# Reverse-Engineering **Repository Path**: software-reverse-engineering/Reverse-Engineering ## Basic Information - **Project Name**: Reverse-Engineering - **Description**: No description available - **Primary Language**: Unknown - **License**: Apache-2.0 - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 1 - **Forks**: 0 - **Created**: 2022-01-14 - **Last Updated**: 2022-04-07 ## Categories & Tags **Categories**: Uncategorized **Tags**: 安全文档, 逆向文档 ## README ![image](https://github.com/mytechnotalent/Reverse-Engineering-Tutorial/blob/main/Reverse%20Engineering%20Tutorial.jpg?raw=true) # Reverse Engineering For Everyone! A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
## Join DC540 Discord [HERE](https://discord.gg/TC9V9RCr5U)
![image](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/DC540%20Angels%20Of%20Death.png?raw=true) ## DC540 Hacking Challenge 0x00001 [HERE](https://github.com/mytechnotalent/dc540-0x00001) ON GITHUB ## DC540 Hacking Challenge 0x00002 [MicroPython CTF] [HERE](https://github.com/mytechnotalent/dc540-0x00002) ON GITHUB ## DC540 Hacking Challenge 0x00003 [C CTF] [HERE](https://github.com/mytechnotalent/dc540-0x00003) ON GITHUB ## DC540 Hacking Challenge 0x00004 [C CTF] [HERE](https://github.com/mytechnotalent/dc540-0x00004) ON GITHUB ## DC540 Hacking Challenge 0x00005a [HERE](https://github.com/mytechnotalent/dc540-0x00005a) ON GITHUB ## DC540 Hacking Challenge 0x00005b [Assembler CTF] [HERE](https://github.com/mytechnotalent/dc540-0x00005b) ON GITHUB
## COURSE PROMOTIONAL VIDEO ### WATCH NOW [HERE](https://youtu.be/Yz0zFsp0qzE) ON YOUTUBE
## Reverse Engineering E-BOOK [HERE](https://0xinfection.github.io/reversing/) ## Reverse Engineering PDF [HERE](https://0xinfection.github.io/reversing/reversing-for-everyone.pdf) Assembled by @0xInfection (Twitter)
## Hacking Windows E-BOOK [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) UNDER DEVELOPMENT
## STEM Reverse Engineering Demo [HERE](https://github.com/mytechnotalent/micro-bit-Reverse-Engineering)
## Fundamental C++ PDF [HERE](https://github.com/mytechnotalent/Fundamental-CPP/blob/main/Fundamental%20C%2B%2B.pdf)
## Fundamental Go PDF [HERE](https://github.com/mytechnotalent/Fundamental-Go/blob/main/Fundamental_Go_ALPHA.pdf) COMING SOON
## Fundamental Python PDF [HERE](https://github.com/mytechnotalent/Fundamental-Python/blob/main/Fundamental_Python_ALPHA.pdf) UNDER DEVELOPMENT
## Python For Kids PDF [HERE](https://github.com/mytechnotalent/Python-For-Kids/blob/main/Python_For_Kids_01r.pdf)
## ToyOS [HERE](https://github.com/mytechnotalent/ToyOS)
## AArch64 Bytes [HERE](https://github.com/mytechnotalent/AArch64-Bytes) UNDER DEVELOPMENT
## Tor Everything PDF [HERE](https://github.com/mytechnotalent/TOR-Everything/blob/main/TOR%20Everything.pdf)
## Zeek Network Security Monitor [HERE](https://github.com/mytechnotalent/Zeek-Network-Security-Monitor)
## STM32F401CCUx_PA0ButtonHandler Driver (Assembly Language) [HERE](https://github.com/mytechnotalent/STM32F401CCUx_PA0ButtonHandler)
## x86 Course ## Lesson 1: x86 Course (Part 1: Goals) This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 2: x86 Course (Part 2: Techniques) This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-1/) to read the article on LinkedIn. ## Lesson 3: x86 Course (Part 3: Types Of Malware) This tutorial will address the basic forms of malware and how they work in simple terms. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-2/) to read the article on LinkedIn. ## Lesson 4: x86 Course (Part 4: x86 Assembly Intro) This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-3/) to read the article on LinkedIn. ## Lesson 5: x86 Course (Part 5: Binary Number System) This tutorial will address the very basics of the binary number system. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-4/) to read the article on LinkedIn. ## Lesson 6: x86 Course (Part 6: Hexadecimal Number System) This tutorial will address the very basics of the hexadecimal number system. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-5/) to read the article on LinkedIn. ## Lesson 7: x86 Course (Part 7: Transistors And Memory) This tutorial will address the basics of transistors and memory. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6/) to read the article on LinkedIn. ## Lesson 8: x86 Course (Part 8 - Bytes, Words, Double Words, etc...) This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-7/) to read the article on LinkedIn. ## Lesson 9: x86 Course (Part 9: x86 Basic Architecture) This tutorial will address the basic architecture of an x86 processor. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-8/) to read the article on LinkedIn. ## Lesson 10: x86 Course (Part 10: General-purpose Registers) This tutorial will address the general purpose x86 registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-9/) to read the article on LinkedIn. ## Lesson 11: x86 Course (Part 11: Segment Registers) This tutorial will address the x86 segment registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-10/) to read the article on LinkedIn. ## Lesson 12: x86 Course (Part 12: Instruction Pointer Register) This tutorial will address the x86 instruction pointer register. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-11/) to read the article on LinkedIn. ## Lesson 13: x86 Course (Part 13: Control Registers) This tutorial will address the x86 control registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-12/) to read the article on LinkedIn. ## Lesson 14: x86 Course (Part 14: Flags) This tutorial will address the status, control and systems flags. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-13/) to read the article on LinkedIn. ## Lesson 15: x86 Course (Part 15: Stack) This tutorial will address the stack. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-14/) to read the article on LinkedIn. ## Lesson 16: x86 Course (Part 16: Heap) This tutorial will address the heap. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-15/) to read the article on LinkedIn. ## Lesson 17: x86 Course (Part 17 – How To Install Linux) This tutorial will address how to install Ubuntu Linux on both Windows and MAC. