• Stars
    star
    11,158
  • Rank 3,009 (Top 0.06 %)
  • Language
    Assembly
  • License
    Apache License 2.0
  • Created almost 5 years ago
  • Updated 25 days ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.

image

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.


Join DC540 Discord HERE



image

KGPT HERE

FalconGPT HERE


Turbo Scanner HERE

Turbo Attack HERE


Reverse Engineering E-BOOK HERE

Reverse Engineering PDF HERE

Assembled by @0xInfection (Twitter)


DC540 Hacking Challenge 0x00001 HERE

DC540 Hacking Challenge 0x00002 [MicroPython CTF] HERE

DC540 Hacking Challenge 0x00003 [C CTF] HERE

DC540 Hacking Challenge 0x00004 [C CTF] HERE

DC540 Hacking Challenge 0x00005a HERE

DC540 Hacking Challenge 0x00005b [Assembler CTF] HERE


STM32F401CCU6 Persistent Flash Driver Embedded Assembler HERE


C Pico Project Template HERE


Pico C NRF24L01 Driver HERE


Pico C Terminal Input Driver HERE


MicroPython Pico Project Template HERE


Pico MicroPython Debug Template HERE


STEM Reverse Engineering Demo HERE


AArch64 Bytes HERE


ToyOS HERE


TOR Everything HERE


Hacking Windows E-BOOK HERE


Go Hacking E-BOOK HERE


Hacking Rust E-BOOK HERE


Zeek Network Security Monitor HERE


Fundamental C++ PDF HERE


Python For Kids PDF HERE


x86 Course

Lesson 1: x86 Course (Part 1: Goals)

This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language.

-> Click HERE to read the article on LinkedIn.

Lesson 2: x86 Course (Part 2: Techniques)

This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis.

-> Click HERE to read the article on LinkedIn.

Lesson 3: x86 Course (Part 3: Types Of Malware)

This tutorial will address the basic forms of malware and how they work in simple terms.

-> Click HERE to read the article on LinkedIn.

Lesson 4: x86 Course (Part 4: x86 Assembly Intro)

This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors.

-> Click HERE to read the article on LinkedIn.

Lesson 5: x86 Course (Part 5: Binary Number System)

This tutorial will address the very basics of the binary number system.

-> Click HERE to read the article on LinkedIn.

Lesson 6: x86 Course (Part 6: Hexadecimal Number System)

This tutorial will address the very basics of the hexadecimal number system.

-> Click HERE to read the article on LinkedIn.

Lesson 7: x86 Course (Part 7: Transistors And Memory)

This tutorial will address the basics of transistors and memory.

-> Click HERE to read the article on LinkedIn.

Lesson 8: x86 Course (Part 8 - Bytes, Words, Double Words, etc...)

This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions.

-> Click HERE to read the article on LinkedIn.

Lesson 9: x86 Course (Part 9: x86 Basic Architecture)

This tutorial will address the basic architecture of an x86 processor.

-> Click HERE to read the article on LinkedIn.

Lesson 10: x86 Course (Part 10: General-purpose Registers)

This tutorial will address the general purpose x86 registers.

-> Click HERE to read the article on LinkedIn.

Lesson 11: x86 Course (Part 11: Segment Registers)

This tutorial will address the x86 segment registers.

-> Click HERE to read the article on LinkedIn.

Lesson 12: x86 Course (Part 12: Instruction Pointer Register)

This tutorial will address the x86 instruction pointer register.

-> Click HERE to read the article on LinkedIn.

Lesson 13: x86 Course (Part 13: Control Registers)

This tutorial will address the x86 control registers.

-> Click HERE to read the article on LinkedIn.

Lesson 14: x86 Course (Part 14: Flags)

This tutorial will address the status, control and systems flags.

-> Click HERE to read the article on LinkedIn.

Lesson 15: x86 Course (Part 15: Stack)

This tutorial will address the stack.

-> Click HERE to read the article on LinkedIn.

Lesson 16: x86 Course (Part 16: Heap)

This tutorial will address the heap.

-> Click HERE to read the article on LinkedIn.

Lesson 17: x86 Course (Part 17 – How To Install Linux)

This tutorial will address how to install Ubuntu Linux on both Windows and MAC.

-> Click HERE to read the article on LinkedIn.

Lesson 18: x86 Course (Part 18 - vim Text Editor)

This tutorial will address how to install the vim text editor.

-> Click HERE to read the article on LinkedIn.

Lesson 19: x86 Course (Part 19 - Why Learn Assembly)

This tutorial will address the age old question of why to bother understanding the basics of Assembly Language.

-> Click HERE to read the article on LinkedIn.

Lesson 20: x86 Course (Part 20 - Instruction Code Handling)

This tutorial will address op codes and instruction code handling.

-> Click HERE to read the article on LinkedIn.

Lesson 21: x86 Course (Part 21 - How To Compile A Program)

This tutorial will address how to compile a basic x86 Assembly Program.

-> Click HERE to read the article on LinkedIn.

Lesson 22: x86 Course (Part 22 - ASM Program 1 [Moving Immediate Data])

This tutorial will address how to create our first real Assembly Program by moving immediate data.

-> Click HERE to read the article on LinkedIn.

Lesson 23: x86 Course (Part 23 - ASM Debugging 1 [Moving Immediate Data])

This tutorial will address how to debug our first real Assembly Program by moving immediate data.

-> Click HERE to read the article on LinkedIn.

Lesson 24: x86 Course (Part 24 - ASM Hacking 1 [Moving Immediate Data])

This tutorial will address how to hack our first real Assembly Program by moving immediate data.

-> Click HERE to read the article on LinkedIn.

Lesson 25: x86 Course (Part 25 - ASM Program 2 [Moving Data Between Registers])

This tutorial will address how to create our second real Assembly Program by moving between registers.

-> Click HERE to read the article on LinkedIn.

Lesson 26: x86 Course (Part 26 - ASM Debugging 2 [Moving Data Between Registers])

This tutorial will address how to debug our second real Assembly Program by moving between registers.

-> Click HERE to read the article on LinkedIn.

Lesson 27: x86 Course (Part 27 - ASM Hacking 2 [Moving Data Between Registers])

This tutorial will address how to hack our second real Assembly Program by moving between registers.

-> Click HERE to read the article on LinkedIn.

Lesson 28: x86 Course (Part 28 - ASM Program 3 [Moving Data Between Memory And Registers])

This tutorial will address how to create our third real Assembly Program by moving between memory and registers

-> Click HERE to read the article on LinkedIn.

Lesson 29: x86 Course (Part 29 - ASM Debugging 3 [Moving Data Between Memory And Registers])

This tutorial will address how to debug our third real Assembly Program by moving between memory and registers.

-> Click HERE to read the article on LinkedIn.

Lesson 30: x86 Course (Part 30 - ASM Hacking 3 [Moving Data Between Memory And Registers])

This tutorial will address how to hack our third real Assembly Program by moving between memory and registers.

-> Click HERE to read the article on LinkedIn.

Lesson 31: x86 Course (Part 31 - ASM Program 4 [Moving Data Between Registers And Memory])

This tutorial will address how to create our fourth real Assembly Program by moving between registers and memory.

-> Click HERE to read the article on LinkedIn.

