# Reverse-Engineering
**Repository Path**: software-reverse-engineering/Reverse-Engineering
## Basic Information
- **Project Name**: Reverse-Engineering
- **Description**: No description available
- **Primary Language**: Unknown
- **License**: Apache-2.0
- **Default Branch**: main
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 1
- **Forks**: 0
- **Created**: 2022-01-14
- **Last Updated**: 2022-04-07
## Categories & Tags
**Categories**: Uncategorized
**Tags**: 安全文档, 逆向文档
## README

# Reverse Engineering For Everyone!
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
## Join DC540 Discord [HERE](https://discord.gg/TC9V9RCr5U)

## DC540 Hacking Challenge 0x00001 [HERE](https://github.com/mytechnotalent/dc540-0x00001) ON GITHUB
## DC540 Hacking Challenge 0x00002 [MicroPython CTF] [HERE](https://github.com/mytechnotalent/dc540-0x00002) ON GITHUB
## DC540 Hacking Challenge 0x00003 [C CTF] [HERE](https://github.com/mytechnotalent/dc540-0x00003) ON GITHUB
## DC540 Hacking Challenge 0x00004 [C CTF] [HERE](https://github.com/mytechnotalent/dc540-0x00004) ON GITHUB
## DC540 Hacking Challenge 0x00005a [HERE](https://github.com/mytechnotalent/dc540-0x00005a) ON GITHUB
## DC540 Hacking Challenge 0x00005b [Assembler CTF] [HERE](https://github.com/mytechnotalent/dc540-0x00005b) ON GITHUB
## COURSE PROMOTIONAL VIDEO
### WATCH NOW [HERE](https://youtu.be/Yz0zFsp0qzE) ON YOUTUBE
## Reverse Engineering E-BOOK [HERE](https://0xinfection.github.io/reversing/)
## Reverse Engineering PDF [HERE](https://0xinfection.github.io/reversing/reversing-for-everyone.pdf)
Assembled by @0xInfection (Twitter)
## Hacking Windows E-BOOK [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf)
UNDER DEVELOPMENT
## STEM Reverse Engineering Demo [HERE](https://github.com/mytechnotalent/micro-bit-Reverse-Engineering)
## Fundamental C++ PDF [HERE](https://github.com/mytechnotalent/Fundamental-CPP/blob/main/Fundamental%20C%2B%2B.pdf)
## Fundamental Go PDF [HERE](https://github.com/mytechnotalent/Fundamental-Go/blob/main/Fundamental_Go_ALPHA.pdf)
COMING SOON
## Fundamental Python PDF [HERE](https://github.com/mytechnotalent/Fundamental-Python/blob/main/Fundamental_Python_ALPHA.pdf)
UNDER DEVELOPMENT
## Python For Kids PDF [HERE](https://github.com/mytechnotalent/Python-For-Kids/blob/main/Python_For_Kids_01r.pdf)
## ToyOS [HERE](https://github.com/mytechnotalent/ToyOS)
## AArch64 Bytes [HERE](https://github.com/mytechnotalent/AArch64-Bytes)
UNDER DEVELOPMENT
## Tor Everything PDF [HERE](https://github.com/mytechnotalent/TOR-Everything/blob/main/TOR%20Everything.pdf)
## Zeek Network Security Monitor [HERE](https://github.com/mytechnotalent/Zeek-Network-Security-Monitor)
## STM32F401CCUx_PA0ButtonHandler Driver (Assembly Language) [HERE](https://github.com/mytechnotalent/STM32F401CCUx_PA0ButtonHandler)
## x86 Course
## Lesson 1: x86 Course (Part 1: Goals)
This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 2: x86 Course (Part 2: Techniques)
This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-1/) to read the article on LinkedIn.
## Lesson 3: x86 Course (Part 3: Types Of Malware)
This tutorial will address the basic forms of malware and how they work in simple terms.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-2/) to read the article on LinkedIn.
## Lesson 4: x86 Course (Part 4: x86 Assembly Intro)
This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-3/) to read the article on LinkedIn.
## Lesson 5: x86 Course (Part 5: Binary Number System)
This tutorial will address the very basics of the binary number system.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-4/) to read the article on LinkedIn.
## Lesson 6: x86 Course (Part 6: Hexadecimal Number System)
This tutorial will address the very basics of the hexadecimal number system.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-5/) to read the article on LinkedIn.
## Lesson 7: x86 Course (Part 7: Transistors And Memory)
This tutorial will address the basics of transistors and memory.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6/) to read the article on LinkedIn.
## Lesson 8: x86 Course (Part 8 - Bytes, Words, Double Words, etc...)
This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-7/) to read the article on LinkedIn.
## Lesson 9: x86 Course (Part 9: x86 Basic Architecture)
This tutorial will address the basic architecture of an x86 processor.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-8/) to read the article on LinkedIn.
## Lesson 10: x86 Course (Part 10: General-purpose Registers)
This tutorial will address the general purpose x86 registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-9/) to read the article on LinkedIn.
## Lesson 11: x86 Course (Part 11: Segment Registers)
This tutorial will address the x86 segment registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-10/) to read the article on LinkedIn.
## Lesson 12: x86 Course (Part 12: Instruction Pointer Register)
This tutorial will address the x86 instruction pointer register.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-11/) to read the article on LinkedIn.
## Lesson 13: x86 Course (Part 13: Control Registers)
This tutorial will address the x86 control registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-12/) to read the article on LinkedIn.
## Lesson 14: x86 Course (Part 14: Flags)
This tutorial will address the status, control and systems flags.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-13/) to read the article on LinkedIn.
## Lesson 15: x86 Course (Part 15: Stack)
This tutorial will address the stack.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-14/) to read the article on LinkedIn.
## Lesson 16: x86 Course (Part 16: Heap)
This tutorial will address the heap.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-15/) to read the article on LinkedIn.
## Lesson 17: x86 Course (Part 17 – How To Install Linux)
This tutorial will address how to install Ubuntu Linux on both Windows and MAC.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-16/) to read the article on LinkedIn.
## Lesson 18: x86 Course (Part 18 - vim Text Editor)
This tutorial will address how to install the vim text editor.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-17/) to read the article on LinkedIn.
