Newest Hacks

No more pinch music upon Panels reaching the top of the screen Card Mode Super Castlevania IV Palette Hack Deadpool

Newest Translations

Isolated Warrior Super Soccer Tenshi no Uta: Shiroki Tsubasa no Inori Spot: The Cool Adventure

Newest Utilities

Yabause - Mednafen Save Converter Simple Tools Zapper 2020 DKC Stage Name Editor

Newest Reviews

Herbal Boost Street Fighter II Street Fighter II Comix Zone - Calcium kid edition

Newest Homebrew

Nova the Squirrel Death Planet Bad Apple!! PV-FC 2.5 Simplistic

Featured Hack Images

Astyanax Remix Journey to Silius Plus Technos Ice Hockey Reloaded Metroid Incursion

Featured Translation Images

Rakuen no Guardian Phantasy Star II: Kinds’s Adventure Rockman & Forte Rent a Hero

Recent Updates

Introduction to Reverse Engineering WIN32 Applications

Assembly

Description:

This paper will introduced the reader to many concepts and tools essential to understanding and controlling native WIN32 applications through the eyes of Windows Debugger (WinDBG). Throughout, WinMine will be utilized as a vehicle to deliver and demonstrate the functionality provided by WinDBG and how this functionality can be harnessed to aid the reader in reverse engineering native WIN32 applications. Topics covered include an introductory look at IA-32 assembly, register significance, memory protection, stack usage, various WinDBG commands, call stacks, endianness, and portions of the Windows API. Knowledge gleaned will be used to develop an application designed to reveal and/or remove bombs from the WinMine playing grid.

Links:

User Review Information

No User Reviews!