🚨Squally Has Finally Left Early Access!
📚New Patch Contains 4 New Chapters
🎮Learn Game Hacking with this 2D Puzzle RPG
🛠 It teaches the basics of assembly, binary & hex
🕵Buy it on Steam or bundled with a GH subscription
🔗
Squally is an x86 assembly puzzle game in early access made by
@zcanann
. You complete quests and beat enemies by solving assembly puzzles.
Support the project by picking up a copy:
ChatGPT was only trained on 500GB of data
DARPA had AI running on a quantum computer, with access to Google's 666 petabyte database 9 years ago
It's already nuked Earth, our reality is just a simulation running on a a moon base docker server whose solar panels haven't died yet
UVB-76, a Russian military radio channel used for covert communication for the past 40 years, was hijacked by radio pirates who began playing Gangnam style and displaying memes last week. It's still happening, I captured this image today
🚀Join us as we complete
@cyberdefenders
RE101
📚6 Challenges for Beginner Malware Analysts
🔍Extracting Encrypted Flags
🔓Decoding in CyberChef
🔧Fixing file headers
🔎Used a debugger to find a flag
🔐Xor Encrypted Strings
🔗
Earlier this week, systems in our development environment were compromised via a social engineering attack. We don’t have all the answers right now, but we wanted to communicate early and let you know there is no indication that player data or personal information was obtained.
🚨Writing Exploits for IoT N-Days
The amazing
@_stigward
has blessed our channel with another excellent video, this time exploiting a Zyxel NAS.
🥇Analyzing CVE-2023-35138
🥈Reversing the Firmware
🥉Developing the Exploit
👉
🔍 Unpacking Ramnit's Custom Packer
🎬 Tutorial demonstrates the steps in 7 mins
🔧 Open in IDA, find encrypted code, attach debugger
🕵️♀️ Keep an eye on VirtualAlloc, inspect copied files
💡 Suspended svchost -> process injection
🔗
We've now been told for the 4th time, that our reverse engineering content is better than SANS601.
SANS is $8000
Our courses are $5/month
Stop sending your interns to SANS, drop them a fiver and spend the other $7995 on hookers & blow like a real CISO.
If you want to learn reverse engineering, you need to understand it takes thousands of hours to get good at. And even when you're an expert, it can take hundreds of hours in a disassembler to actually achieve a task. People are incredibly naïve about how time consuming it is.
📣 Shoutout to
@fr3dhk
for a phenomenal year of developing top-notch Malware Analysis tutorials.
📚 39 video tutorials covering a wide range of topics, all listed below with many more on the way!
👇Find them all here free on YouTube:
🔗
Want to learn reverse engineering?
@herrcore
makes some of the best videos available, this playlist covers many practical skills and you will always learn some valuable insight or tip even if you are familiar with the topic already.
👉
👾Bypassing ASLR - Exploit Dev Chapter 8
📚Read/write primitive for ASLR bypass
🛠 Use ws2_32!recv for initial analysis
🔍Ghidra for reversing recv() behavior
💡 Identify remote buffer size
📊Get control over RCX & RAX
🔗
🐧 Exploit Dev 11: Intro to Linux Exploiting
🔓 The 11th chapter just released on our website!
🏁 Perfect for CTFs & real-world scenarios
🔗 Join us & learn from the experts
👉
A simple & practical introduction to Undocumented Windows Internals. Learn about NtQueryInformationProcess, the PEB and how to parse the module list. Internal, External, x86 & x64 examples.
1. game crashes
2. 40,000 people with the same bug on Steam
3. no solutions available online
4. reverse engineer it, find bug & patch it in 5 minutes
5. email company with solution
6. company ignores email
welp, I tried
Throwback to 2015
Everything required to make this hack from scratch is explained in EXTREME DETAIL in our Game Hacking Bible.
We don't teach you how to combine libraries, pastes, offset dumps and public information.
We actually teach you the skills to be independent.
The 1989 release of Prince of Persia represented a significant advancement in the realm of anti-debug.
To prevent crackers from bypassing copy protections the game used multiple anti-debug methods.
Self-Debugging is a common technique. Learn here:
Success Story
A high school kid with no experience, follows our tutorials very diligently for 2 years.
He gets an interview at a game development company, they are so impressed with his skills that they hire him on the spot as a Software Engineer.
Total investment: $20
🖥️ Set up Flare-VM for Malware Analysis
🔑 Start with fresh Windows 10 in VirtualBox
📥 Run FLARE VM script to grab RE tools
🧰 Add IDA Pro, portable UwAmp & Fiddler
🐠 Use Paranoid Fish to test sandbox detection
🛡️ Patch more leaks with VBoxCloak
🔗
If you don't know about these "same hash recompilation" projects, they're completely insane. They reverse the games so perfectly that the hashes match when they compile them, using 20 year old build chains. Insanely cool
Duke Nukem II's source code was never published, and seems to be lost. I reverse engineered a lot of it for RigelEngine, but not all of it. And Rigel's code is fairly different.
Enter my latest project: . Compiles into a 100%-identical DOS binary! (thread)
🍎 MacOS Game Hacking with Rust-Lang
👨💻 Learn How To Use the Mach Kernel API
🛠️ Bit Slicer = MacOS Cheat Engine Alternative
🧠 Best Crates for MacOSX Memory Manipulation
💻 Learn How to Manipulate Game Memory
✨ Develop and test a basic Rust trainer
👉
Guided Hacking is an amazing resource, for those who understand it's true purpose & treat it with respect.
- 10 courses
- 1,300 tutorials
- 430 videos
We have thousands of satisfied customers & we are improving our catalog of content every day.
🧮 Virtual Address Translation
💽 4-stage process using PML4, PDPT, PDT, PT
🖥️ Facilitates smooth process isolation
🔍 Maps virtual to physical memory
📚 Page table is the translation key
🔑 Implements MMU in hardware
💾 Swaps pages for efficient use
🔗