## Lesson 19: x86 Course (Part 19 - Why Learn Assembly)
This tutorial will address the age old question of why to bother understanding the basics of Assembly Language.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-18/) to read the article on LinkedIn.
## Lesson 20: x86 Course (Part 20 - Instruction Code Handling)
This tutorial will address op codes and instruction code handling.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-19/) to read the article on LinkedIn.
## Lesson 21: x86 Course (Part 21 - How To Compile A Program)
This tutorial will address how to compile a basic x86 Assembly Program.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6174148486322233344/) to read the article on LinkedIn.
## Lesson 22: x86 Course (Part 22 - ASM Program 1 [Moving Immediate Data])
This tutorial will address how to create our first real Assembly Program by moving immediate data.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6176700362704056320/) to read the article on LinkedIn.
## Lesson 23: x86 Course (Part 23 - ASM Debugging 1 [Moving Immediate Data])
This tutorial will address how to debug our first real Assembly Program by moving immediate data.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6179235028048834560/) to read the article on LinkedIn.
## Lesson 24: x86 Course (Part 24 - ASM Hacking 1 [Moving Immediate Data])
This tutorial will address how to hack our first real Assembly Program by moving immediate data.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6181749648739282944/) to read the article on LinkedIn.
## Lesson 25: x86 Course (Part 25 - ASM Program 2 [Moving Data Between Registers])
This tutorial will address how to create our second real Assembly Program by moving between registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6184290421015871488/) to read the article on LinkedIn.
## Lesson 26: x86 Course (Part 26 - ASM Debugging 2 [Moving Data Between Registers])
This tutorial will address how to debug our second real Assembly Program by moving between registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6186852494581198848/) to read the article on LinkedIn.
## Lesson 27: x86 Course (Part 27 - ASM Hacking 2 [Moving Data Between Registers])
This tutorial will address how to hack our second real Assembly Program by moving between registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6189381915728973824/) to read the article on LinkedIn.
## Lesson 28: x86 Course (Part 28 - ASM Program 3 [Moving Data Between Memory And Registers])
This tutorial will address how to create our third real Assembly Program by moving between memory and registers
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6191923581476184064/) to read the article on LinkedIn.
## Lesson 29: x86 Course (Part 29 - ASM Debugging 3 [Moving Data Between Memory And Registers])
This tutorial will address how to debug our third real Assembly Program by moving between memory and registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6194452403807363072/) to read the article on LinkedIn.
## Lesson 30: x86 Course (Part 30 - ASM Hacking 3 [Moving Data Between Memory And Registers])
This tutorial will address how to hack our third real Assembly Program by moving between memory and registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6196977244754186240/) to read the article on LinkedIn.
## Lesson 31: x86 Course (Part 31 - ASM Program 4 [Moving Data Between Registers And Memory])
This tutorial will address how to create our fourth real Assembly Program by moving between registers and memory.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6199521459321217024/) to read the article on LinkedIn.
## Lesson 32: x86 Course (Part 32 - ASM Debugging 4 [Moving Data Between Registers And Memory])
This tutorial will address how to debug our fourth real Assembly Program by moving between registers and memory.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6202084078657769472/) to read the article on LinkedIn.
## Lesson 33: x86 Course (Part 33 - ASM Hacking 4 [Moving Data Between Registers And Memory])
This tutorial will address how to hack our fourth real Assembly Program by moving between registers and memory.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6204613196200845313/) to read the article on LinkedIn.
## Lesson 34: x86 Course (Part 34 - ASM Program 5 [Indirect Addressing With Registers])
This tutorial will address how to create our fifth real Assembly Program by indirect addressing with registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6207141090722619392/) to read the article on LinkedIn.
## Lesson 35: x86 Course (Part 35 - ASM Debugging 5 [Indirect Addressing With Registers])
This tutorial will address how to debug our fifth real Assembly Program by indirect addressing with registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6209671278844997632/) to read the article on LinkedIn.
## Lesson 36: x86 Course (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers])
This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6212225805402009600/) to read the article on LinkedIn.
## Lesson 37: x86 Course (Part 37 - ASM Program 6 [CMOV Instructions])
This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6214770773354123264/) to read the article on LinkedIn.
## Lesson 38: x86 Course (Part 38 - ASM Debugging 6 [CMOV Instructions])
This tutorial will address how to debug our sixth real Assembly Program with CMOV instructions.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6216651661075582976/) to read the article on LinkedIn.
## Lesson 39: x86 Course (Part 39 - ASM Hacking 6 [CMOV Instructions])
This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6219938772826492928/) to read the article on LinkedIn.
## Lesson 40: x86 Course (Part 40 - Conclusion)
This tutorial will conclude this x86 tutorial.
-> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6222371031936434176/) to read the article on LinkedIn.
