Introduction
x86 Course
Part 1: Goals
Part 2: Techniques
Part 3: Types Of Malware
Part 4: x86 Assembly Intro
Part 5: Binary Number System
Part 6: Hexadecimal Number System
Part 7: Transistors And Memory
Part 8 - Bytes, Words, Double Words, etc...
Part 9: x86 Basic Architecture
Part 10: General-purpose Registers
Part 11: Segment Registers
Part 12: Instruction Pointer Register
Part 13: Control Registers
Part 14: Flags
Part 15: Stack
Part 16: Heap
Part 17 – How To Install Linux
Part 18 - vim Text Editor
Part 19 - Why Learn Assembly
Part 20 - Instruction Code Handling
Part 21 - How To Compile A Program
Part 22 - ASM Program 1 [Moving Immediate Data]
Part 23 - ASM Debugging 1 [Moving Immediate Data]
Part 24 - ASM Hacking 1 [Moving Immediate Data]
Part 25 - ASM Program 2 [Moving Data Between Registers]
Part 26 - ASM Debugging 2 [Moving Data Between Registers]
Part 27 - ASM Hacking 2 [Moving Data Between Registers]
Part 28 - ASM Program 3 [Moving Data Between Memory And Registers]
Part 29 - ASM Debugging 3 [Moving Data Between Memory And Registers]
Part 30 - ASM Hacking 3 [Moving Data Between Memory And Registers]
Part 31 - ASM Program 4 [Moving Data Between Registers And Memory]
Part 32 - ASM Debugging 4 [Moving Data Between Registers And Memory]
Part 33 - ASM Hacking 4 [Moving Data Between Registers And Memory]
Part 34 - ASM Program 5 [Indirect Addressing With Registers]
Part 35 - ASM Debugging 5 [Indirect Addressing With Registers]
Part 36 - ASM Hacking 5 [Indirect Addressing With Registers]
Part 37 - ASM Program 6 [CMOV Instructions]
Part 38 - ASM Debugging 6 [CMOV Instructions]
Part 39 - ASM Hacking 6 [CMOV Instructions]
Part 40 - Conclusion
ARM-32 Course 1
Part 1 – The Meaning Of Life
Part 2 - Number Systems
Part 3 - Binary Addition
Part 4 - Binary Subtraction
Part 5 - Word Lengths
Part 6 - Registers
Part 7 - Program Counter
Part 8 - CPSR
Part 9 - Link Register
Part 10 - Stack Pointer
Part 11 - ARM Firmware Boot Procedures
Part 12 - Von Neumann Architecture
Part 13 - Instruction Pipeline
Part 14 - ADD
Part 15 - Debugging ADD
Part 16 - Hacking ADD
Part 17 - ADDS
Part 18 – Debugging ADDS
Part 19 – Hacking ADDS
Part 20 – ADC
Part 21 – Debugging ADC
Part 22 – Hacking ADC
Part 23 – SUB
Part 24 – Debugging SUB
Part 25 – Hacking SUB
ARM-32 Course 2
Part 1 – The Meaning Of Life Part 2
Part 2 – Number Systems
Part 3 – Binary Addition
Part 4 – Binary Subtraction
Part 5 – Word Lengths
Part 6 – Registers
Part 7 – Program Counter
Part 8 - CPSR
Part 9 - Link Register
Part 10 - Stack Pointer
Part 11 - Firmware Boot Procedures
Part 12 - Von Neumann Architecture
Part 13 - Instruction Pipeline
Part 14 - Hello World
Part 15 - Debugging Hello World
Part 16 - Hacking Hello World
Part 17 - Constants
Part 18 – Debugging Constants
Part 19 – Hacking Constants
Part 20 – Character Variables
Part 21 – Debugging Character Variables
Part 22 – Hacking Character Variables
Part 23 – Boolean Variables
Part 24 – Debugging Boolean Variables
Part 25 – Hacking Boolean Variables
Part 26 – Integer Variables
Part 27 – Debugging Integer Variables
Part 28 – Hacking Integer Variables
Part 29 – Float Variables
Part 30 – Debugging Float Variables
Part 31 – Hacking Float Variables
Part 32 – Double Variables
Part 33 – Debugging Double Variables
Part 34 – Hacking Double Variables
Part 35 – SizeOf Operator