Lesson 32: x86 Course (Part 32 - ASM Debugging 4 [Moving Data Between Registers And Memory])

This tutorial will address how to debug our fourth real Assembly Program by moving between registers and memory.

-> Click HERE to read the article on LinkedIn.

Lesson 33: x86 Course (Part 33 - ASM Hacking 4 [Moving Data Between Registers And Memory])

This tutorial will address how to hack our fourth real Assembly Program by moving between registers and memory.

-> Click HERE to read the article on LinkedIn.

Lesson 34: x86 Course (Part 34 - ASM Program 5 [Indirect Addressing With Registers])

This tutorial will address how to create our fifth real Assembly Program by indirect addressing with registers.

-> Click HERE to read the article on LinkedIn.

Lesson 35: x86 Course (Part 35 - ASM Debugging 5 [Indirect Addressing With Registers])

This tutorial will address how to debug our fifth real Assembly Program by indirect addressing with registers.

-> Click HERE to read the article on LinkedIn.

Lesson 36: x86 Course (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers])

This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers.

-> Click HERE to read the article on LinkedIn.

Lesson 37: x86 Course (Part 37 - ASM Program 6 [CMOV Instructions])

This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.

-> Click HERE to read the article on LinkedIn.

Lesson 38: x86 Course (Part 38 - ASM Debugging 6 [CMOV Instructions])

This tutorial will address how to debug our sixth real Assembly Program with CMOV instructions.

-> Click HERE to read the article on LinkedIn.

Lesson 39: x86 Course (Part 39 - ASM Hacking 6 [CMOV Instructions])

This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.

-> Click HERE to read the article on LinkedIn.

Lesson 40: x86 Course (Part 40 - Conclusion)

This tutorial will conclude this x86 tutorial.

-> Click HERE to read the article on LinkedIn.


ARM-32 Course 1

Lesson 41: ARM-32 Course 1 (Part 1 – The Meaning Of Life)

This tutorial will introduce our ARM-32 Course 1 tutorial series.

-> Click HERE to read the article on LinkedIn.

Lesson 42: ARM-32 Course 1 (Part 2 - Number Systems)

This tutorial will discuss number systems such as binary, decimal and hexadecimal in detail.

-> Click HERE to read the article on LinkedIn.

Lesson 43: ARM-32 Course 1 (Part 3 - Binary Addition)

This tutorial will discuss binary addition.

-> Click HERE to read the article on LinkedIn.

Lesson 44: ARM-32 Course 1 (Part 4 - Binary Subtraction)

This tutorial will discuss binary subtraction.

-> Click HERE to read the article on LinkedIn.

Lesson 45: ARM-32 Course 1 (Part 5 - Word Lengths)

This tutorial will discuss word lengths.

-> Click HERE to read the article on LinkedIn.

Lesson 46: ARM-32 Course 1 (Part 6 - Registers)

This tutorial will discuss registers.

-> Click HERE to read the article on LinkedIn.

Lesson 47: ARM-32 Course 1 (Part 7 - Program Counter)

This tutorial will discuss the program counter.

-> Click HERE to read the article on LinkedIn.

Lesson 48: ARM-32 Course 1 (Part 8 - CPSR)

This tutorial will discuss the CPSR.

-> Click HERE to read the article on LinkedIn.

Lesson 49: ARM-32 Course 1 (Part 9 - Link Register)

This tutorial will discuss the Link Register.

-> Click HERE to read the article on LinkedIn.

Lesson 50: ARM-32 Course 1 (Part 10 - Stack Pointer)

This tutorial will discuss the Stack Pointer.

-> Click HERE to read the article on LinkedIn.

Lesson 51: ARM-32 Course 1 (Part 11 - ARM Firmware Boot Procedures)

This tutorial will discuss ARM Firmware Boot Procedures.

-> Click HERE to read the article on LinkedIn.

Lesson 52: ARM-32 Course 1 (Part 12 - Von Neumann Architecture)

This tutorial will discuss Von Neumann Architecture.

-> Click HERE to read the article on LinkedIn.

Lesson 53: ARM-32 Course 1 (Part 13 - Instruction Pipeline)

This tutorial will discuss the instruction pipeline.

-> Click HERE to read the article on LinkedIn.

Lesson 54: ARM-32 Course 1 (Part 14 - ADD)

This tutorial will discuss the add instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 55: ARM-32 Course 1 (Part 15 - Debugging ADD)

This tutorial will discuss debugging the add instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 56: ARM-32 Course 1 (Part 16 - Hacking ADD)

This tutorial will discuss hacking the add instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 57: ARM-32 Course 1 (Part 17 - ADDS)

This tutorial will discuss the adds instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 58: ARM-32 Course 1 (Part 18 – Debugging ADDS)

This tutorial will discuss debugging the adds instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 59: ARM-32 Course 1 (Part 19 – Hacking ADDS)

This tutorial will discuss hacking the adds instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 60: ARM-32 Course 1 (Part 20 – ADC)

This tutorial will discuss the ADC instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 61: ARM-32 Course 1 (Part 21 – Debugging ADC)

This tutorial will discuss debugging the ADC instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 62: ARM-32 Course 1 (Part 22 – Hacking ADC)

This tutorial will discuss hacking the ADC instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 63: ARM-32 Course 1 (Part 23 – SUB)

This tutorial will discuss the SUB instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 64: ARM-32 Course 1 (Part 24 – Debugging SUB)

This tutorial will discuss debugging the SUB instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 65: ARM-32 Course 1 (Part 25 – Hacking SUB)

This tutorial will discuss hacking the SUB instruction.

-> Click HERE to read the article on LinkedIn.


ARM-32 Course 2

Lesson 66: ARM-32 Course 2 (Part 1 – The Meaning Of Life Part 2)

This tutorial will introduce our ARM-32 Course 2 course.

-> Click HERE to read the article on LinkedIn.

Lesson 67: ARM-32 Course 2 (Part 2 – Number Systems)

This tutorial will discuss number systems.

-> Click HERE to read the article on LinkedIn.

Lesson 68: ARM-32 Course 2 (Part 3 – Binary Addition)

This tutorial will discuss binary addition.

-> Click HERE to read the article on LinkedIn.

Lesson 69: ARM-32 Course 2 (Part 4 – Binary Subtraction)

This tutorial will discuss binary subtraction.

-> Click HERE to read the article on LinkedIn.

Lesson 70: ARM-32 Course 2 (Part 5 – Word Lengths)

This tutorial will discuss word lengths.

-> Click HERE to read the article on LinkedIn.

Lesson 71: ARM-32 Course 2 (Part 6 – Registers)

This tutorial will discuss registers.

-> Click HERE to read the article on LinkedIn.

Lesson 72: ARM-32 Course 2 (Part 7 – Program Counter)

This tutorial will discuss program counter.

-> Click HERE to read the article on LinkedIn.

Lesson 73: ARM-32 Course 2 (Part 8 - CPSR)

This tutorial will discuss the CPSR.

-> Click HERE to read the article on LinkedIn.

Lesson 74: ARM-32 Course 2 (Part 9 - Link Register)

This tutorial will discuss the link register.

-> Click HERE to read the article on LinkedIn.

Lesson 75: ARM-32 Course 2 (Part 10 - Stack Pointer)

This tutorial will discuss the stack pointer.