## ARM-32 Course 1
## Lesson 41: ARM-32 Course 1 (Part 1 – The Meaning Of Life)
This tutorial will introduce our ARM-32 Course 1 tutorial series.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-1-meaning-life-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 42: ARM-32 Course 1 (Part 2 - Number Systems)
This tutorial will discuss number systems such as binary, decimal and hexadecimal in detail.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-2-number-systems-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 43: ARM-32 Course 1 (Part 3 - Binary Addition)
This tutorial will discuss binary addition.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-3-binary-addition-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 44: ARM-32 Course 1 (Part 4 - Binary Subtraction)
This tutorial will discuss binary subtraction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-4-binary-subtraction-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 45: ARM-32 Course 1 (Part 5 - Word Lengths)
This tutorial will discuss word lengths.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-5-word-lengths-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 46: ARM-32 Course 1 (Part 6 - Registers)
This tutorial will discuss registers.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-6-registers-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 47: ARM-32 Course 1 (Part 7 - Program Counter)
This tutorial will discuss the program counter.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-7-program-counter-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 48: ARM-32 Course 1 (Part 8 - CPSR)
This tutorial will discuss the CPSR.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-8-cpsr-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 49: ARM-32 Course 1 (Part 9 - Link Register)
This tutorial will discuss the Link Register.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-9-link-register-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 50: ARM-32 Course 1 (Part 10 - Stack Pointer)
This tutorial will discuss the Stack Pointer.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-10-stack-pointer-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 51: ARM-32 Course 1 (Part 11 - ARM Firmware Boot Procedures)
This tutorial will discuss ARM Firmware Boot Procedures.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-11-firmware-boot-procedures-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 52: ARM-32 Course 1 (Part 12 - Von Neumann Architecture)
This tutorial will discuss Von Neumann Architecture.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-12-von-neumann-architecture-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 53: ARM-32 Course 1 (Part 13 - Instruction Pipeline)
This tutorial will discuss the instruction pipeline.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-13-instruction-pipeline-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 54: ARM-32 Course 1 (Part 14 - ADD)
This tutorial will discuss the add instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-14-add-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 55: ARM-32 Course 1 (Part 15 - Debugging ADD)
This tutorial will discuss debugging the add instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-15-debugging-add-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 56: ARM-32 Course 1 (Part 16 - Hacking ADD)
This tutorial will discuss hacking the add instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-16-hacking-add-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 57: ARM-32 Course 1 (Part 17 - ADDS)
This tutorial will discuss the adds instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-17-adds-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 58: ARM-32 Course 1 (Part 18 – Debugging ADDS)
This tutorial will discuss debugging the adds instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-18-debugging-adds-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 59: ARM-32 Course 1 (Part 19 – Hacking ADDS)
This tutorial will discuss hacking the adds instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-19-hacking-adds-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 60: ARM-32 Course 1 (Part 20 – ADC)
This tutorial will discuss the ADC instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-20-adc-kevin-m-thomas) to read the article on LinkedIn.
## Lesson 61: ARM-32 Course 1 (Part 21 – Debugging ADC)
This tutorial will discuss debugging the ADC instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-21-adc-debugging-kevin-m-thomas) to read the article on LinkedIn.
## Lesson 62: ARM-32 Course 1 (Part 22 – Hacking ADC)
This tutorial will discuss hacking the ADC instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-22-adc-hacking-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 63: ARM-32 Course 1 (Part 23 – SUB)
This tutorial will discuss the SUB instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-23-sub-kevin-m-thomas) to read the article on LinkedIn.
## Lesson 64: ARM-32 Course 1 (Part 24 – Debugging SUB)
This tutorial will discuss debugging the SUB instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-24-debugging-sub-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 65: ARM-32 Course 1 (Part 25 – Hacking SUB)
This tutorial will discuss hacking the SUB instruction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-25-hacking-sub-kevin-m-thomas/) to read the article on LinkedIn.
## ARM-32 Course 2
## Lesson 66: ARM-32 Course 2 (Part 1 – The Meaning Of Life Part 2)
This tutorial will introduce our ARM-32 Course 2 course.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-1-meaning-life-2-kevin-m-thomas) to read the article on LinkedIn.
## Lesson 67: ARM-32 Course 2 (Part 2 – Number Systems)
This tutorial will discuss number systems.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-2-number-systems-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 68: ARM-32 Course 2 (Part 3 – Binary Addition)
This tutorial will discuss binary addition.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-3-binary-addition-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 69: ARM-32 Course 2 (Part 4 – Binary Subtraction)
This tutorial will discuss binary subtraction.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-4-binary-subtraction-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 70: ARM-32 Course 2 (Part 5 – Word Lengths)
This tutorial will discuss word lengths.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-5-word-lengths-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 71: ARM-32 Course 2 (Part 6 – Registers)
This tutorial will discuss registers.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-6-registers-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 72: ARM-32 Course 2 (Part 7 – Program Counter)
This tutorial will discuss program counter.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-7-program-counter-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 73: ARM-32 Course 2 (Part 8 - CPSR)
This tutorial will discuss the CPSR.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-8-cpsr-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 74: ARM-32 Course 2 (Part 9 - Link Register)
This tutorial will discuss the link register.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-9-link-register-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 75: ARM-32 Course 2 (Part 10 - Stack Pointer)
This tutorial will discuss the stack pointer.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-10-stack-pointer-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 76: ARM-32 Course 2 (Part 11 - Firmware Boot Procedures)
This tutorial will discuss the firmware boot procedures.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-11-firmware-boot-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 77: ARM-32 Course 2 (Part 12 - Von Neumann Architecture)
This tutorial will discuss the Von Neumann Architecture.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-12-von-neumann-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 78: ARM-32 Course 2 (Part 13 - Instruction Pipeline)
This tutorial will discuss the instruction pipeline.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-13-instruction-pipeline-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 79: ARM-32 Course 2 (Part 14 - Hello World)
This tutorial will discuss the basics of a hello world program in ARM 32-bit.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-14-hello-world-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 80: ARM-32 Course 2 (Part 15 - Debugging Hello World)
This tutorial will discuss debugging hello world.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-15-debugging-hello-world-thomas/) to read the article on LinkedIn.
## Lesson 81: ARM-32 Course 2 (Part 16 - Hacking Hello World)
This tutorial will discuss hacking hello world.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-16-hacking-hello-world-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 82: ARM-32 Course 2 (Part 17 - Constants)
This tutorial will discuss constants.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-17-constants-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 83: ARM-32 Course 2 (Part 18 – Debugging Constants)
This tutorial will discuss debugging constants.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-18-debugging-constants-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 84: ARM-32 Course 2 (Part 19 – Hacking Constants)
This tutorial will discuss hacking constants.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-19-hacking-constants-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 85: ARM-32 Course 2 (Part 20 – Character Variables)
This tutorial will discuss character variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-20-character-variables-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 86: ARM-32 Course 2 (Part 21 – Debugging Character Variables)
This tutorial will discuss debugging character variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-21-debugging-character-variables-thomas/) to read the article on LinkedIn.
## Lesson 87: ARM-32 Course 2 (Part 22 – Hacking Character Variables)
This tutorial will discuss hacking character variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-22-hacking-character-variables-thomas/) to read the article on LinkedIn.
