉
✝️The Holy Trinity of Game Hacking✝️
✅Cheat Engine
☑️ReClass . NET
✅IDA Pro
Learn how we use them together to find and reverse engineer the TraceLine Function
👉
UVB-76, a Russian military radio channel used for covert communication for the past 40 years, was hijacked by radio pirates who began playing Gangnam style and displaying memes last week. It's still happening, I captured this image today
🖥️ Set up Flare-VM for Malware Analysis
🔑 Start with fresh Windows 10 in VirtualBox
📥 Run FLARE VM script to grab RE tools
🧰 Add IDA Pro, portable UwAmp & Fiddler
🐠 Use Paranoid Fish to test sandbox detection
🛡️ Patch more leaks with VBoxCloak
🔗
🧮 Virtual Address Translation
💽 4-stage process using PML4, PDPT, PDT, PT
🖥️ Facilitates smooth process isolation
🔍 Maps virtual to physical memory
📚 Page table is the translation key
🔑 Implements MMU in hardware
💾 Swaps pages for efficient use
🔗
🛠️ Kernel Read & Write Memory Tutorial
🚀 Implementing device IO control logic
👨💻 Debugging, testing in real-world scenarios
🎮 Learn how to make a Basic Kernel Cheat
👉
👀 Using CAPA For Rapid Binary Analysis
⭐️ Criminally Underrated Tool That You MUST Try
👾 Generates TTP Reports via MITRE ATT&CK
😎 IDA Pro & Ghidra Plugins Available
💻 Supports Dynamic Analysis with CAPE Sandbox
👉
🧠 IDA Pro Quick Tip
#4
🔎Anti-Cheats Read Your IDA Pro History
🧹Use This PowerShell Script to Clear It:
Remove-Item -Path "HKCU:\Software\Hex-Rays\IDA\History" -Recurse
Remove-Item -Path "HKCU:\Software\Hex-Rays\IDA\History64" -Recurse
Get-ChildItem
🛠️ How To Use WinDbg For Beginners
🔍 Analyze dumps & trace memory leaks
👀 Ideal for debugging both user & kernel code
🕰️ TTD feature for step-by-step debugging
🧩 Snapshots work even after VM restores
👉
🧩 Learn How to Manually Map DLLs
🔍 Benefits: Stealth & Control
🖥️ Works by Emulating LoadLibrary
📚 Uncover Inner workings of Windows Loader
🔧 Complications: Exceptions & TLS
🔗
🔍Unpacking FlawedAmmyy, a malicious RAT
📨Spreads via Office macros & email spam
🔓Unpacking is essential to enable static analysis
🔬PEiD, IDA Pro & x32dbg assist in the analysis
🧩Unpacked executable found via self-injection
🔗
Earlier this week, systems in our development environment were compromised via a social engineering attack. We don’t have all the answers right now, but we wanted to communicate early and let you know there is no indication that player data or personal information was obtained.
💻 How to Reverse Go Binaries
👾 Increasingly popular for malware
💾 GoLang vs C binaries: size matters
🔍 Detect GoLang via string inspection
🔧 Stripped binaries? Recover info with scripts
💡 GoLang scripts for IDA Pro and Ghidra
🔗
🚨 The Guided Hacking Podcast - Episode 1
😎 Interviews with prominent reverse engineers and game hackers, getting to know them and finding out what makes them tick.
🚀 First Episode featuring
@zcanann
, the developer of Squally, Squalr & CS420.
👉
🔍 Building a Simple C# Memory Library
🧠 Master The Basics of an External Trainer
🛠️ Practical example: infinite ammo cheat
📚 Resolving Imports for Win32 API
🔧 Troubleshooting & Debugging Tips
👉
🔧 Virtual Machine Setup for Malware Analysis
🖥️ VirtualBox & Flare-VM: Your VM base
🔍 Add IDA Pro, UwAMP, Fiddler for depth
🐟 Paranoid Fish: Detect VM giveaways
🎭 VBoxCloak patches VM vulnerabilities
🔌 Enhance IDA Pro with FireEye plugins
👉
🏆Top 5 Living Off The Land Attack Tools
👾Exploit via legitimate Windows binaries
🖥️Fileless techniques to evade AV detection
⚙️Schtasks, Mshta, Regsvr32 for persistence
📜Exploiting scripts for remote execution
🔗
We've now been told for the 4th time, that our reverse engineering content is better than SANS601.
SANS is $8000
Our courses are $5/month
Stop sending your interns to SANS, drop them a fiver and spend the other $7995 on hookers & blow like a real CISO.