-> Click HERE to read the article on LinkedIn.

Lesson 76: ARM-32 Course 2 (Part 11 - Firmware Boot Procedures)

This tutorial will discuss the firmware boot procedures.

-> Click HERE to read the article on LinkedIn.

Lesson 77: ARM-32 Course 2 (Part 12 - Von Neumann Architecture)

This tutorial will discuss the Von Neumann Architecture.

-> Click HERE to read the article on LinkedIn.

Lesson 78: ARM-32 Course 2 (Part 13 - Instruction Pipeline)

This tutorial will discuss the instruction pipeline.

-> Click HERE to read the article on LinkedIn.

Lesson 79: ARM-32 Course 2 (Part 14 - Hello World)

This tutorial will discuss the basics of a hello world program in ARM 32-bit.

-> Click HERE to read the article on LinkedIn.

Lesson 80: ARM-32 Course 2 (Part 15 - Debugging Hello World)

This tutorial will discuss debugging hello world.

-> Click HERE to read the article on LinkedIn.

Lesson 81: ARM-32 Course 2 (Part 16 - Hacking Hello World)

This tutorial will discuss hacking hello world.

-> Click HERE to read the article on LinkedIn.

Lesson 82: ARM-32 Course 2 (Part 17 - Constants)

This tutorial will discuss constants.

-> Click HERE to read the article on LinkedIn.

Lesson 83: ARM-32 Course 2 (Part 18 – Debugging Constants)

This tutorial will discuss debugging constants.

-> Click HERE to read the article on LinkedIn.

Lesson 84: ARM-32 Course 2 (Part 19 – Hacking Constants)

This tutorial will discuss hacking constants.

-> Click HERE to read the article on LinkedIn.

Lesson 85: ARM-32 Course 2 (Part 20 – Character Variables)

This tutorial will discuss character variables.

-> Click HERE to read the article on LinkedIn.

Lesson 86: ARM-32 Course 2 (Part 21 – Debugging Character Variables)

This tutorial will discuss debugging character variables.

-> Click HERE to read the article on LinkedIn.

Lesson 87: ARM-32 Course 2 (Part 22 – Hacking Character Variables)

This tutorial will discuss hacking character variables.

-> Click HERE to read the article on LinkedIn.

Lesson 88: ARM-32 Course 2 (Part 23 – Boolean Variables)

This tutorial will discuss boolean variables.

-> Click HERE to read the article on LinkedIn.

Lesson 89: ARM-32 Course 2 (Part 24 – Debugging Boolean Variables)

This tutorial will discuss debugging boolean variables.

-> Click HERE to read the article on LinkedIn.

Lesson 90: ARM-32 Course 2 (Part 25 – Hacking Boolean Variables)

This tutorial will discuss hacking boolean variables.

-> Click HERE to read the article on LinkedIn.

Lesson 91: ARM-32 Course 2 (Part 26 – Integer Variables)

This tutorial will discuss integer variables.

-> Click HERE to read the article on LinkedIn.

Lesson 92: ARM-32 Course 2 (Part 27 – Debugging Integer Variables)

This tutorial will discuss debugging integer variables.

-> Click HERE to read the article on LinkedIn.

Lesson 93: ARM-32 Course 2 (Part 28 – Hacking Integer Variables)

This tutorial will discuss hacking integer variables.

-> Click HERE to read the article on LinkedIn.

Lesson 94: ARM-32 Course 2 (Part 29 – Float Variables)

This tutorial will discuss float variables.

-> Click HERE to read the article on LinkedIn.

Lesson 95: ARM-32 Course 2 (Part 30 – Debugging Float Variables)

This tutorial will discuss debugging float variables.

-> Click HERE to read the article on LinkedIn.

Lesson 96: ARM-32 Course 2 (Part 31 – Hacking Float Variables)

This tutorial will discuss hacking float variables.

-> Click HERE to read the article on LinkedIn.

Lesson 97: ARM-32 Course 2 (Part 32 – Double Variables)

This tutorial will discuss double variables.

-> Click HERE to read the article on LinkedIn.

Lesson 98: ARM-32 Course 2 (Part 33 – Debugging Double Variables)

This tutorial will discuss debugging double variables.

-> Click HERE to read the article on LinkedIn.

Lesson 99: ARM-32 Course 2 (Part 34 – Hacking Double Variables)

This tutorial will discuss hacking double variables.

-> Click HERE to read the article on LinkedIn.

Lesson 100: ARM-32 Course 2 (Part 35 – SizeOf Operator)

This tutorial will discuss the sizeof operator.

-> Click HERE to read the article on LinkedIn.

Lesson 101: ARM-32 Course 2 (Part 36 – Debugging SizeOf Operator)

This tutorial will discuss debugging sizeof operator.

-> Click HERE to read the article on LinkedIn.

Lesson 102: ARM-32 Course 2 (Part 37 – Hacking SizeOf Operator)

This tutorial will discuss hacking sizeof operator.

-> Click HERE to read the article on LinkedIn.

Lesson 103: ARM-32 Course 2 (Part 38 – Pre-Increment Operator)

This tutorial will discuss the pre-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 104: ARM-32 Course 2 (Part 39 – Debugging Pre-Increment Operator)

This tutorial will discuss debugging pre-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 105: ARM-32 Course 2 (Part 40 – Hacking Pre-Increment Operator)

This tutorial will discuss hacking pre-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 106: ARM-32 Course 2 (Part 41 – Post-Increment Operator)

This tutorial will discuss the post-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 107: ARM-32 Course 2 (Part 42 – Debugging Post-Increment Operator)

This tutorial will discuss debugging post-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 108: ARM-32 Course 2 (Part 43 – Hacking Post-Increment Operator)

This tutorial will discuss hacking post-increment operator.

-> Click HERE to read the article on LinkedIn.

Lesson 109: ARM-32 Course 2 (Part 44 – Pre-Decrement Operator)

This tutorial will discuss the pre-decrement operator.

-> Click HERE to read the article on LinkedIn.

Lesson 110: ARM-32 Course 2 (Part 45 – Debugging Pre-Decrement Operator)

This tutorial will discuss debugging pre-decrement operator.

-> Click HERE to read the article on LinkedIn.

Lesson 111: ARM-32 Course 2 (Part 46 – Hacking Pre-Decrement Operator)

This tutorial will discuss hacking pre-decrement operator.

-> Click HERE to read the article on LinkedIn.

Lesson 112: ARM-32 Course 2 (Part 47 – Post-Decrement Operator)

This tutorial will discuss post-decrement operator.

-> Click HERE to read the article on LinkedIn.

Lesson 113: ARM-32 Course 2 (Part 48 – Debugging Post-Decrement Operator)

This tutorial will discuss debugging post-decrement operator.

-> Click HERE to read the article on LinkedIn.

Lesson 114: ARM-32 Course 2 (Part 49 – Hacking Post-Decrement Operator)

This tutorial will discuss hacking post-decrement operator.

-> Click HERE to read the article on LinkedIn.


ARM-32 Project Course

Lesson 115: ARM-32 Project (Part 1 – Hacking Hello World)

ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux. -> Click HERE to read the project on GitHub.

Lesson 116: ARM-32 Project (Part 2 – Hacking Int)

ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux. -> Click HERE to read the project on GitHub.