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-16/) to read the article on LinkedIn. ## Lesson 18: x86 Course (Part 18 - vim Text Editor) This tutorial will address how to install the vim text editor. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-17/) to read the article on LinkedIn. ## Lesson 19: x86 Course (Part 19 - Why Learn Assembly) This tutorial will address the age old question of why to bother understanding the basics of Assembly Language. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-18/) to read the article on LinkedIn. ## Lesson 20: x86 Course (Part 20 - Instruction Code Handling) This tutorial will address op codes and instruction code handling. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-19/) to read the article on LinkedIn. ## Lesson 21: x86 Course (Part 21 - How To Compile A Program) This tutorial will address how to compile a basic x86 Assembly Program. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6174148486322233344/) to read the article on LinkedIn. ## Lesson 22: x86 Course (Part 22 - ASM Program 1 [Moving Immediate Data]) This tutorial will address how to create our first real Assembly Program by moving immediate data. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6176700362704056320/) to read the article on LinkedIn. ## Lesson 23: x86 Course (Part 23 - ASM Debugging 1 [Moving Immediate Data]) This tutorial will address how to debug our first real Assembly Program by moving immediate data. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6179235028048834560/) to read the article on LinkedIn. ## Lesson 24: x86 Course (Part 24 - ASM Hacking 1 [Moving Immediate Data]) This tutorial will address how to hack our first real Assembly Program by moving immediate data. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6181749648739282944/) to read the article on LinkedIn. ## Lesson 25: x86 Course (Part 25 - ASM Program 2 [Moving Data Between Registers]) This tutorial will address how to create our second real Assembly Program by moving between registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6184290421015871488/) to read the article on LinkedIn. ## Lesson 26: x86 Course (Part 26 - ASM Debugging 2 [Moving Data Between Registers]) This tutorial will address how to debug our second real Assembly Program by moving between registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6186852494581198848/) to read the article on LinkedIn. ## Lesson 27: x86 Course (Part 27 - ASM Hacking 2 [Moving Data Between Registers]) This tutorial will address how to hack our second real Assembly Program by moving between registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6189381915728973824/) to read the article on LinkedIn. ## Lesson 28: x86 Course (Part 28 - ASM Program 3 [Moving Data Between Memory And Registers]) This tutorial will address how to create our third real Assembly Program by moving between memory and registers -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6191923581476184064/) to read the article on LinkedIn. ## Lesson 29: x86 Course (Part 29 - ASM Debugging 3 [Moving Data Between Memory And Registers]) This tutorial will address how to debug our third real Assembly Program by moving between memory and registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6194452403807363072/) to read the article on LinkedIn. ## Lesson 30: x86 Course (Part 30 - ASM Hacking 3 [Moving Data Between Memory And Registers]) This tutorial will address how to hack our third real Assembly Program by moving between memory and registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6196977244754186240/) to read the article on LinkedIn. ## Lesson 31: x86 Course (Part 31 - ASM Program 4 [Moving Data Between Registers And Memory]) This tutorial will address how to create our fourth real Assembly Program by moving between registers and memory. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6199521459321217024/) to read the article on LinkedIn. ## Lesson 32: x86 Course (Part 32 - ASM Debugging 4 [Moving Data Between Registers And Memory]) This tutorial will address how to debug our fourth real Assembly Program by moving between registers and memory. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6202084078657769472/) to read the article on LinkedIn. ## Lesson 33: x86 Course (Part 33 - ASM Hacking 4 [Moving Data Between Registers And Memory]) This tutorial will address how to hack our fourth real Assembly Program by moving between registers and memory. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6204613196200845313/) to read the article on LinkedIn. ## Lesson 34: x86 Course (Part 34 - ASM Program 5 [Indirect Addressing With Registers]) This tutorial will address how to create our fifth real Assembly Program by indirect addressing with registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6207141090722619392/) to read the article on LinkedIn. ## Lesson 35: x86 Course (Part 35 - ASM Debugging 5 [Indirect Addressing With Registers]) This tutorial will address how to debug our fifth real Assembly Program by indirect addressing with registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6209671278844997632/) to read the article on LinkedIn. ## Lesson 36: x86 Course (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers]) This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6212225805402009600/) to read the article on LinkedIn. ## Lesson 37: x86 Course (Part 37 - ASM Program 6 [CMOV Instructions]) This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6214770773354123264/) to read the article on LinkedIn. ## Lesson 38: x86 Course (Part 38 - ASM Debugging 6 [CMOV Instructions]) This tutorial will address how to debug our sixth real Assembly Program with CMOV instructions. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6216651661075582976/) to read the article on LinkedIn. ## Lesson 39: x86 Course (Part 39 - ASM Hacking 6 [CMOV Instructions]) This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6219938772826492928/) to read the article on LinkedIn. ## Lesson 40: x86 Course (Part 40 - Conclusion) This tutorial will conclude this x86 tutorial. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6222371031936434176/) to read the article on LinkedIn.
