Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x44.cc
Context
Before I got into reverse engineering, executables always seemed
like black magic to me. I always wondered how stuff worked under the
hood, and how binary code is represented inside .exe files, and how
hard it is to modify this ‘compiled code’ without access to the
original source code.
But one of the main intimidating hurdles always seemed to be the
assembly language, it’s the thing that scares most people away from
trying to learn about this field.
That’s the main reason why I thought ...
Read more at 0x44.cc