Lesson 117: ARM-32 Project (Part 3 – Hacking Float)

ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux. -> Click HERE to read the project on GitHub.

Lesson 118: ARM-32 Project (Part 4 – Hacking Double)

ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux. -> Click HERE to read the project on GitHub.

Lesson 119: ARM-32 Project (Part 5 – Hacking Char)

ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux. -> Click HERE to read the project on GitHub.

Lesson 120: ARM-32 Project (Part 6 – Hacking Char Pointer)

ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux. -> Click HERE to read the project on GitHub.


x64 Course

Lesson 121: x64 Course (Part 1 – The Cyber Revolution)

This tutorial will discuss the cyber revolution.

-> Click HERE to read the article on LinkedIn.

Lesson 122: x64 Course (Part 2 - Transistors)

This tutorial will discuss transistors.

-> Click HERE to read the article on LinkedIn.

Lesson 123: x64 Course (Part 3 - Logic Gates)

This tutorial will discuss logic gates.

-> Click HERE to read the article on LinkedIn.

Lesson 124: x64 Course (Part 4 - Number Systems)

This tutorial will discuss number systems.

-> Click HERE to read the article on LinkedIn.

Lesson 125: x64 Course (Part 5 - Binary Addition)

This tutorial will discuss binary addition.

-> Click HERE to read the article on LinkedIn.

Lesson 126: x64 Course (Part 6 - Binary Subtraction)

This tutorial will discuss binary subtraction.

-> Click HERE to read the article on LinkedIn.

Lesson 127: x64 Course (Part 7 - Word Lengths)

This tutorial will discuss word lengths.

-> Click HERE to read the article on LinkedIn.

Lesson 128: x64 Course (Part 8 - General Architecture)

This tutorial will discuss the general architecture.

-> Click HERE to read the article on LinkedIn.

Lesson 129: x64 Course (Part 9 - Calling Conventions)

This tutorial will discuss calling conventions.

-> Click HERE to read the article on LinkedIn.

Lesson 130: x64 Course (Part 10 - Boolean Instructions)

This tutorial will discuss boolean instructions.

-> Click HERE to read the article on LinkedIn.

Lesson 131: x64 Course (Part 11 - Pointers)

This tutorial will discuss pointers.

-> Click HERE to read the article on LinkedIn.

Lesson 132: x64 Course (Part 12 - Load Effective Address)

This tutorial will discuss load effective address.

-> Click HERE to read the article on LinkedIn.

Lesson 133: x64 Course (Part 13 - The Data Segment)

This tutorial will discuss the data segment.

-> Click HERE to read the article on LinkedIn.

Lesson 134: x64 Course (Part 14 - SHL Instruction)

This tutorial will discuss the shl instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 135: x64 Course (Part 15 - SHR Instruction)

This tutorial will discuss the shr instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 136: x64 Course (Part 16 - ROL Instruction)

This tutorial will discuss rol instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 137: x64 Course (Part 17 - ROR Instruction)

This tutorial will discuss the ror instruction.

-> Click HERE to read the article on LinkedIn.

Lesson 138: x64 Course (Part 18 - Boot Sector Basics [Part 1])

This tutorial will discuss boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 139: x64 Course (Part 19 - Boot Sector Basics [Part 2])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 140: x64 Course (Part 20 - Boot Sector Basics [Part 3])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 141: x64 Course (Part 21 - Boot Sector Basics [Part 4])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 142: x64 Course (Part 22 - Boot Sector Basics [Part 5])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 143: x64 Course (Part 23 - Boot Sector Basics [Part 6])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 144: x64 Course (Part 24 - Boot Sector Basics [Part 7])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 145: x64 Course (Part 25 - Boot Sector Basics [Part 8])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 146: x64 Course (Part 26 - Boot Sector Basics [Part 9])

This tutorial will discuss more boot sector basics.

-> Click HERE to read the article on LinkedIn.

Lesson 147: x64 Course (Part 27 - x64 Assembly [Part 1])

This tutorial will discuss x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 148: x64 Course (Part 28 - x64 Assembly [Part 2])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 149: x64 Course (Part 29 - x64 Assembly [Part 3])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 150: x64 Course (Part 30 - x64 Assembly [Part 4])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 151: x64 Course (Part 31 - x64 Assembly [Part 5])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 152: x64 Course (Part 32 - x64 Assembly [Part 6])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 153: x64 Course (Part 33 - x64 Assembly [Part 7])

This tutorial will discuss more x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 154: x64 Course (Part 34 - x64 C++ 1 Code [Part 1])

This tutorial will discuss c++ code as it relates to 64-bit assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 155: x64 Course (Part 35 - x64 C++ 2 Debug [Part 2])

This tutorial will discuss more c++ code as it relates to 64-bit assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 156: x64 Course (Part 36 - x64 C++ 3 Hacking [Part 3])

This tutorial will discuss more c++ code as it relates to 64-bit assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 157: x64 Course (Part 37 - x64 C & Genesis Of Life)

This tutorial will discuss c and how it relates to x64 assembly.

-> Click HERE to read the article on LinkedIn.

Lesson 158: x64 Course (Part 38 - x64 Networking Basics)

This tutorial will discuss x64 networking basics.

-> Click HERE to read the article on LinkedIn.

Lesson 159: x64 Course (Part 39 - Why C?)

This tutorial will discuss the power of the c language.

-> Click HERE to read the article on LinkedIn.

Lesson 160: x64 Course (Part 40 - Hacking Hello World!)

This tutorial will discuss hacking hello world.

-> Click HERE to read the article on LinkedIn.

Lesson 161: x64 Course (Part 41 - Hacking Variables!)

This tutorial will discuss hacking variables.

-> Click HERE to read the article on LinkedIn.

Lesson 162: x64 Course (Part 42 - Hacking Branches!)

This tutorial will discuss hacking branches.

-> Click HERE to read the article on LinkedIn.

Lesson 163: x64 Course (Part 43 - Hacking Pointers!)

This tutorial will discuss hacking pointers.

-> Click HERE to read the article on LinkedIn.


ARM-64 Course

Lesson 164: ARM-64 Course (Part 1 - The Meaning Of Life)

In this lesson we will discuss the course concepts and the meaning of life.

-> Click HERE to read the article on LinkedIn.

Lesson 165: ARM-64 Course (Part 2 - Development Setup)

In this lesson we will discuss how to set up our development in 64-bit ARM with Kali Linux.

-> Click HERE to read the article on LinkedIn.

Lesson 166: ARM-64 Course (Part 3 - "Hello World")

In this lesson we will discuss how to write and compile a simple hello world program in C++.

-> Click HERE to read the article on LinkedIn.

Lesson 167: ARM-64 Course (Part 4 - Debugging "Hello World")

In this lesson we will debug our simple hello world program.

-> Click HERE to read the article on LinkedIn.

Lesson 168: ARM-64 Course (Part 5 - Hacking "Hello World")

In this lesson we will hack our simple hello world program.

-> Click HERE to read the article on LinkedIn.

Lesson 169: ARM-64 Course (Part 6 - Basic I/O)

In this lesson we will discuss how to write and compile a simple basicio program in C++ and discuss basic input validation.

-> Click HERE to read the article on LinkedIn.