## ARM-32 Course 1 ## Lesson 41: ARM-32 Course 1 (Part 1 – The Meaning Of Life) This tutorial will introduce our ARM-32 Course 1 tutorial series. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-1-meaning-life-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 42: ARM-32 Course 1 (Part 2 - Number Systems) This tutorial will discuss number systems such as binary, decimal and hexadecimal in detail. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-2-number-systems-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 43: ARM-32 Course 1 (Part 3 - Binary Addition) This tutorial will discuss binary addition. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-3-binary-addition-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 44: ARM-32 Course 1 (Part 4 - Binary Subtraction) This tutorial will discuss binary subtraction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-4-binary-subtraction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 45: ARM-32 Course 1 (Part 5 - Word Lengths) This tutorial will discuss word lengths. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-5-word-lengths-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 46: ARM-32 Course 1 (Part 6 - Registers) This tutorial will discuss registers. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-6-registers-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 47: ARM-32 Course 1 (Part 7 - Program Counter) This tutorial will discuss the program counter. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-7-program-counter-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 48: ARM-32 Course 1 (Part 8 - CPSR) This tutorial will discuss the CPSR. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-8-cpsr-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 49: ARM-32 Course 1 (Part 9 - Link Register) This tutorial will discuss the Link Register. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-9-link-register-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 50: ARM-32 Course 1 (Part 10 - Stack Pointer) This tutorial will discuss the Stack Pointer. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-10-stack-pointer-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 51: ARM-32 Course 1 (Part 11 - ARM Firmware Boot Procedures) This tutorial will discuss ARM Firmware Boot Procedures. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-11-firmware-boot-procedures-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 52: ARM-32 Course 1 (Part 12 - Von Neumann Architecture) This tutorial will discuss Von Neumann Architecture. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-12-von-neumann-architecture-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 53: ARM-32 Course 1 (Part 13 - Instruction Pipeline) This tutorial will discuss the instruction pipeline. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-13-instruction-pipeline-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 54: ARM-32 Course 1 (Part 14 - ADD) This tutorial will discuss the add instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-14-add-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 55: ARM-32 Course 1 (Part 15 - Debugging ADD) This tutorial will discuss debugging the add instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-15-debugging-add-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 56: ARM-32 Course 1 (Part 16 - Hacking ADD) This tutorial will discuss hacking the add instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-16-hacking-add-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 57: ARM-32 Course 1 (Part 17 - ADDS) This tutorial will discuss the adds instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-17-adds-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 58: ARM-32 Course 1 (Part 18 – Debugging ADDS) This tutorial will discuss debugging the adds instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-18-debugging-adds-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 59: ARM-32 Course 1 (Part 19 – Hacking ADDS) This tutorial will discuss hacking the adds instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-19-hacking-adds-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 60: ARM-32 Course 1 (Part 20 – ADC) This tutorial will discuss the ADC instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-20-adc-kevin-m-thomas) to read the article on LinkedIn. ## Lesson 61: ARM-32 Course 1 (Part 21 – Debugging ADC) This tutorial will discuss debugging the ADC instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-21-adc-debugging-kevin-m-thomas) to read the article on LinkedIn. ## Lesson 62: ARM-32 Course 1 (Part 22 – Hacking ADC) This tutorial will discuss hacking the ADC instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-22-adc-hacking-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 63: ARM-32 Course 1 (Part 23 – SUB) This tutorial will discuss the SUB instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-23-sub-kevin-m-thomas) to read the article on LinkedIn. ## Lesson 64: ARM-32 Course 1 (Part 24 – Debugging SUB) This tutorial will discuss debugging the SUB instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-24-debugging-sub-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 65: ARM-32 Course 1 (Part 25 – Hacking SUB) This tutorial will discuss hacking the SUB instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-25-hacking-sub-kevin-m-thomas/) to read the article on LinkedIn.
## ARM-32 Course 2 ## Lesson 66: ARM-32 Course 2 (Part 1 – The Meaning Of Life Part 2) This tutorial will introduce our ARM-32 Course 2 course. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-1-meaning-life-2-kevin-m-thomas) to read the article on LinkedIn. ## Lesson 67: ARM-32 Course 2 (Part 2 – Number Systems) This tutorial will discuss number systems. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-2-number-systems-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 68: ARM-32 Course 2 (Part 3 – Binary Addition) This tutorial will discuss binary addition. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-3-binary-addition-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 69: ARM-32 Course 2 (Part 4 – Binary Subtraction) This tutorial will discuss binary subtraction. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-4-binary-subtraction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 70: ARM-32 Course 2 (Part 5 – Word Lengths) This tutorial will discuss word lengths. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-5-word-lengths-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 71: ARM-32 Course 2 (Part 6 – Registers) This tutorial will discuss registers. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-6-registers-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 72: ARM-32 Course 2 (Part 7 – Program Counter) This tutorial will discuss program counter. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-7-program-counter-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 73: ARM-32 Course 2 (Part 8 - CPSR) This tutorial will discuss the CPSR. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-8-cpsr-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 74: ARM-32 Course 2 (Part 9 - Link Register) This tutorial will discuss the link register. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-9-link-register-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 75: ARM-32 Course 2 (Part 10 - Stack Pointer) This tutorial will discuss the stack pointer. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-10-stack-pointer-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 76: ARM-32 Course 2 (Part 11 - Firmware Boot Procedures) This tutorial will discuss the firmware boot procedures. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-11-firmware-boot-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 77: ARM-32 Course 2 (Part 12 - Von Neumann Architecture) This tutorial will discuss the Von Neumann Architecture. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-12-von-neumann-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 78: ARM-32 Course 2 (Part 13 - Instruction Pipeline) This tutorial will discuss the instruction pipeline. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-13-instruction-pipeline-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 79: ARM-32 Course 2 (Part 14 - Hello World) This tutorial will discuss the basics of a hello world program in ARM 32-bit. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-14-hello-world-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 80: ARM-32 Course 2 (Part 15 - Debugging Hello World) This tutorial will discuss debugging hello world. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-15-debugging-hello-world-thomas/) to read the article on LinkedIn. ## Lesson 81: ARM-32 Course 2 (Part 16 - Hacking Hello World) This tutorial will discuss hacking hello world. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-16-hacking-hello-world-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 82: ARM-32 Course 2 (Part 17 - Constants) This tutorial will discuss constants. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-17-constants-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 83: ARM-32 Course 2 (Part 18 – Debugging Constants) This tutorial will discuss debugging constants. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-18-debugging-constants-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 84: ARM-32 Course 2 (Part 19 – Hacking Constants) This tutorial will discuss hacking constants. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-19-hacking-constants-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 85: ARM-32 Course 2 (Part 20 – Character Variables) This tutorial will discuss character variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-20-character-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 86: ARM-32 Course 2 (Part 21 – Debugging Character Variables) This tutorial will discuss debugging character variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-21-debugging-character-variables-thomas/) to read the article on LinkedIn. ## Lesson 87: ARM-32 Course 2 (Part 22 – Hacking Character Variables) This tutorial will discuss hacking character variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-22-hacking-character-variables-thomas/) to read the article on LinkedIn. ## Lesson 88: ARM-32 Course 2 (Part 23 – Boolean Variables) This tutorial will discuss boolean variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-23-boolean-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 89: ARM-32 Course 2 (Part 24 – Debugging Boolean Variables) This tutorial will discuss debugging boolean variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-24-debugging-boolean-variables-thomas/) to read the article on LinkedIn. ## Lesson 90: ARM-32 Course 2 (Part 25 – Hacking Boolean Variables) This tutorial will discuss hacking boolean variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-25-hacking-boolean-variables-thomas/) to read the article on LinkedIn. ## Lesson 91: ARM-32 Course 2 (Part 26 – Integer Variables) This tutorial will discuss integer variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-26-integer-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 92: ARM-32 Course 2 (Part 27 – Debugging Integer Variables) This tutorial will discuss debugging integer variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-27-debugging-integer-variables-thomas/) to read the article on LinkedIn. ## Lesson 93: ARM-32 Course 2 (Part 28 – Hacking Integer Variables) This tutorial will discuss hacking integer variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-28-hacking-integer-variables-thomas/) to read the article on LinkedIn. ## Lesson 94: ARM-32 Course 2 (Part 29 – Float Variables) This tutorial will discuss float variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-29-float-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 95: ARM-32 Course 2 (Part 30 – Debugging Float Variables) This tutorial will discuss debugging float variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-30-debugging-float-variables-thomas/) to read the article on LinkedIn. ## Lesson 96: ARM-32 Course 2 (Part 31 – Hacking Float Variables) This tutorial will discuss hacking float variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-30-debugging-float-variables-thomas-1/) to read the article on LinkedIn. ## Lesson 97: ARM-32 Course 2 (Part 32 – Double Variables) This tutorial will discuss double variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-32-double-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 98: ARM-32 Course 2 (Part 33 – Debugging Double Variables) This tutorial will discuss debugging double variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-33-debugging-double-variables-thomas/) to read the article on LinkedIn. ## Lesson 99: ARM-32 Course 2 (Part 34 – Hacking Double Variables) This tutorial will discuss hacking double variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-34-hacking-double-variables-thomas/) to read the article on LinkedIn. ## Lesson 100: ARM-32 Course 2 (Part 35 – SizeOf Operator) This tutorial will discuss the sizeof operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-35-sizeof-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 101: ARM-32 Course 2 (Part 36 – Debugging SizeOf Operator) This tutorial will discuss debugging sizeof operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-36-debugging-sizeof-operator-thomas/) to read the article on LinkedIn. ## Lesson 102: ARM-32 Course 2 (Part 37 – Hacking SizeOf Operator) This tutorial will discuss hacking sizeof operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-37-hacking-sizeof-operator-thomas/) to read the article on LinkedIn. ## Lesson 103: ARM-32 Course 2 (Part 38 – Pre-Increment Operator) This tutorial will discuss the pre-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-38-pre-increment-operator-thomas/) to read the article on LinkedIn. ## Lesson 104: ARM-32 Course 2 (Part 39 – Debugging Pre-Increment Operator) This tutorial will discuss debugging pre-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-39-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 105: ARM-32 Course 2 (Part 40 – Hacking Pre-Increment Operator) This tutorial will discuss hacking pre-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-40-hacking-pre-increment-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 106: ARM-32 Course 2 (Part 41 – Post-Increment Operator) This tutorial will discuss the post-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-41-post-increment-operator-thomas/) to read the article on LinkedIn. ## Lesson 107: ARM-32 Course 2 (Part 42 – Debugging Post-Increment Operator) This tutorial will discuss debugging post-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-42-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 108: ARM-32 Course 2 (Part 43 – Hacking Post-Increment Operator) This tutorial will discuss hacking post-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-43-hacking-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 109: ARM-32 Course 2 (Part 44 – Pre-Decrement Operator) This tutorial will discuss the pre-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-44-pre-decrement-operator-thomas/) to read the article on LinkedIn. ## Lesson 110: ARM-32 Course 2 (Part 45 – Debugging Pre-Decrement Operator) This tutorial will discuss debugging pre-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-45-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 111: ARM-32 Course 2 (Part 46 – Hacking Pre-Decrement Operator) This tutorial will discuss hacking pre-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-46-hacking-pre-decrement-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 112: ARM-32 Course 2 (Part 47 – Post-Decrement Operator) This tutorial will discuss post-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-47-post-decrement-operator-thomas/) to read the article on LinkedIn. ## Lesson 113: ARM-32 Course 2 (Part 48 – Debugging Post-Decrement Operator) This tutorial will discuss debugging post-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-48-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 114: ARM-32 Course 2 (Part 49 – Hacking Post-Decrement Operator) This tutorial will discuss hacking post-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-49-hacking-operator-kevin-m-thomas/) to read the article on LinkedIn.
## ARM-32 Project Course ## Lesson 115: ARM-32 Project (Part 1 – Hacking Hello World) ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux. -> Click [HERE](https://github.com/mytechnotalent/0x01-ARM-32-Hacking-Hello-World/) to read the project on GitHub. ## Lesson 116: ARM-32 Project (Part 2 – Hacking Int) ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux. -> Click [HERE](https://github.com/mytechnotalent/0x02-ARM-32-Hacking-Int/) to read the project on GitHub. ## Lesson 117: ARM-32 Project (Part 3 – Hacking Float) ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux. -> Click [HERE](https://github.com/mytechnotalent/0x03-ARM-32-Hacking-Float/) to read the project on GitHub. ## Lesson 118: ARM-32 Project (Part 4 – Hacking Double) ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux. -> Click [HERE](https://github.com/mytechnotalent/0x04-ARM-32-Hacking-Double/) to read the project on GitHub. ## Lesson 119: ARM-32 Project (Part 5 – Hacking Char) ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux. -> Click [HERE](https://github.com/mytechnotalent/0x05-ARM-32-Hacking_Char/) to read the project on GitHub. ## Lesson 120: ARM-32 Project (Part 6 – Hacking Char Pointer) ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux. -> Click [HERE](https://github.com/mytechnotalent/0x06-ARM-32-Hacking-Char-Pointer/) to read the project on GitHub.