## Lesson 88: ARM-32 Course 2 (Part 23 – Boolean Variables)
This tutorial will discuss boolean variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-23-boolean-variables-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 89: ARM-32 Course 2 (Part 24 – Debugging Boolean Variables)
This tutorial will discuss debugging boolean variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-24-debugging-boolean-variables-thomas/) to read the article on LinkedIn.
## Lesson 90: ARM-32 Course 2 (Part 25 – Hacking Boolean Variables)
This tutorial will discuss hacking boolean variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-25-hacking-boolean-variables-thomas/) to read the article on LinkedIn.
## Lesson 91: ARM-32 Course 2 (Part 26 – Integer Variables)
This tutorial will discuss integer variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-26-integer-variables-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 92: ARM-32 Course 2 (Part 27 – Debugging Integer Variables)
This tutorial will discuss debugging integer variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-27-debugging-integer-variables-thomas/) to read the article on LinkedIn.
## Lesson 93: ARM-32 Course 2 (Part 28 – Hacking Integer Variables)
This tutorial will discuss hacking integer variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-28-hacking-integer-variables-thomas/) to read the article on LinkedIn.
## Lesson 94: ARM-32 Course 2 (Part 29 – Float Variables)
This tutorial will discuss float variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-29-float-variables-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 95: ARM-32 Course 2 (Part 30 – Debugging Float Variables)
This tutorial will discuss debugging float variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-30-debugging-float-variables-thomas/) to read the article on LinkedIn.
## Lesson 96: ARM-32 Course 2 (Part 31 – Hacking Float Variables)
This tutorial will discuss hacking float variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-30-debugging-float-variables-thomas-1/) to read the article on LinkedIn.
## Lesson 97: ARM-32 Course 2 (Part 32 – Double Variables)
This tutorial will discuss double variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-32-double-variables-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 98: ARM-32 Course 2 (Part 33 – Debugging Double Variables)
This tutorial will discuss debugging double variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-33-debugging-double-variables-thomas/) to read the article on LinkedIn.
## Lesson 99: ARM-32 Course 2 (Part 34 – Hacking Double Variables)
This tutorial will discuss hacking double variables.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-34-hacking-double-variables-thomas/) to read the article on LinkedIn.
## Lesson 100: ARM-32 Course 2 (Part 35 – SizeOf Operator)
This tutorial will discuss the sizeof operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-35-sizeof-operator-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 101: ARM-32 Course 2 (Part 36 – Debugging SizeOf Operator)
This tutorial will discuss debugging sizeof operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-36-debugging-sizeof-operator-thomas/) to read the article on LinkedIn.
## Lesson 102: ARM-32 Course 2 (Part 37 – Hacking SizeOf Operator)
This tutorial will discuss hacking sizeof operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-37-hacking-sizeof-operator-thomas/) to read the article on LinkedIn.
## Lesson 103: ARM-32 Course 2 (Part 38 – Pre-Increment Operator)
This tutorial will discuss the pre-increment operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-38-pre-increment-operator-thomas/) to read the article on LinkedIn.
## Lesson 104: ARM-32 Course 2 (Part 39 – Debugging Pre-Increment Operator)
This tutorial will discuss debugging pre-increment operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-39-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 105: ARM-32 Course 2 (Part 40 – Hacking Pre-Increment Operator)
This tutorial will discuss hacking pre-increment operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-40-hacking-pre-increment-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 106: ARM-32 Course 2 (Part 41 – Post-Increment Operator)
This tutorial will discuss the post-increment operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-41-post-increment-operator-thomas/) to read the article on LinkedIn.
## Lesson 107: ARM-32 Course 2 (Part 42 – Debugging Post-Increment Operator)
This tutorial will discuss debugging post-increment operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-42-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 108: ARM-32 Course 2 (Part 43 – Hacking Post-Increment Operator)
This tutorial will discuss hacking post-increment operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-43-hacking-operator-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 109: ARM-32 Course 2 (Part 44 – Pre-Decrement Operator)
This tutorial will discuss the pre-decrement operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-44-pre-decrement-operator-thomas/) to read the article on LinkedIn.
## Lesson 110: ARM-32 Course 2 (Part 45 – Debugging Pre-Decrement Operator)
This tutorial will discuss debugging pre-decrement operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-45-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 111: ARM-32 Course 2 (Part 46 – Hacking Pre-Decrement Operator)
This tutorial will discuss hacking pre-decrement operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-46-hacking-pre-decrement-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 112: ARM-32 Course 2 (Part 47 – Post-Decrement Operator)
This tutorial will discuss post-decrement operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-47-post-decrement-operator-thomas/) to read the article on LinkedIn.
## Lesson 113: ARM-32 Course 2 (Part 48 – Debugging Post-Decrement Operator)
This tutorial will discuss debugging post-decrement operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-48-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 114: ARM-32 Course 2 (Part 49 – Hacking Post-Decrement Operator)
This tutorial will discuss hacking post-decrement operator.
-> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-49-hacking-operator-kevin-m-thomas/) to read the article on LinkedIn.
## ARM-32 Project Course
## Lesson 115: ARM-32 Project (Part 1 – Hacking Hello World)
ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.
-> Click [HERE](https://github.com/mytechnotalent/0x01-ARM-32-Hacking-Hello-World/) to read the project on GitHub.
## Lesson 116: ARM-32 Project (Part 2 – Hacking Int)
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
-> Click [HERE](https://github.com/mytechnotalent/0x02-ARM-32-Hacking-Int/) to read the project on GitHub.
## Lesson 117: ARM-32 Project (Part 3 – Hacking Float)
ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux.
-> Click [HERE](https://github.com/mytechnotalent/0x03-ARM-32-Hacking-Float/) to read the project on GitHub.
## Lesson 118: ARM-32 Project (Part 4 – Hacking Double)
ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.
-> Click [HERE](https://github.com/mytechnotalent/0x04-ARM-32-Hacking-Double/) to read the project on GitHub.
## Lesson 119: ARM-32 Project (Part 5 – Hacking Char)
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux.
-> Click [HERE](https://github.com/mytechnotalent/0x05-ARM-32-Hacking_Char/) to read the project on GitHub.
## Lesson 120: ARM-32 Project (Part 6 – Hacking Char Pointer)
ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux.