Lesson 170: ARM-64 Course (Part 7 - Debugging Basic I/O)

In this lesson we will discuss how to debug a simple basicio program in C++ and discuss basic input validation.

-> Click HERE to read the article on LinkedIn.

Lesson 171: ARM-64 Course (Part 8 - Hacking Basic I/O)

In this lesson we will discuss how to hack a simple basicio program in C++ and discuss basic input validation.

-> Click HERE to read the article on LinkedIn.

Lesson 172: ARM-64 Course (Part 9 - Character Primitive Datatype)

In this lesson we will discuss the char primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 173: ARM-64 Course (Part 10 - Debugging Character Primitive Datatype)

In this lesson we will discuss debugging the char primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 174: ARM-64 Course (Part 11 - Hacking Character Primitive Datatype)

In this lesson we will discuss hacking the char primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 175: ARM-64 Course (Part 12 - Boolean Primitive Datatype)

In this lesson we will discuss the boolean primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 176: ARM-64 Course (Part 13 - Debugging Boolean Primitive Datatype)

In this lesson we will discuss debugging the boolean primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 177: ARM-64 Course (Part 14 - Hacking Boolean Primitive Datatype)

In this lesson we will discuss hacking the boolean primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 178: ARM-64 Course (Part 15 - Float Primitive Datatype)

In this lesson we will discuss the float primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 179: ARM-64 Course (Part 16 - Debugging Float Primitive Datatype)

In this lesson we will discuss debugging the float primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 180: ARM-64 Course (Part 17 - Hacking Float Primitive Datatype)

In this lesson we will discuss hacking the float primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 181: ARM-64 Course (Part 18 - Double Primitive Datatype)

In this lesson we will discuss the double primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 182: ARM-64 Course (Part 19 - Debugging Double Primitive Datatype)

In this lesson we will discuss debugging the double primitive datatype.

-> Click HERE to read the article on LinkedIn.

Lesson 183: ARM-64 Course (Part 20 - Hacking Double Primitive Datatype)

In this lesson we will discuss hacking the double primitive datatype.

-> Click HERE to read the article on LinkedIn.


Pico Hacking Course

Lesson 184: Pico Hacking Course (Part 1 - The Why, The How...)

In this lesson we will discuss the basic setup of the development environment for the Raspberry Pi Pico.

-> Click HERE to read the article on LinkedIn.

Lesson 185: Pico Hacking Course (Part 2 - Hello World)

In this lesson we will discuss the basic Hello World program.

-> Click HERE to read the article on LinkedIn.

Lesson 186: Pico Hacking Course (Part 3 - Debugging Hello World)

In this lesson we will discuss debugging the basic Hello World program.

-> Click HERE to read the article on LinkedIn.

Lesson 187: Pico Hacking Course (Part 4 - Hacking Hello World)

In this lesson we will discuss hacking the basic Hello World program.

-> Click HERE to read the article on LinkedIn.

Lesson 188: Pico Hacking Course (Part 5 - char)

In this lesson we will discuss the char data type.

-> Click HERE to read the article on LinkedIn.

Lesson 189: Pico Hacking Course (Part 6 - Debugging char)

In this lesson we will discuss debugging the char data type.

-> Click HERE to read the article on LinkedIn.

Lesson 190: Pico Hacking Course (Part 7 - Hacking char)

In this lesson we will discuss hacking the char data type.

-> Click HERE to read the article on LinkedIn.

Lesson 191: Pico Hacking Course (Part 8 - int)

In this lesson we will discuss the int data type.

-> Click HERE to read the article on LinkedIn.

Lesson 192: Pico Hacking Course (Part 9 - Debugging int)

In this lesson we will discuss debugging the int data type.

-> Click HERE to read the article on LinkedIn.

Lesson 193: Pico Hacking Course (Part 10 - Hacking int)

In this lesson we will discuss hacking the int data type.

-> Click HERE to read the article on LinkedIn.

Lesson 194: Pico Hacking Course (Part 11 - float)

In this lesson we will discuss the float data type.

-> Click HERE to read the article on LinkedIn.

Lesson 195: Pico Hacking Course (Part 12 - Debugging float)

In this lesson we will discuss debugging the float data type.

-> Click HERE to read the article on LinkedIn.

Lesson 196: Pico Hacking Course (Part 13 - Hacking float)

In this lesson we will discuss hacking the float data type.

-> Click HERE to read the article on LinkedIn.

Lesson 197: Pico Hacking Course (Part 14 - double)

In this lesson we will discuss the double data type.

-> Click HERE to read the article on LinkedIn.

Lesson 198: Pico Hacking Course (Part 15 - Debugging double)

In this lesson we will discuss debugging the double data type.

-> Click HERE to read the article on LinkedIn.

Lesson 199: Pico Hacking Course (Part 16 - Hacking double)

In this lesson we will discuss hacking the double data type.

-> Click HERE to read the article on LinkedIn.

Lesson 200: Pico Hacking Course (Part 17 - "ABSOLUTE POWER CORRUPTS ABSOLUTELY!", The Tragic Tale Of Input...)

In this lesson we will discuss the concept of proper input handling.

-> Click HERE to read the article on LinkedIn.

Lesson 201: Pico Hacking Course (Part 18 - "FOR 800 YEARS HAVE I TRAINED JEDI!", The FORCE That IS Input...)

In this lesson we will discuss the importance of proper input handling in addition to breaking down our custom input function.

-> Click HERE to read the article on LinkedIn.

Lesson 202: Pico Hacking Course (Part 19 - Input)

In this lesson we will discuss creating an effective input architecture.

-> Click HERE to read the article on LinkedIn.

Lesson 203: Pico Hacking Course (Part 20 - Debugging Input)

In this lesson we will discuss debugging input.

-> Click HERE to read the article on LinkedIn.


AArch64 Bytes Articles

AArch64 Bytes Articles (Part 1: Reversing Exit)

In this bite we learn about what happens at the very core of a 32-bit AArch64 instruction by reversing the exit Linux syscall.

-> Click HERE to read the article on Medium.

AArch64 Bytes Articles (Part 2: 64-bit Immediate Values)

In this bite we learn about how to handle moving a 64-bit immediate value into a 64-bit register.

-> Click HERE to read the article on Medium.

AArch64 Bytes Articles (Part 3: Yet Another Upper)

In this bite we learn how to create a simple parsing algorithm to convert a string's lowercase chars to uppercase, timeless Assembler example.

-> Click HERE to read the article on Medium.


ToyOS

ToyOS Operating System

ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.