## x64 Course ## Lesson 121: x64 Course (Part 1 – The Cyber Revolution) This tutorial will discuss the cyber revolution. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-1-cyber-revolution-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 122: x64 Course (Part 2 - Transistors) This tutorial will discuss transistors. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-2-transistors-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 123: x64 Course (Part 3 - Logic Gates) This tutorial will discuss logic gates. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-3-logic-gates-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 124: x64 Course (Part 4 - Number Systems) This tutorial will discuss number systems. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-4-number-systems-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 125: x64 Course (Part 5 - Binary Addition) This tutorial will discuss binary addition. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-5-binary-addition-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 126: x64 Course (Part 6 - Binary Subtraction) This tutorial will discuss binary subtraction. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-6-binary-subtraction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 127: x64 Course (Part 7 - Word Lengths) This tutorial will discuss word lengths. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-7-word-lengths-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 128: x64 Course (Part 8 - General Architecture) This tutorial will discuss the general architecture. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-8-general-architecture-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 129: x64 Course (Part 9 - Calling Conventions) This tutorial will discuss calling conventions. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-9-calling-conventions-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 130: x64 Course (Part 10 - Boolean Instructions) This tutorial will discuss boolean instructions. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-10-boolean-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 131: x64 Course (Part 11 - Pointers) This tutorial will discuss pointers. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-11-pointers-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 132: x64 Course (Part 12 - Load Effective Address) This tutorial will discuss load effective address. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-12-load-effective-address-thomas/) to read the article on LinkedIn. ## Lesson 133: x64 Course (Part 13 - The Data Segment) This tutorial will discuss the data segment. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-13-data-segment-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 134: x64 Course (Part 14 - SHL Instruction) This tutorial will discuss the shl instruction. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-14-shl-instruction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 135: x64 Course (Part 15 - SHR Instruction) This tutorial will discuss the shr instruction. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-15-shr-instruction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 136: x64 Course (Part 16 - ROL Instruction) This tutorial will discuss rol instruction. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-16-rol-instruction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 137: x64 Course (Part 17 - ROR Instruction) This tutorial will discuss the ror instruction. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-17-ror-instruction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 138: x64 Course (Part 18 - Boot Sector Basics [Part 1]) This tutorial will discuss boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-18-boot-sector-basics-1-thomas/) to read the article on LinkedIn. ## Lesson 139: x64 Course (Part 19 - Boot Sector Basics [Part 2]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-18-boot-sector-basics-2-thomas/) to read the article on LinkedIn. ## Lesson 140: x64 Course (Part 20 - Boot Sector Basics [Part 3]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-20-boot-sector-basics-3-thomas/) to read the article on LinkedIn. ## Lesson 141: x64 Course (Part 21 - Boot Sector Basics [Part 4]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-21-boot-sector-basics-4-thomas/) to read the article on LinkedIn. ## Lesson 142: x64 Course (Part 22 - Boot Sector Basics [Part 5]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-22-boot-sector-basics-5-thomas/) to read the article on LinkedIn. ## Lesson 143: x64 Course (Part 23 - Boot Sector Basics [Part 6]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-23-boot-sector-basics-6-thomas/) to read the article on LinkedIn. ## Lesson 144: x64 Course (Part 24 - Boot Sector Basics [Part 7]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-24-boot-sector-basics-7-thomas/) to read the article on LinkedIn. ## Lesson 145: x64 Course (Part 25 - Boot Sector Basics [Part 8]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-25-boot-sector-basics-8-thomas/) to read the article on LinkedIn. ## Lesson 146: x64 Course (Part 26 - Boot Sector Basics [Part 9]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-26-boot-sector-basics-9-thomas/) to read the article on LinkedIn. ## Lesson 147: x64 Course (Part 27 - x64 Assembly [Part 1]) This tutorial will discuss x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-27-assembly-1-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 148: x64 Course (Part 28 - x64 Assembly [Part 2]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-28-assembly-2-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 149: x64 Course (Part 29 - x64 Assembly [Part 3]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-29-assembly-3-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 150: x64 Course (Part 30 - x64 Assembly [Part 4]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-30-assembly-4-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 151: x64 Course (Part 31 - x64 Assembly [Part 5]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-31-assembly-5-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 152: x64 Course (Part 32 - x64 Assembly [Part 6]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-32-assembly-6-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 153: x64 Course (Part 33 - x64 Assembly [Part 7]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-33-assembly-7-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 154: x64 Course (Part 34 - x64 C++ 1 Code [Part 1]) This tutorial will discuss c++ code as it relates to 64-bit assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-34-c-1-code-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 155: x64 Course (Part 35 - x64 C++ 2 Debug [Part 2]) This tutorial will discuss more c++ code as it relates to 64-bit assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-35-c-1-debug-2-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 156: x64 Course (Part 36 - x64 C++ 3 Hacking [Part 3]) This tutorial will discuss more c++ code as it relates to 64-bit assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-36-c-1-hacking-3-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 157: x64 Course (Part 37 - x64 C & Genesis Of Life) This tutorial will discuss c and how it relates to x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-37-c-genesis-life-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 158: x64 Course (Part 38 - x64 Networking Basics) This tutorial will discuss x64 networking basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-38-networking-basics-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 159: x64 Course (Part 39 - Why C?) This tutorial will discuss the power of the c language. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-39-why-c-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 160: x64 Course (Part 40 - Hacking Hello World!) This tutorial will discuss hacking hello world. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-40-hacking-hello-world-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 161: x64 Course (Part 41 - Hacking Variables!) This tutorial will discuss hacking variables. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-41-hacking-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 162: x64 Course (Part 42 - Hacking Branches!) This tutorial will discuss hacking branches. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-42-hacking-branches-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 163: x64 Course (Part 43 - Hacking Pointers!) This tutorial will discuss hacking pointers. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-43-hacking-pointers-kevin-m-thomas/) to read the article on LinkedIn.