-> Click [HERE](https://github.com/mytechnotalent/0x06-ARM-32-Hacking-Char-Pointer/) to read the project on GitHub.
## x64 Course
## Lesson 121: x64 Course (Part 1 – The Cyber Revolution)
This tutorial will discuss the cyber revolution.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-1-cyber-revolution-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 122: x64 Course (Part 2 - Transistors)
This tutorial will discuss transistors.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-2-transistors-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 123: x64 Course (Part 3 - Logic Gates)
This tutorial will discuss logic gates.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-3-logic-gates-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 124: x64 Course (Part 4 - Number Systems)
This tutorial will discuss number systems.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-4-number-systems-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 125: x64 Course (Part 5 - Binary Addition)
This tutorial will discuss binary addition.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-5-binary-addition-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 126: x64 Course (Part 6 - Binary Subtraction)
This tutorial will discuss binary subtraction.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-6-binary-subtraction-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 127: x64 Course (Part 7 - Word Lengths)
This tutorial will discuss word lengths.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-7-word-lengths-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 128: x64 Course (Part 8 - General Architecture)
This tutorial will discuss the general architecture.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-8-general-architecture-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 129: x64 Course (Part 9 - Calling Conventions)
This tutorial will discuss calling conventions.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-9-calling-conventions-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 130: x64 Course (Part 10 - Boolean Instructions)
This tutorial will discuss boolean instructions.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-10-boolean-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 131: x64 Course (Part 11 - Pointers)
This tutorial will discuss pointers.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-11-pointers-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 132: x64 Course (Part 12 - Load Effective Address)
This tutorial will discuss load effective address.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-12-load-effective-address-thomas/) to read the article on LinkedIn.
## Lesson 133: x64 Course (Part 13 - The Data Segment)
This tutorial will discuss the data segment.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-13-data-segment-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 134: x64 Course (Part 14 - SHL Instruction)
This tutorial will discuss the shl instruction.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-14-shl-instruction-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 135: x64 Course (Part 15 - SHR Instruction)
This tutorial will discuss the shr instruction.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-15-shr-instruction-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 136: x64 Course (Part 16 - ROL Instruction)
This tutorial will discuss rol instruction.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-16-rol-instruction-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 137: x64 Course (Part 17 - ROR Instruction)
This tutorial will discuss the ror instruction.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-17-ror-instruction-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 138: x64 Course (Part 18 - Boot Sector Basics [Part 1])
This tutorial will discuss boot sector basics.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-18-boot-sector-basics-1-thomas/) to read the article on LinkedIn.
## Lesson 139: x64 Course (Part 19 - Boot Sector Basics [Part 2])
This tutorial will discuss more boot sector basics.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-18-boot-sector-basics-2-thomas/) to read the article on LinkedIn.
## Lesson 140: x64 Course (Part 20 - Boot Sector Basics [Part 3])
This tutorial will discuss more boot sector basics.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-20-boot-sector-basics-3-thomas/) to read the article on LinkedIn.
## Lesson 141: x64 Course (Part 21 - Boot Sector Basics [Part 4])
This tutorial will discuss more boot sector basics.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-21-boot-sector-basics-4-thomas/) to read the article on LinkedIn.
## Lesson 142: x64 Course (Part 22 - Boot Sector Basics [Part 5])
This tutorial will discuss more boot sector basics.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-22-boot-sector-basics-5-thomas/) to read the article on LinkedIn.
## Lesson 143: x64 Course (Part 23 - Boot Sector Basics [Part 6])
This tutorial will discuss more boot sector basics.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-23-boot-sector-basics-6-thomas/) to read the article on LinkedIn.
## Lesson 144: x64 Course (Part 24 - Boot Sector Basics [Part 7])
This tutorial will discuss more boot sector basics.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-24-boot-sector-basics-7-thomas/) to read the article on LinkedIn.
## Lesson 145: x64 Course (Part 25 - Boot Sector Basics [Part 8])
This tutorial will discuss more boot sector basics.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-25-boot-sector-basics-8-thomas/) to read the article on LinkedIn.
## Lesson 146: x64 Course (Part 26 - Boot Sector Basics [Part 9])
This tutorial will discuss more boot sector basics.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-26-boot-sector-basics-9-thomas/) to read the article on LinkedIn.
## Lesson 147: x64 Course (Part 27 - x64 Assembly [Part 1])
This tutorial will discuss x64 assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-27-assembly-1-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 148: x64 Course (Part 28 - x64 Assembly [Part 2])
This tutorial will discuss more x64 assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-28-assembly-2-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 149: x64 Course (Part 29 - x64 Assembly [Part 3])
This tutorial will discuss more x64 assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-29-assembly-3-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 150: x64 Course (Part 30 - x64 Assembly [Part 4])
This tutorial will discuss more x64 assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-30-assembly-4-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 151: x64 Course (Part 31 - x64 Assembly [Part 5])
This tutorial will discuss more x64 assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-31-assembly-5-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 152: x64 Course (Part 32 - x64 Assembly [Part 6])
This tutorial will discuss more x64 assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-32-assembly-6-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 153: x64 Course (Part 33 - x64 Assembly [Part 7])
This tutorial will discuss more x64 assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-33-assembly-7-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 154: x64 Course (Part 34 - x64 C++ 1 Code [Part 1])
This tutorial will discuss c++ code as it relates to 64-bit assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-34-c-1-code-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 155: x64 Course (Part 35 - x64 C++ 2 Debug [Part 2])
This tutorial will discuss more c++ code as it relates to 64-bit assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-35-c-1-debug-2-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 156: x64 Course (Part 36 - x64 C++ 3 Hacking [Part 3])
This tutorial will discuss more c++ code as it relates to 64-bit assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-36-c-1-hacking-3-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 157: x64 Course (Part 37 - x64 C & Genesis Of Life)
This tutorial will discuss c and how it relates to x64 assembly.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-37-c-genesis-life-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 158: x64 Course (Part 38 - x64 Networking Basics)
This tutorial will discuss x64 networking basics.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-38-networking-basics-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 159: x64 Course (Part 39 - Why C?)