Part 36 – Debugging SizeOf Operator
Part 37 – Hacking SizeOf Operator
Part 38 – Pre-Increment Operator
Part 39 – Debugging Pre-Increment Operator
Part 40 – Hacking Pre-Increment Operator
Part 41 – Post-Increment Operator
Part 42 – Debugging Post-Increment Operator
Part 43 – Hacking Post-Increment Operator
Part 44 – Pre-Decrement Operator
Part 45 – Debugging Pre-Decrement Operator
Part 46 – Hacking Pre-Decrement Operator
Part 47 – Post-Decrement Operator
Part 48 – Debugging Post-Decrement Operator
Part 49 – Hacking Post-Decrement Operator
x64 Course
Part 1 – The Cyber Revolution
Part 2 - Transistors
Part 3 - Logic Gates
Part 4 - Number Systems
Part 5 - Binary Addition
Part 6 - Binary Subtraction
Part 7 - Word Lengths
Part 8 - General Architecture
Part 9 - Calling Conventions
Part 10 - Boolean Instructions
Part 11 - Pointers
Part 12 - Load Effective Address
Part 13 - The Data Segment
Part 14 - SHL Instruction
Part 15 - SHR Instruction
Part 16 - ROL Instruction
Part 17 - ROR Instruction
Part 18 - Boot Sector Basics [Part 1]
Part 19 - Boot Sector Basics [Part 2]
Part 20 - Boot Sector Basics [Part 3]
Part 21 - Boot Sector Basics [Part 4]
Part 22 - Boot Sector Basics [Part 5]
Part 23 - Boot Sector Basics [Part 6]
Part 24 - Boot Sector Basics [Part 7]
Part 25 - Boot Sector Basics [Part 8]
Part 26 - Boot Sector Basics [Part 9]
Part 27 - x64 Assembly [Part 1]
Part 28 - x64 Assembly [Part 2]
Part 29 - x64 Assembly [Part 3]
Part 30 - x64 Assembly [Part 4]
Part 31 - x64 Assembly [Part 5]
Part 32 - x64 Assembly [Part 6]
Part 33 - x64 Assembly [Part 7]
Part 34 - x64 C++ 1 Code [Part 1]
Part 35 - x64 C++ 2 Debug [Part 2]
Part 36 - x64 C++ 3 Hacking [Part 3]
Part 37 - x64 C & Genesis Of Life
Part 38 - x64 Networking Basics
Part 39 - Why C?
Part 40 - Hacking Hello World!
Part 41 - Hacking Variables!
Part 42 - Hacking Branches!
Part 43 - Hacking Pointers!
ARM-64 Course
Part 1 - The Meaning Of Life
Part 2 - Development Setup
Part 3 - "Hello World"
Part 4 - Debugging "Hello World"
Part 5 - Hacking "Hello World"
Part 6 - Basic I/O
Part 7 - Debugging Basic I/O
Part 8 - Hacking Basic I/O
Part 9 - Character Primitive Datatype
Part 10 - Debugging Character Primitive Datatype
Part 11 - Hacking Character Primitive Datatype
Part 12 - Boolean Primitive Datatype
Part 13 - Debugging Boolean Primitive Datatype
Part 14 - Hacking Boolean Primitive Datatype
Part 15 - Float Primitive Datatype
Part 16 - Debugging Float Primitive Datatype
Part 17 - Hacking Float Primitive Datatype
Part 18 - Double Primitive Datatype
Part 19 - Debugging Double Primitive Datatype
Part 20 - Hacking Double Primitive Datatype
Pico Hacking Course
Part 1 - The Why, The How...
Part 2 - Hello World
Part 3 - Debugging Hello World
Part 4 - Hacking Hello World
Part 5 - char
Part 6 - Debugging char
Part 7 - Hacking char
Part 8 - int
Part 9 - Debugging int
Part 10 - Hacking int
Part 11 - float
Part 12 - Debugging float
Part 13 - Hacking float
Part 14 - double
Part 15 - Debugging double
Part 16 - Hacking double
Part 17 - "ABSOLUTE POWER CORRUPTS ABSOLUTELY!", The Tragic Tale Of Input...
Part 18 - "FOR 800 YEARS HAVE I TRAINED JEDI!", The FORCE That IS Input...
Part 19 - Input
Part 20 - Debugging Input
Published with GitBook
ARM-32 Course 2
The 32-bit ARM Architecture (Part 2)
Let's dive in rightaway!
results matching "
"
No results matching "
"