## ARM-64 Course ## Lesson 164: ARM-64 Course (Part 1 - The Meaning Of Life) In this lesson we will discuss the course concepts and the meaning of life. -> Click [HERE](https://www.linkedin.com/pulse/lesson-1-hacking-c-arm-64-part-meaning-life-kevin-thomas/) to read the article on LinkedIn. ## Lesson 165: ARM-64 Course (Part 2 - Development Setup) In this lesson we will discuss how to set up our development in 64-bit ARM with Kali Linux. -> Click [HERE](https://www.linkedin.com/pulse/lesson-2-hacking-c-arm-64-part-development-setup-kevin-thomas/) to read the article on LinkedIn. ## Lesson 166: ARM-64 Course (Part 3 - "Hello World") In this lesson we will discuss how to write and compile a simple hello world program in C++. -> Click [HERE](https://www.linkedin.com/pulse/lesson-2-hacking-c-arm-64-part-hello-world-kevin-thomas/) to read the article on LinkedIn. ## Lesson 167: ARM-64 Course (Part 4 - Debugging "Hello World") In this lesson we will debug our simple hello world program. -> Click [HERE](https://www.linkedin.com/pulse/lesson-4-hacking-c-arm-64-part-debugging-hello-world-kevin-thomas/) to read the article on LinkedIn. ## Lesson 168: ARM-64 Course (Part 5 - Hacking "Hello World") In this lesson we will hack our simple hello world program. -> Click [HERE](https://www.linkedin.com/pulse/lesson-5-hacking-c-arm-64-part-hello-world-kevin-thomas/) to read the article on LinkedIn. ## Lesson 169: ARM-64 Course (Part 6 - Basic I/O) In this lesson we will discuss how to write and compile a simple basicio program in C++ and discuss basic input validation. -> Click [HERE](https://www.linkedin.com/pulse/lesson-6-hacking-c-arm-64-part-basic-io-kevin-thomas/) to read the article on LinkedIn. ## Lesson 170: ARM-64 Course (Part 7 - Debugging Basic I/O) In this lesson we will discuss how to debug a simple basicio program in C++ and discuss basic input validation. -> Click [HERE](https://www.linkedin.com/pulse/lesson-7-hacking-c-arm-64-part-debugging-basic-io-kevin-thomas/) to read the article on LinkedIn. ## Lesson 171: ARM-64 Course (Part 8 - Hacking Basic I/O) In this lesson we will discuss how to hack a simple basicio program in C++ and discuss basic input validation. -> Click [HERE](https://www.linkedin.com/pulse/lesson-8-hacking-c-arm-64-part-basic-io-kevin-thomas/) to read the article on LinkedIn. ## Lesson 172: ARM-64 Course (Part 9 - Character Primitive Datatype) In this lesson we will discuss the char primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/lesson-9-hacking-c-arm-64-part-character-primitive-datatype-thomas/) to read the article on LinkedIn. ## Lesson 173: ARM-64 Course (Part 10 - Debugging Character Primitive Datatype) In this lesson we will discuss debugging the char primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/lesson-10-hacking-c-arm-64-part-debugging-character-kevin-thomas/) to read the article on LinkedIn. ## Lesson 174: ARM-64 Course (Part 11 - Hacking Character Primitive Datatype) In this lesson we will discuss hacking the char primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/lesson-11-hacking-c-arm-64-part-character-primitive-kevin-thomas/) to read the article on LinkedIn. ## Lesson 175: ARM-64 Course (Part 12 - Boolean Primitive Datatype) In this lesson we will discuss the boolean primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-12-boolean-primitive-datatype-kevin-thomas/) to read the article on LinkedIn. ## Lesson 176: ARM-64 Course (Part 13 - Debugging Boolean Primitive Datatype) In this lesson we will discuss debugging the boolean primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-13-debugging-boolean-primitive-kevin-thomas/) to read the article on LinkedIn. ## Lesson 177: ARM-64 Course (Part 14 - Hacking Boolean Primitive Datatype) In this lesson we will discuss hacking the boolean primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-14-boolean-primitive-datatype-kevin-thomas/) to read the article on LinkedIn. ## Lesson 178: ARM-64 Course (Part 15 - Float Primitive Datatype) In this lesson we will discuss the float primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-15-float-primitive-datatype-kevin-thomas/) to read the article on LinkedIn. ## Lesson 179: ARM-64 Course (Part 16 - Debugging Float Primitive Datatype) In this lesson we will discuss debugging the float primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-16-debugging-float-primitive-datatype-thomas/) to read the article on LinkedIn. ## Lesson 180: ARM-64 Course (Part 17 - Hacking Float Primitive Datatype) In this lesson we will discuss hacking the float primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-17-float-primitive-datatype-kevin-thomas/) to read the article on LinkedIn. ## Lesson 181: ARM-64 Course (Part 18 - Double Primitive Datatype) In this lesson we will discuss the double primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-18-double-primitive-datatype-kevin-thomas/) to read the article on LinkedIn. ## Lesson 182: ARM-64 Course (Part 19 - Debugging Double Primitive Datatype) In this lesson we will discuss debugging the double primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-19-debugging-double-primitive-kevin-thomas/) to read the article on LinkedIn. ## Lesson 183: ARM-64 Course (Part 20 - Hacking Double Primitive Datatype) In this lesson we will discuss hacking the double primitive datatype. -> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-20-double-primitive-datatype-kevin-thomas/) to read the article on LinkedIn.