This tutorial will discuss the power of the c language.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-39-why-c-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 160: x64 Course (Part 40 - Hacking Hello World!)
This tutorial will discuss hacking hello world.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-40-hacking-hello-world-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 161: x64 Course (Part 41 - Hacking Variables!)
This tutorial will discuss hacking variables.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-41-hacking-variables-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 162: x64 Course (Part 42 - Hacking Branches!)
This tutorial will discuss hacking branches.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-42-hacking-branches-kevin-m-thomas/) to read the article on LinkedIn.
## Lesson 163: x64 Course (Part 43 - Hacking Pointers!)
This tutorial will discuss hacking pointers.
-> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-43-hacking-pointers-kevin-m-thomas/) to read the article on LinkedIn.
## ARM-64 Course
## Lesson 164: ARM-64 Course (Part 1 - The Meaning Of Life)
In this lesson we will discuss the course concepts and the meaning of life.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-1-hacking-c-arm-64-part-meaning-life-kevin-thomas/) to read the article on LinkedIn.
## Lesson 165: ARM-64 Course (Part 2 - Development Setup)
In this lesson we will discuss how to set up our development in 64-bit ARM with Kali Linux.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-2-hacking-c-arm-64-part-development-setup-kevin-thomas/) to read the article on LinkedIn.
## Lesson 166: ARM-64 Course (Part 3 - "Hello World")
In this lesson we will discuss how to write and compile a simple hello world program in C++.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-2-hacking-c-arm-64-part-hello-world-kevin-thomas/) to read the article on LinkedIn.
## Lesson 167: ARM-64 Course (Part 4 - Debugging "Hello World")
In this lesson we will debug our simple hello world program.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-4-hacking-c-arm-64-part-debugging-hello-world-kevin-thomas/) to read the article on LinkedIn.
## Lesson 168: ARM-64 Course (Part 5 - Hacking "Hello World")
In this lesson we will hack our simple hello world program.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-5-hacking-c-arm-64-part-hello-world-kevin-thomas/) to read the article on LinkedIn.
## Lesson 169: ARM-64 Course (Part 6 - Basic I/O)
In this lesson we will discuss how to write and compile a simple basicio program in C++ and discuss basic input validation.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-6-hacking-c-arm-64-part-basic-io-kevin-thomas/) to read the article on LinkedIn.
## Lesson 170: ARM-64 Course (Part 7 - Debugging Basic I/O)
In this lesson we will discuss how to debug a simple basicio program in C++ and discuss basic input validation.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-7-hacking-c-arm-64-part-debugging-basic-io-kevin-thomas/) to read the article on LinkedIn.
## Lesson 171: ARM-64 Course (Part 8 - Hacking Basic I/O)
In this lesson we will discuss how to hack a simple basicio program in C++ and discuss basic input validation.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-8-hacking-c-arm-64-part-basic-io-kevin-thomas/) to read the article on LinkedIn.
## Lesson 172: ARM-64 Course (Part 9 - Character Primitive Datatype)
In this lesson we will discuss the char primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-9-hacking-c-arm-64-part-character-primitive-datatype-thomas/) to read the article on LinkedIn.
## Lesson 173: ARM-64 Course (Part 10 - Debugging Character Primitive Datatype)
In this lesson we will discuss debugging the char primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-10-hacking-c-arm-64-part-debugging-character-kevin-thomas/) to read the article on LinkedIn.
## Lesson 174: ARM-64 Course (Part 11 - Hacking Character Primitive Datatype)
In this lesson we will discuss hacking the char primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/lesson-11-hacking-c-arm-64-part-character-primitive-kevin-thomas/) to read the article on LinkedIn.
## Lesson 175: ARM-64 Course (Part 12 - Boolean Primitive Datatype)
In this lesson we will discuss the boolean primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-12-boolean-primitive-datatype-kevin-thomas/) to read the article on LinkedIn.
## Lesson 176: ARM-64 Course (Part 13 - Debugging Boolean Primitive Datatype)
In this lesson we will discuss debugging the boolean primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-13-debugging-boolean-primitive-kevin-thomas/) to read the article on LinkedIn.
## Lesson 177: ARM-64 Course (Part 14 - Hacking Boolean Primitive Datatype)
In this lesson we will discuss hacking the boolean primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-14-boolean-primitive-datatype-kevin-thomas/) to read the article on LinkedIn.
## Lesson 178: ARM-64 Course (Part 15 - Float Primitive Datatype)
In this lesson we will discuss the float primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-15-float-primitive-datatype-kevin-thomas/) to read the article on LinkedIn.
## Lesson 179: ARM-64 Course (Part 16 - Debugging Float Primitive Datatype)
In this lesson we will discuss debugging the float primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-16-debugging-float-primitive-datatype-thomas/) to read the article on LinkedIn.
## Lesson 180: ARM-64 Course (Part 17 - Hacking Float Primitive Datatype)
In this lesson we will discuss hacking the float primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-17-float-primitive-datatype-kevin-thomas/) to read the article on LinkedIn.
## Lesson 181: ARM-64 Course (Part 18 - Double Primitive Datatype)
In this lesson we will discuss the double primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-18-double-primitive-datatype-kevin-thomas/) to read the article on LinkedIn.
## Lesson 182: ARM-64 Course (Part 19 - Debugging Double Primitive Datatype)
In this lesson we will discuss debugging the double primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-19-debugging-double-primitive-kevin-thomas/) to read the article on LinkedIn.
## Lesson 183: ARM-64 Course (Part 20 - Hacking Double Primitive Datatype)
In this lesson we will discuss hacking the double primitive datatype.
-> Click [HERE](https://www.linkedin.com/pulse/hacking-c-arm-64-part-20-double-primitive-datatype-kevin-thomas/) to read the article on LinkedIn.
## Pico Hacking Course
## Lesson 184: Pico Hacking Course (Part 1 - The Why, The How...)
In this lesson we will discuss the basic setup of the development environment for the Raspberry Pi Pico.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-1-why-how-kevin-thomas/) to read the article on LinkedIn.
## Lesson 185: Pico Hacking Course (Part 2 - Hello World)
In this lesson we will discuss the basic Hello World program.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-2-hello-world-kevin-thomas/) to read the article on LinkedIn.
