Newest Hacks

Kid Chameleon SRAM Low Poly Promo Models Final Fantasy II Speedrun Practice Earthbound Beginnings: Consistent Version

Newest Translations

Balloon Fight Secret of Evermore Trials of Mana Contra

Newest Reviews

Low Poly Promo Models Landstalker Alternate Controls Ultimate Mortal Kombat 3 - Arcade Hack Ultimate Mortal Kombat 3 - Arcade Hack

Featured Hack Images

Castlevania - Shadows Super Mario Bros. - Mikamari 5 Space Mario Kirby in Sonic the Hedgehog Quest Of Hat

Featured Translation Images

Minna no Taabou no Nakayoshi Daisakusen Ys IV: Mask of the Sun Parallel World Kanshakudama Nage Kantarou no Toukaido Gojuusan Tsugi

Recent Updates

  • Translations
    Removed dead links to Google Drive downloads. Added some clarifying text to make clear that this is only for CDI-format images. Added ROM/ISO information for the most common CDI version.
  • Community
    Forum name added
  • Community
    Forum name added
  • Translations
    fixed the URL that someone else added to my previous submission. not sure why the NINJA disclaimer is needed at all? it's not like the online ROM patcher doesn't support it

Introduction to Reverse Engineering WIN32 Applications

Assembly

Description:

This paper will introduced the reader to many concepts and tools essential to understanding and controlling native WIN32 applications through the eyes of Windows Debugger (WinDBG). Throughout, WinMine will be utilized as a vehicle to deliver and demonstrate the functionality provided by WinDBG and how this functionality can be harnessed to aid the reader in reverse engineering native WIN32 applications. Topics covered include an introductory look at IA-32 assembly, register significance, memory protection, stack usage, various WinDBG commands, call stacks, endianness, and portions of the Windows API. Knowledge gleaned will be used to develop an application designed to reveal and/or remove bombs from the WinMine playing grid.

Links:

User Review Information

No User Reviews!