## Pico Hacking Course ## Lesson 184: Pico Hacking Course (Part 1 - The Why, The How...) In this lesson we will discuss the basic setup of the development environment for the Raspberry Pi Pico. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-1-why-how-kevin-thomas/) to read the article on LinkedIn. ## Lesson 185: Pico Hacking Course (Part 2 - Hello World) In this lesson we will discuss the basic Hello World program. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-2-hello-world-kevin-thomas/) to read the article on LinkedIn. ## Lesson 186: Pico Hacking Course (Part 3 - Debugging Hello World) In this lesson we will discuss debugging the basic Hello World program. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-3-debugging-hello-world-kevin-thomas/) to read the article on LinkedIn. ## Lesson 187: Pico Hacking Course (Part 4 - Hacking Hello World) In this lesson we will discuss hacking the basic Hello World program. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-4-hello-world-kevin-thomas) to read the article on LinkedIn. ## Lesson 188: Pico Hacking Course (Part 5 - char) In this lesson we will discuss the char data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-4-char-kevin-thomas/) to read the article on LinkedIn. ## Lesson 189: Pico Hacking Course (Part 6 - Debugging char) In this lesson we will discuss debugging the char data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-6-debugging-char-kevin-thomas/) to read the article on LinkedIn. ## Lesson 190: Pico Hacking Course (Part 7 - Hacking char) In this lesson we will discuss hacking the char data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-7-char-kevin-thomas/) to read the article on LinkedIn. ## Lesson 191: Pico Hacking Course (Part 8 - int) In this lesson we will discuss the int data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-8-int-kevin-thomas/) to read the article on LinkedIn. ## Lesson 192: Pico Hacking Course (Part 9 - Debugging int) In this lesson we will discuss debugging the int data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-9-debugging-int-kevin-thomas/) to read the article on LinkedIn. ## Lesson 193: Pico Hacking Course (Part 10 - Hacking int) In this lesson we will discuss hacking the int data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-10-int-kevin-thomas/) to read the article on LinkedIn. ## Lesson 194: Pico Hacking Course (Part 11 - float) In this lesson we will discuss the float data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-11-float-kevin-thomas/) to read the article on LinkedIn. ## Lesson 195: Pico Hacking Course (Part 12 - Debugging float) In this lesson we will discuss debugging the float data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-12-debugging-float-kevin-thomas/) to read the article on LinkedIn. ## Lesson 196: Pico Hacking Course (Part 13 - Hacking float) In this lesson we will discuss hacking the float data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-13-float-kevin-thomas/) to read the article on LinkedIn. ## Lesson 197: Pico Hacking Course (Part 14 - double) In this lesson we will discuss the double data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-14-double-kevin-thomas/) to read the article on LinkedIn. ## Lesson 198: Pico Hacking Course (Part 15 - Debugging double) In this lesson we will discuss debugging the double data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-15-debugging-double-kevin-thomas/) to read the article on LinkedIn. ## Lesson 199: Pico Hacking Course (Part 16 - Hacking double) In this lesson we will discuss hacking the double data type. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-16-double-kevin-thomas/) to read the article on LinkedIn. ## Lesson 200: Pico Hacking Course (Part 17 - "ABSOLUTE POWER CORRUPTS ABSOLUTELY!", The Tragic Tale Of Input...) In this lesson we will discuss the concept of proper input handling. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-17-absolute-power-corrupts-tragic-kevin-thomas/) to read the article on LinkedIn. ## Lesson 201: Pico Hacking Course (Part 18 - "FOR 800 YEARS HAVE I TRAINED JEDI!", The FORCE That IS Input...) In this lesson we will discuss the importance of proper input handling in addition to breaking down our custom input function. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-18-800-years-have-i-trained-jedi-force-thomas/) to read the article on LinkedIn. ## Lesson 202: Pico Hacking Course (Part 19 - Input) In this lesson we will discuss creating an effective input architecture. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-19-input-kevin-thomas/) to read the article on LinkedIn. ## Lesson 203: Pico Hacking Course (Part 20 - Debugging Input) In this lesson we will discuss debugging input. -> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-20-debugging-input-kevin-thomas/) to read the article on LinkedIn.
## AArch64 Bytes Articles ## AArch64 Bytes Articles (Part 1: Reversing Exit) In this bite we learn about what happens at the very core of a 32-bit AArch64 instruction by reversing the exit Linux syscall. -> Click [HERE](https://medium.com/@mytechnotalent/aarch-64-bytes-part-1-reversing-exit-f7e4775d5e14) to read the article on Medium. ## AArch64 Bytes Articles (Part 2: 64-bit Immediate Values) In this bite we learn about how to handle moving a 64-bit immediate value into a 64-bit register. -> Click [HERE](https://medium.com/@mytechnotalent/aarch-64-bytes-part-2-64-bit-immediate-values-d9daa5256d76) to read the article on Medium. ## AArch64 Bytes Articles (Part 3: Yet Another Upper) In this bite we learn how to create a simple parsing algorithm to convert a string's lowercase chars to uppercase, timeless Assembler example. -> Click [HERE](https://medium.com/@mytechnotalent/aarch-64-bytes-part-e-yet-another-upper-6dcb56bb7e91) to read the article on Medium. ## ARTICLES ARE UNDER DEVELOPMENT
## Hacking Windows Course ## Hacking Windows Course (Chapter 1 - Hello World) This chapter covers the basics of designing a very simple Windows Assembly Language message box program in pure Assembly for both x86 and x64 architectures. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 2: Debugging Hello World x86) This chapter covers the dynamic reverse engineering analysis, debugging, of the Hello World app in x86 Assembly. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 3: Hacking Hello World x86) This chapter covers the dynamic reverse engineering analysis, hacking, of the Hello World app in x86 Assembly. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 4: Debugging Hello World x64) This chapter covers the dynamic reverse engineering analysis, debugging, of the Hello World app in x64 Assembly. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 5: Hacking Hello World x64) This chapter covers the dynamic reverse engineering analysis, hacking, of the Hello World app in x64 Assembly. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 6: Directories) This chapter covers reviewing the Windows API CreateDirectoryW and RemoveDirectoryW functions in C. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 7: Debugging Directories x86) This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x86 Assembly. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 8: Hacking Directories x86) This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x86 Assembly. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 9: Debugging Directories x64) This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x64 Assembly. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 10: Hacking Directories x64) This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x64 Assembly. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 11: CopyFile) This chapter covers reviewing the Windows API CopyFileW function in C. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 12: Debugging CopyFile x86) This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CopyFileW function in x86 Assembly. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## Hacking Windows Course (Chapter 13: Hacking CopyFile x86) This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CopyFileW function in x86 Assembly. -> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book. ## BOOK IS UNDER DEVELOPMENT
## Zeek Network Security Monitor Course ## Zeek Network Security Monitor Course (Lesson 1: Setup) In this lesson we set up a basic Ubuntu computer connected directly to an inexpensive tap which connects to your home router. I have provided products you can purchase if you do not have existing parts however please feel free to use any network tap of your choosing and/or any additional Ethernet adapters or cables of your choosing. -> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-1-setup-f0ac2fb8eba8) to read the article on Medium. ## Zeek Network Security Monitor Course (Lesson 2: alert-all-notices.zeek) In this lesson we create an alert by logging all notices that Zeek deems worthy of your attention to the notice.log file in addition to sending you an email. -> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-2-alert-all-notices-zeek-5591357f6f21) to read the article on Medium. ## Zeek Network Security Monitor Course (Lesson 3: conn.log) In this lesson we will show the source IP addresses and ports and their destination IP addresses and ports. -> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-3-conn-log-c104ad5570bd) to read the article on Medium. ## Zeek Network Security Monitor Course (Lesson 4: conn.log - 2) In this lesson we will show the source IP addresses that generated the most network traffic, organized in descending order. -> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-4-conn-log-2-723b4d344504) to read the article on Medium. ## Zeek Network Security Monitor Course (Lesson 5: conn.log - 3) In this lesson we will show the destination ports that received the most network traffic, organized in descending order. -> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-5-conn-log-3-5e6ff976a9b5) to read the article on Medium. ## Zeek Network Security Monitor Course (Lesson 6: conn.log - 4) In this lesson we will show the number of connections per protocol service. -> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-6-conn-log-4-d5d62610cc02) to read the article on Medium. ## Zeek Network Security Monitor Course (Lesson 7: conn.log - 5) In this lesson we will show the distinct browsers used by the hosts. -> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-7-conn-log-5-99d5bc7e711f) to read the article on Medium. ## Zeek Network Security Monitor Course (Lesson 8: conn.log - 6) In this lesson we will show the source and destination IP addresses of all UDP and TCP connections that lasted more than 90 seconds. -> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-8-conn-log-6-c19c7374483c) to read the article on Medium. ## Zeek Network Security Monitor Course (Lesson 9: conn.log - 7) In this lesson we will show whether there any web servers operating on non-standardized ports. -> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-9-conn-log-7-eaea25b86ead) to read the article on Medium. ## Zeek Network Security Monitor Course (Lesson 10: conn.log - 8) In this lesson we will show the state history of connections as a string of letters. -> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-10-conn-log-8-1de2cf970b7a) to read the article on Medium.
## C++ Fundamentals Course ## C++ Fundamentals Course (Chapter 1 - Hello World) In this lesson we will discuss the basics of C++ output. -> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book. ## C++ Fundamentals Course (Chapter 2 - Variables, Constants, Arrays, Vectors, Statements, Operators, Strings) In this lesson we will discuss variables, constants, arrays, vectors, statements, operators and strings. -> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book. ## C++ Fundamentals Course (Chapter 3 - Program Flow) In this lesson we will discuss the basics of program flow. -> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book. ## C++ Fundamentals Course (Chapter 4 - Functions) In this lesson we will discuss functions. -> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book. ## C++ Fundamentals Course (Chapter 5 - Pointers) In this lesson we will discuss pointers. -> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book. ## C++ Fundamentals Course (Chapter 6 - Input) In this lesson we will discuss proper input validation. -> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book. ## C++ Fundamentals Course (Chapter 7 - Classes) In this lesson we will discuss class basics. -> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book.
## MicroPython Firmware Development Course ## MicroPython Firmware Development Course (Chapter 1 - Building Micropython) This chapter covers how to build a MicroPython development environment. -> Click [HERE](https://github.com/mytechnotalent/micropython-firmware-development/blob/main/MicroPython_Firmware_Development_5r1.pdf) to read the FREE pdf book. ## MicroPython Firmware Development Course (Chapter 2 - Basic I/O) This chapter covers how to handle basic input and output in MicroPython. -> Click [HERE](https://github.com/mytechnotalent/micropython-firmware-development/blob/main/MicroPython_Firmware_Development_5r1.pdf) to read the FREE pdf book. ## MicroPython Firmware Development Course (Chapter 3 - DataTypes & Numbers) This chapter covers how to handle datatypes and numbers t in MicroPython. -> Click [HERE](https://github.com/mytechnotalent/micropython-firmware-development/blob/main/MicroPython_Firmware_Development_5r1.pdf) to read the FREE pdf book. ## MicroPython Firmware Development Course (Chapter 4: Conditional Logic) This chapter covers conditional logic and application flow chart design in MicroPython. -> Click [HERE](https://github.com/mytechnotalent/micropython-firmware-development/blob/main/MicroPython_Firmware_Development_5r1.pdf) to read the FREE pdf book. ## MicroPython Firmware Development Course (Chapter 5: Lists, Tuples, Dictionaries & Loops) This chapter covers lists, tuples, dictionaries and loops in MicroPython. -> Click [HERE](https://github.com/mytechnotalent/micropython-firmware-development/blob/main/MicroPython_Firmware_Development_5r1.pdf) to read the FREE pdf book. ## BOOK IS UNDER DEVELOPMENT
## License [Apache License, Version 2.0](https://www.apache.org/licenses/LICENSE-2.0)