## Lesson 186: Pico Hacking Course (Part 3 - Debugging Hello World)
In this lesson we will discuss debugging the basic Hello World program.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-3-debugging-hello-world-kevin-thomas/) to read the article on LinkedIn.
## Lesson 187: Pico Hacking Course (Part 4 - Hacking Hello World)
In this lesson we will discuss hacking the basic Hello World program.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-4-hello-world-kevin-thomas) to read the article on LinkedIn.
## Lesson 188: Pico Hacking Course (Part 5 - char)
In this lesson we will discuss the char data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-4-char-kevin-thomas/) to read the article on LinkedIn.
## Lesson 189: Pico Hacking Course (Part 6 - Debugging char)
In this lesson we will discuss debugging the char data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-6-debugging-char-kevin-thomas/) to read the article on LinkedIn.
## Lesson 190: Pico Hacking Course (Part 7 - Hacking char)
In this lesson we will discuss hacking the char data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-7-char-kevin-thomas/) to read the article on LinkedIn.
## Lesson 191: Pico Hacking Course (Part 8 - int)
In this lesson we will discuss the int data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-8-int-kevin-thomas/) to read the article on LinkedIn.
## Lesson 192: Pico Hacking Course (Part 9 - Debugging int)
In this lesson we will discuss debugging the int data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-9-debugging-int-kevin-thomas/) to read the article on LinkedIn.
## Lesson 193: Pico Hacking Course (Part 10 - Hacking int)
In this lesson we will discuss hacking the int data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-10-int-kevin-thomas/) to read the article on LinkedIn.
## Lesson 194: Pico Hacking Course (Part 11 - float)
In this lesson we will discuss the float data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-11-float-kevin-thomas/) to read the article on LinkedIn.
## Lesson 195: Pico Hacking Course (Part 12 - Debugging float)
In this lesson we will discuss debugging the float data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-12-debugging-float-kevin-thomas/) to read the article on LinkedIn.
## Lesson 196: Pico Hacking Course (Part 13 - Hacking float)
In this lesson we will discuss hacking the float data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-13-float-kevin-thomas/) to read the article on LinkedIn.
## Lesson 197: Pico Hacking Course (Part 14 - double)
In this lesson we will discuss the double data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-14-double-kevin-thomas/) to read the article on LinkedIn.
## Lesson 198: Pico Hacking Course (Part 15 - Debugging double)
In this lesson we will discuss debugging the double data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-15-debugging-double-kevin-thomas/) to read the article on LinkedIn.
## Lesson 199: Pico Hacking Course (Part 16 - Hacking double)
In this lesson we will discuss hacking the double data type.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-16-double-kevin-thomas/) to read the article on LinkedIn.
## Lesson 200: Pico Hacking Course (Part 17 - "ABSOLUTE POWER CORRUPTS ABSOLUTELY!", The Tragic Tale Of Input...)
In this lesson we will discuss the concept of proper input handling.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-17-absolute-power-corrupts-tragic-kevin-thomas/) to read the article on LinkedIn.
## Lesson 201: Pico Hacking Course (Part 18 - "FOR 800 YEARS HAVE I TRAINED JEDI!", The FORCE That IS Input...)
In this lesson we will discuss the importance of proper input handling in addition to breaking down our custom input function.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-18-800-years-have-i-trained-jedi-force-thomas/) to read the article on LinkedIn.
## Lesson 202: Pico Hacking Course (Part 19 - Input)
In this lesson we will discuss creating an effective input architecture.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-19-input-kevin-thomas/) to read the article on LinkedIn.
## Lesson 203: Pico Hacking Course (Part 20 - Debugging Input)
In this lesson we will discuss debugging input.
-> Click [HERE](https://www.linkedin.com/pulse/pico-hacking-part-20-debugging-input-kevin-thomas/) to read the article on LinkedIn.
## AArch64 Bytes Articles
## AArch64 Bytes Articles (Part 1: Reversing Exit)
In this bite we learn about what happens at the very core of a 32-bit AArch64 instruction by reversing the exit Linux syscall.
-> Click [HERE](https://medium.com/@mytechnotalent/aarch-64-bytes-part-1-reversing-exit-f7e4775d5e14) to read the article on Medium.
## AArch64 Bytes Articles (Part 2: 64-bit Immediate Values)
In this bite we learn about how to handle moving a 64-bit immediate value into a 64-bit register.
-> Click [HERE](https://medium.com/@mytechnotalent/aarch-64-bytes-part-2-64-bit-immediate-values-d9daa5256d76) to read the article on Medium.
## AArch64 Bytes Articles (Part 3: Yet Another Upper)
In this bite we learn how to create a simple parsing algorithm to convert a string's lowercase chars to uppercase, timeless Assembler example.
-> Click [HERE](https://medium.com/@mytechnotalent/aarch-64-bytes-part-e-yet-another-upper-6dcb56bb7e91) to read the article on Medium.
## ARTICLES ARE UNDER DEVELOPMENT
## Hacking Windows Course
## Hacking Windows Course (Chapter 1 - Hello World)
This chapter covers the basics of designing a very simple Windows Assembly Language message box program in pure Assembly for both x86 and x64 architectures.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 2: Debugging Hello World x86)
This chapter covers the dynamic reverse engineering analysis, debugging, of the Hello World app in x86 Assembly.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 3: Hacking Hello World x86)
This chapter covers the dynamic reverse engineering analysis, hacking, of the Hello World app in x86 Assembly.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 4: Debugging Hello World x64)
This chapter covers the dynamic reverse engineering analysis, debugging, of the Hello World app in x64 Assembly.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 5: Hacking Hello World x64)
This chapter covers the dynamic reverse engineering analysis, hacking, of the Hello World app in x64 Assembly.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 6: Directories)
This chapter covers reviewing the Windows API CreateDirectoryW and RemoveDirectoryW functions in C.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 7: Debugging Directories x86)
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x86 Assembly.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 8: Hacking Directories x86)
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x86 Assembly.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 9: Debugging Directories x64)
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x64 Assembly.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 10: Hacking Directories x64)
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x64 Assembly.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 11: CopyFile)
This chapter covers reviewing the Windows API CopyFileW function in C.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 12: Debugging CopyFile x86)
This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CopyFileW function in x86 Assembly.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## Hacking Windows Course (Chapter 13: Hacking CopyFile x86)
This chapter covers dynamic reverse engineering analysis, hacking, the Windows API CopyFileW function in x86 Assembly.