-> Click HERE


Hacking Windows Course

Hacking Windows Course (Chapter 1 - Hello World)

This chapter covers the basics of designing a very simple Windows Assembly Language message box program in pure Assembly for both x86 and x64 architectures.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 2: Debugging Hello World x86)

This chapter covers the dynamic reverse engineering analysis, debugging, of the Hello World app in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 3: Hacking Hello World x86)

This chapter covers the dynamic reverse engineering analysis, hacking, of the Hello World app in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 4: Debugging Hello World x64)

This chapter covers the dynamic reverse engineering analysis, debugging, of the Hello World app in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 5: Hacking Hello World x64)

This chapter covers the dynamic reverse engineering analysis, hacking, of the Hello World app in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 6: Directories)

This chapter covers reviewing the Windows API CreateDirectoryW and RemoveDirectoryW functions in C.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 7: Debugging Directories x86)

This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 8: Hacking Directories x86)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 9: Debugging Directories x64)

This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 10: Hacking Directories x64)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 11: CopyFile)

This chapter covers reviewing the Windows API CopyFileW function in C.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 12: Debugging CopyFile x86)

This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CopyFileW function in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 13: Hacking CopyFile x86)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CopyFileW function in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 14: Debugging CopyFile x64)

This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CopyFileW function in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 15: Hacking CopyFile x86)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CopyFileW function in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 16: MoveFile)

This chapter covers reviewing the Windows API MoveFileW function in C.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 17: Debugging MoveFile x86)

This chapter covers dynamic reverse engineering analysis, debugging, the Windows API MoveFileW function in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 18: Hacking MoveFile x86)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API MoveFileW function in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 19: Debugging MoveFile x64)

This chapter covers dynamic reverse engineering analysis, debugging, the Windows API MoveFileW function in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 20: Hacking MoveFile x64)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API MoveFileW function in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 21: CreateFile)

This chapter covers reviewing the Windows API CreateFileW function in C.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 22: Debugging CreateFile x86)

This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateFileW function in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 23: Hacking CreateFile x86)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateFileW function in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 24: Debugging CreateFile x64)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateFileW function in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 25: Hacking CreateFile x64)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateFileW function in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 26: WriteFile)

This chapter covers reviewing the Windows API WriteFile function in C.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 27: Debugging WriteFile x86)

This chapter covers dynamic reverse engineering analysis, debugging, the Windows API WriteFile function in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 28: Hacking WriteFile x86)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API WriteFile function in x86 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 29: Debugging WriteFile x64)

This chapter covers dynamic reverse engineering analysis, debugging, the Windows API WriteFile function in x64 Assembly.

-> Click HERE to read the FREE pdf book.

Hacking Windows Course (Chapter 30: Hacking WriteFile x64)

This chapter covers dynamic reverse engineering analysis, hacking, the Windows API WriteFile function in x64 Assembly.

-> Click HERE to read the FREE pdf book.


Go Hacking Course

Go Hacking Course (Chapter 1: Hello Distributed System World)

This chapter covers the basics of setting up a dev environment and basic hello world style Go program for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 2: Debugging Hello Distributed System World)

This chapter covers debugging of the basic hello world style Go program for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 3: Hacking Hello Distributed System World)

This chapter covers hacking of the basic hello world style Go program for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 4: Primitive Types)

This chapter covers Golang primitive types for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 5: Debugging Primitive Types)

This chapter covers Golang debugging of the primitive types for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 6: Hacking Primitive Types)

This chapter covers Golang hacking of the primitive types for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 7: Control Flow)

This chapter covers Golang control flow for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 8: Debugging Control Flow)

This chapter covers Golang debugging control flow for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 9: Hacking Control Flow)

This chapter covers Golang hacking control flow for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 10: Advanced Control Flow)

This chapter covers Golang advanced control flow for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 11: Debugging Advanced Control Flow)

This chapter covers Golang debugging advanced control flow for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Go Hacking Course (Chapter 12: Hacking Advanced Control Flow)

This chapter covers Golang hacking advanced control flow for the x64 architecture.

-> Click HERE to read the FREE pdf book.

IN DEVELOPMENT... MORE TO COME SOON!!!


Hacking Rust Course

Hacking Rust Course (Chapter 1: Hello Rust)

This chapter covers the basics of setting up a dev environment and basic hello world style Rust program for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Hacking Rust Course (Chapter 2: Debugging Hello Rust)

This chapter covers debugging the basic hello world style Rust program for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Hacking Rust Course (Chapter 3: Hacking Hello Rust)

This chapter covers hacking the basic hello world style Rust program for the x64 architecture.

-> Click HERE to read the FREE pdf book.

Hacking Rust Course (Chapter 4: Scalar Data Types)

This chapter covers a scalar data types Rust program for the x64 architecture.

-> Click HERE to read the FREE pdf book.

IN DEVELOPMENT... MORE TO COME SOON!!!


Zeek Network Security Monitor Course

Zeek Network Security Monitor Course (Lesson 1: Setup)

In this lesson we set up a basic Ubuntu computer connected directly to an inexpensive tap which connects to your home router. I have provided products you can purchase if you do not have existing parts however please feel free to use any network tap of your choosing and/or any additional Ethernet adapters or cables of your choosing.

-> Click HERE to read the article on Medium.

Zeek Network Security Monitor Course (Lesson 2: alert-all-notices.zeek)

In this lesson we create an alert by logging all notices that Zeek deems worthy of your attention to the notice.log file in addition to sending you an email.

-> Click HERE to read the article on Medium.

Zeek Network Security Monitor Course (Lesson 3: conn.log)

In this lesson we will show the source IP addresses and ports and their destination IP addresses and ports.

-> Click HERE to read the article on Medium.

Zeek Network Security Monitor Course (Lesson 4: conn.log - 2)

In this lesson we will show the source IP addresses that generated the most network traffic, organized in descending order.

-> Click HERE to read the article on Medium.

Zeek Network Security Monitor Course (Lesson 5: conn.log - 3)

In this lesson we will show the destination ports that received the most network traffic, organized in descending order.

-> Click HERE to read the article on Medium.

Zeek Network Security Monitor Course (Lesson 6: conn.log - 4)

In this lesson we will show the number of connections per protocol service.

-> Click HERE to read the article on Medium.

Zeek Network Security Monitor Course (Lesson 7: conn.log - 5)

In this lesson we will show the distinct browsers used by the hosts.

-> Click HERE to read the article on Medium.

Zeek Network Security Monitor Course (Lesson 8: conn.log - 6)

In this lesson we will show the source and destination IP addresses of all UDP and TCP connections that lasted more than 90 seconds.

-> Click HERE to read the article on Medium.

Zeek Network Security Monitor Course (Lesson 9: conn.log - 7)

In this lesson we will show whether there any web servers operating on non-standardized ports.

-> Click HERE to read the article on Medium.

Zeek Network Security Monitor Course (Lesson 10: conn.log - 8)

In this lesson we will show the state history of connections as a string of letters.

-> Click HERE to read the article on Medium.


Fundamental C++ Course

Fundamental C++ Course (Chapter 1 - Hello World)

In this lesson we will discuss the basics of C++ output.

-> Click HERE to read the FREE pdf book.

Fundamental C++ Course (Chapter 2 - Variables, Constants, Arrays, Vectors, Statements, Operators, Strings)

In this lesson we will discuss variables, constants, arrays, vectors, statements, operators and strings.

-> Click HERE to read the FREE pdf book.

Fundamental C++ Course (Chapter 3 - Program Flow)

In this lesson we will discuss the basics of program flow.

-> Click HERE to read the FREE pdf book.

Fundamental C++ Course (Chapter 4 - Functions)

In this lesson we will discuss functions.

-> Click HERE to read the FREE pdf book.

Fundamental C++ Course (Chapter 5 - Pointers)

In this lesson we will discuss pointers.

-> Click HERE to read the FREE pdf book.

Fundamental C++ Course (Chapter 6 - Input)

In this lesson we will discuss proper input validation.

-> Click HERE to read the FREE pdf book.

Fundamental C++ Course (Chapter 7 - Classes)

In this lesson we will discuss class basics.

-> Click HERE to read the FREE pdf book.


Python For Kids Course

Python For Kids Course (Chapter 1 - Goals)

This lesson will begin with the basic concepts of why kids should learn to program in Python.

-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.

Python For Kids Course (Chapter 2 - "Hello World")

This lesson will step-by-step code our first program to have our little microcontroller say hello to the world!

-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.

Python For Kids Course (Chapter 3 - FUN With Images)

This lesson will step-by-step code a FUN image making program where our little microcontroller will make various faces to his new friend.

-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.

Python For Kids Course (Chapter 4 - FUN With Numbers)

This lesson will step-by-step code a FUN program where we will work with numbers and learn about how to make variables with them.

-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.

Python For Kids Course (Chapter 5 - FUN With Words)

This lesson will step-by-step code a FUN program where we will work with words and learn about how to make variables with them.

-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.

Python For Kids Course (Chapter 6 - Fun With Word Lists)

This lesson will step-by-step code a FUN program where we will work with word lists and learn about how to make variables with them.

-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.

Python For Kids Course (Chapter 7 - Fun With Music)

This lesson will step-by-step code a FUN song making program where our little microcontroller will play various songs to his new friend.

-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.

Python For Kids Course (Chapter 8 - Fun With Talking Robots)

This lesson will step-by-step interact with a FUN talking robot where we can ask him questions and he will respond to us using his voice.

-> Click HERE to read the lesson in PDF format.
-> Click HERE to watch the video on YouTube.

Python For Kids Course (Chapter 9 - Basic I/O)

This lesson will discuss MicroPython basic input and output for the micro:bit.

-> Click HERE to read the lesson in PDF format.

Python For Kids Course (Chapter 10 - DataTypes & Numbers)

This lesson will discuss MicroPython datatypes and numbers for the micro:bit.

-> Click HERE to read the lesson in PDF format.

Python For Kids Course (Chapter 11 - Conditional Logic)

This lesson will discuss MicroPython conditional logic and application flow chart design for the micro:bit.

-> Click HERE to read the lesson in PDF format.

Python For Kids Course (Chapter 12 - Lists, Tuples, Dictionaries & Loops)

This lesson will discuss MicroPython lists, tuples, dictionaries and loops for the micro:bit.

-> Click HERE to read the lesson in PDF format.

Python For Kids Course (Chapter 13 - Functions)

This lesson will discuss MicroPython functions for the micro:bit.

-> Click HERE to read the lesson in PDF format.

Python For Kids Course (Chapter 14 - Classes)

This lesson will discuss MicroPython classes for the micro:bit.

-> Click HERE to read the lesson in PDF format.

Python For Kids Course (Chapter 15 - Unittest)

This lesson will discuss MicroPython unittest for the micro:bit.

-> Click HERE to read the lesson in PDF format.


License

Apache License, Version 2.0

More Repositories

1

Hacking-Windows

A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
C
1,362
star
2

Python-For-Kids

A FREE comprehensive online Python development tutorial FOR KIDS utilizing an official BBC micro:bit Development Board going step-by-step into the world of Python for microcontrollers.
Python
732
star
3

Go-Hacking

A FREE comprehensive online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Golang from scratch.
Go
203
star
4

Hacking-Rust

A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Rust from scratch.
Rust
170
star
5

turbo-scanner

A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing your own network to ensure there are no malicious services running.
Go
148
star
6

turbo-attack

A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
Go
133
star
7

Embedded-Hacking

A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
C
130
star
8

Zeek-Network-Security-Monitor

A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Zeek
60
star
9

TOR-Everything

Simple FREE guide to set up TOR stealth and persistence with complete anonymity.
57
star
10

Embedded-Assembler

A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker script from scratch, I/O programming all the way to up to developing and hacking IoT.
Assembly
36
star
11

rea

A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). This tool is designed to revolutionize reverse engineering tasks by combining machine learning with retrieval-based systems.
Jupyter Notebook
28
star
12

CortexaAI

An open-source Test Automation framework with Docker and Kubernetes integration.
Python
28
star
13

dc540-0x00001

DC540 hacking challenge 0x00001.
26
star
14

Hacking-C-Plus-Plus

A comprehensive C++ course where we learn every facet of C++ and how it relates to the ARM 64 architecture as we will reverse engineer each step in ARM 64 assembly language to get a full understanding of the environment.
C++
25
star
15

pa

A Personal Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). This tool is designed to revolutionize PDF document analysis tasks by combining machine learning with retrieval-based systems.
Jupyter Notebook
22
star
16

Gemini

Google Gemini AI model w/speech recognition and voice.
Python
22
star
17

AArch64-Bytes

A series of small ARM 64 bite-size articles to help one better reverse AArch64 ARM 64 Linux binaries.
Assembly
20
star
18

Hacking-RISC-V

A FREE comprehensive step-by-step embedded RISC-V hacking tutorial covering RISC-V Embedded Software Development to Reverse Engineering.
C++
20
star
19

Ansible-For-Everyone

A FREE Ansible course that takes you step-by-step through building a custom Ansible Framework from scratch.
Python
19
star
20

Fundamental-CPP

The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.
C++
18
star
21

CircuitPython_Unittest

A repo that provides the MP-Lib unittest.py to CircuitPython to allow makers to take full advantage of Python's unittest within CircuitPython.
Python
17
star
22

dc540-0x00005b

DC540 hacking challenge 0x00005b.
Assembly
16
star
23

Automated-DevOps

Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterprise environment with Ansible provisioning for the VM instances utilizing GitLab Infrastructure As Code build automation.
Shell
15
star
24

kgpt

A custom GPT based on [Zero To Hero](https://karpathy.ai/zero-to-hero.html) utilizing tiktoken with the intent to augment AI Transformer-model education and reverse engineer GPT models from scratch.
Python
14
star
25

0x01-ARM-32-Hacking-Hello-World

ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.
Assembly
13
star
26

dc540-0x00002

DC540 hacking challenge 0x00002 [MicroPython CTF].
C
13
star
27

micro-bit-Reverse-Engineering

A micro:bit entry-level Reverse Engineering tutorial code repo which was presented at the 2021 micro:bit LIVE event.
12
star
28

dc540-0x00004

DC540 hacking challenge 0x00004 [C CTF].
C
12
star
29

ToyOS

ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.
Assembly
12
star
30

KevinSaber

KevinSaber is a Oculus Rift and Oculus Quest game that is a BeatSaber clone where you strike the boxes as they fly past you in a fierce frenzy. The pace of this game is fast and if you are looking to get your exercise on, this is your game!
C#
12
star
31

0x02-ARM-32-Hacking-Int

ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
C
11
star
32

deepfake-detector

Deepfake Detector is an AI/ML model designed to detect AI-generated or manipulated images.
Python
11
star
33

dc540-0x00003

DC540 hacking challenge 0x00003 [C CTF].
C
10
star
34

C-64-Assembly

A 6502-based Commodore 64 assembly language repo for OSX and Ubuntu. This is a very small and targeted OSX and Ubuntu port based on the original work of Chibi Akumas as the sole purpose of this small repo is to help you port Chibi's work to OSX or Ubuntu and nothing more. For more detailed 6502 tutorials please visit https://www.assemblytutorial.com to get your started.
Assembly
9
star
35