-> Click [HERE](https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking_Windows_ALPHA.pdf) to read the FREE pdf book.
## BOOK IS UNDER DEVELOPMENT
## Zeek Network Security Monitor Course
## Zeek Network Security Monitor Course (Lesson 1: Setup)
In this lesson we set up a basic Ubuntu computer connected directly to an inexpensive tap which connects to your home router. I have provided products you can purchase if you do not have existing parts however please feel free to use any network tap of your choosing and/or any additional Ethernet adapters or cables of your choosing.
-> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-1-setup-f0ac2fb8eba8) to read the article on Medium.
## Zeek Network Security Monitor Course (Lesson 2: alert-all-notices.zeek)
In this lesson we create an alert by logging all notices that Zeek deems worthy of your attention to the notice.log file in addition to sending you an email.
-> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-2-alert-all-notices-zeek-5591357f6f21) to read the article on Medium.
## Zeek Network Security Monitor Course (Lesson 3: conn.log)
In this lesson we will show the source IP addresses and ports and their destination IP addresses and ports.
-> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-3-conn-log-c104ad5570bd) to read the article on Medium.
## Zeek Network Security Monitor Course (Lesson 4: conn.log - 2)
In this lesson we will show the source IP addresses that generated the most network traffic, organized in descending order.
-> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-4-conn-log-2-723b4d344504) to read the article on Medium.
## Zeek Network Security Monitor Course (Lesson 5: conn.log - 3)
In this lesson we will show the destination ports that received the most network traffic, organized in descending order.
-> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-5-conn-log-3-5e6ff976a9b5) to read the article on Medium.
## Zeek Network Security Monitor Course (Lesson 6: conn.log - 4)
In this lesson we will show the number of connections per protocol service.
-> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-6-conn-log-4-d5d62610cc02) to read the article on Medium.
## Zeek Network Security Monitor Course (Lesson 7: conn.log - 5)
In this lesson we will show the distinct browsers used by the hosts.
-> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-7-conn-log-5-99d5bc7e711f) to read the article on Medium.
## Zeek Network Security Monitor Course (Lesson 8: conn.log - 6)
In this lesson we will show the source and destination IP addresses of all UDP and TCP connections that lasted more than 90 seconds.
-> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-8-conn-log-6-c19c7374483c) to read the article on Medium.
## Zeek Network Security Monitor Course (Lesson 9: conn.log - 7)
In this lesson we will show whether there any web servers operating on non-standardized ports.
-> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-9-conn-log-7-eaea25b86ead) to read the article on Medium.
## Zeek Network Security Monitor Course (Lesson 10: conn.log - 8)
In this lesson we will show the state history of connections as a string of letters.
-> Click [HERE](https://medium.com/@mytechnotalent/zeek-network-security-monitor-tutorial-part-10-conn-log-8-1de2cf970b7a) to read the article on Medium.
## C++ Fundamentals Course
## C++ Fundamentals Course (Chapter 1 - Hello World)
In this lesson we will discuss the basics of C++ output.
-> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book.
## C++ Fundamentals Course (Chapter 2 - Variables, Constants, Arrays, Vectors, Statements, Operators, Strings)
In this lesson we will discuss variables, constants, arrays, vectors, statements, operators and strings.
-> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book.
## C++ Fundamentals Course (Chapter 3 - Program Flow)
In this lesson we will discuss the basics of program flow.
-> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book.
## C++ Fundamentals Course (Chapter 4 - Functions)
In this lesson we will discuss functions.
-> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book.
## C++ Fundamentals Course (Chapter 5 - Pointers)
In this lesson we will discuss pointers.
-> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book.
## C++ Fundamentals Course (Chapter 6 - Input)
In this lesson we will discuss proper input validation.
-> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book.
## C++ Fundamentals Course (Chapter 7 - Classes)
In this lesson we will discuss class basics.
-> Click [HERE](https://github.com/mytechnotalent/Reverse-Engineering/blob/main/Fundamental%20C%2B%2B.pdf) to read the FREE pdf book.
## MicroPython Firmware Development Course
## MicroPython Firmware Development Course (Chapter 1 - Building Micropython)
This chapter covers how to build a MicroPython development environment.
-> Click [HERE](https://github.com/mytechnotalent/micropython-firmware-development/blob/main/MicroPython_Firmware_Development_5r1.pdf) to read the FREE pdf book.
## MicroPython Firmware Development Course (Chapter 2 - Basic I/O)
This chapter covers how to handle basic input and output in MicroPython.
-> Click [HERE](https://github.com/mytechnotalent/micropython-firmware-development/blob/main/MicroPython_Firmware_Development_5r1.pdf) to read the FREE pdf book.
## MicroPython Firmware Development Course (Chapter 3 - DataTypes & Numbers)
This chapter covers how to handle datatypes and numbers t in MicroPython.
-> Click [HERE](https://github.com/mytechnotalent/micropython-firmware-development/blob/main/MicroPython_Firmware_Development_5r1.pdf) to read the FREE pdf book.
## MicroPython Firmware Development Course (Chapter 4: Conditional Logic)
This chapter covers conditional logic and application flow chart design in MicroPython.
-> Click [HERE](https://github.com/mytechnotalent/micropython-firmware-development/blob/main/MicroPython_Firmware_Development_5r1.pdf) to read the FREE pdf book.
## MicroPython Firmware Development Course (Chapter 5: Lists, Tuples, Dictionaries & Loops)
This chapter covers lists, tuples, dictionaries and loops in MicroPython.
-> Click [HERE](https://github.com/mytechnotalent/micropython-firmware-development/blob/main/MicroPython_Firmware_Development_5r1.pdf) to read the FREE pdf book.
## BOOK IS UNDER DEVELOPMENT
## License
[Apache License, Version 2.0](https://www.apache.org/licenses/LICENSE-2.0)