VRPong

VRPong is a Oculus Rift and Oculus Quest game that is a classic Pong clone where have two paddles to which your left controller handles the left paddle and the right controller to hanldle the right paddle. Tons of retro fun in this game!
C#
9
star
36

falcongpt

Simple GPT app that uses the falcon-7b-instruct model with a Flask front-end.
Python
8
star
37

STM32F4_Persistent_Flash_Driver

An STM32F4, persistent flash driver written entirely in Assembler.
Assembly
8
star
38

Selenium-For-Everyone

A FREE Selenium course that takes you step-by-step through building a custom Selenium Framework from scratch.
Java
7
star
39

dc540-0x00006

DC540 hacking challenge 0x00006.
Assembly
7
star
40

pico-micropython-debug-template

A Raspberry Pi Pico RP2040 debug template repo with step-by-step instructions on how to freeze your MicroPython files into C firmware and reverse engineer the binary with OpenOCD and GDB.
Python
6
star
41

MicroPython-micro-bit-Study-Buddy

The micro:bit Study Buddy is a micro:bit Electronic Educational Engagement Tool designed to help students learn a new classroom subject with the assistance of a micro:bit TED (Talking Educational Database) and a micro:bit TEQ (Talking Educational Quiz).
Python
6
star
42

0x03-ARM-32-Hacking-Float

ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux.
C
5
star
43

0x05-ARM-32-Hacking_Char

ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux.
C
5
star
44

Fundamental-Go

A comprehensive and FREE Online Go Development tutorial going step-by-step into the world of Go.
Go
5
star
45

Pico-Escape-Room

Raspberry Pi Pico Escape Room game.
Python
5
star
46

Fundamental-Python

A comprehensive and FREE Online Python Development tutorial going step-by-step into the world of Python.
Python
5
star
47

MicroPython-micro-bit-Talking-BuildaBot

This is a FUN talking BuildaBot for the official BBC micro:bit V2 where you get to build your VERY OWN TALKING BOT FROM SCRATCH!
Python
5
star
48

0x06-ARM-32-Hacking-Char-Pointer

ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux.
C
4
star
49

0x04-ARM-32-Hacking-Double

ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.
C
4
star
50

MicroPython-For-micro-bit

A FREE MicroPython course designed to teach MicroPython with specific application to the micro:bit V2.
Python
4
star
51

pico-c-nrf24l01-driver

A Raspberry Pi Pico NRF24L01 driver written in C.
C
4
star
52

dc540-0x00007

DC540 hacking challenge 0x00007 [UNKNOWN CTF].
4
star
53

Automation-Framework

An open-source Automation Framework.
Python
3
star
54

MicroPython-micro-bit-Talking-TextaBot

This is a FUN talking TextaBot for the official BBC micro:bit V2 where you get to build your VERY OWN TALKING TEXTABOT FROM SCRATCH!
Python
3
star
55

pico-c-terminal-input-driver

A Raspberry Pi Pico terminal input driver written in C.
C
3
star
56

dc540-0x00005a

DC540 hacking challenge 0x00005a.
Python
3
star
57

Salary-Calculator

A salary calculator that will take your annual salary as an input and calculate your monthly, bi-weekly or weekly salary.
Java
3
star
58

MicroPython-micro-bit-Talking-Sound

The micro:bit Talking LED Blink And Breath is a micro:bit Electronic Educational Engagement Tool designed to help students create a talking sound application.
Python
3
star
59

chicago-influenza-binary-classification

Data Analysis & Machine Learning w/ Chicago Inpatient, Emergency Department, and Outpatient Visits for Respiratory Illnesses
Jupyter Notebook
2
star
60

BicoptAR

A fun augmented reality game where you get to shoot down two different kinds of bicopters that exist within your space!
Swift
2
star
61

STM32F401CCUx_PA0ButtonHandler

STM32F401CCUx_PA0ButtonHandler driver.
Assembly
2
star
62

mojonet

PyTorch Neural Network wrapper to help transition existing projects into the Mojo programming language.
Mojo
2
star
63

x86-Controlled-Input

x86 controlled input example taking a max of 4 bytes from the terminal and checking for a successful combination of int values in a row.
Assembly
2
star
64

rp5-proj

A minimalistic GPIO command and function library to work with the Raspberry Pi 5.
C
2
star
65

STM32F4_SSD1306_Driver

An STM32F4, SSD1306 display driver written entirely in Assembler.
Assembly
2
star
66

Pico_WS2812_Driver

A Raspberry Pi Pico WS2812 NeoPixel driver written entirely in C.
C
2
star
67

STM32F4_LoRa_UART_Driver

An STM32F4, RYLR998 LoRa UART driver written entirely in Assembler.
Assembly
2
star
68

MicroPython-micro-bit-Talking-Heads-Or-Tails

This is a FUN talking Heads Or Tails game for the official BBC micro:bit V2 where you play with get to play with our little talking friend!
Python
1
star
69

CircuitPython-IoT-Trivia

An IoT Trivia app that shows you how to take a JSON web API such as the opentdb.com API and stream and display it on a FeatherS2 in an OLED display.
Python
1
star
70

MicroPython-micro-bit_Friend_MOD

The Friend module is a micro:bit chatbot that you can run inside of the REPL.
Python
1
star
71

stm32f4xx

An stm32f4xx custom HAL driver.
C
1
star
72

Live-COVID-19-Tracker

Live COVID-19 Tracker is a simple web app that shows the latest COVID-19 statistics feed of the world and your country of choice in real-time which refreshes every 60 seconds.
JavaScript
1
star
73

mp-pico-project-template

MicroPython Pico Project Template.
Shell
1
star
74

UnicoptAR

A fun augmented reality game where you get to shoot down two different kinds of unicopters that exist within your space!
Swift
1
star
75

MicroPython-micro-bit-MicroCipher

A simple MicroPython micro:bit MicroCipher where you can create encrypted messages and then decrypt them when you share the cipher and encrypted message.
Python
1
star
76

MicroPython-micro-bit-Talking-Blink-And-Breath

The micro:bit Talking LED Blink And Breath is a micro:bit Electronic Educational Engagement Tool designed to help students create a talking blink and breath application.
Python
1
star
77

STM32F401CCU6-Persistent-Flash-Driver

STM32F401CCU6 persistent flash driver.
Assembly
1
star
78

IoT

Iot TLS minimalistic project utilizing a Raspberry Pi 5 as a TLS server and a PicoW as a TLS client.
C
1
star
79

MicroSTEM

Empower kids today with STEM and Python on the Raspberry Pi Pico to secure tomorrow’s AI-driven careers using a Jupyter Notebook w/ the Pico to teach Python, Data Science and Electrical Engineering for kids!
Jupyter Notebook
1
star
80

STM32F4_Button_Interrupt_Driver

An STM32F4, button interrupt driver written entirely in Assembler.
Assembly
1
star
81

Live-COVID-19-Tracker-US

Live COVID-19 Tracker is a simple web app that shows the latest COVID-19 statistics feed of individual US States of choice in real-time which refreshes every 60 seconds.
JavaScript
1
star
82

HTTPS-Tunneling-Binary-Classification

HTTPS Tunneling Data Analysis & Machine Learning Binary Classification Model
Jupyter Notebook
1
star