- 1. Introduction
- 2. Introduction to crackme's
- 3. Introduction to x64dbg and Detect it Easy (DIE)
- 4. Setting up your cracking workspace and workflow
- 5. Debugger Stepping Basics
- 6. Stepping Into Calls
- 7. Breakpoints
- 8. Reversing Jumps
- 9. How to patch a program
- 10. Summary of Cracking Software Workflow
- 11. Introduction to cracking gui-based programs
- 12. Analyzing the PE for a gui-based program
- 13. Crack the Serial Key using BP on strings
- 14. Windows api functions & the stack
- 15. Patching to bypass wrong serial key message
- 16. Setting Breakpoints on Intermodular Calls
- 17. Setting BP from the Call Stack
- 18. Cracking Registration File Checks
- 19. Removing Nag Screens
- 20. Cracking Trial Period Software
- 21. Cracking Auto-Generated Serial Keys
- 22. Removing Nag Screen by TDC
- 23. Cracking by patching eax register values
- 24. Cracking via Hardware Breakpoints
- 25. How to Change Serial Key By Patching Memory Directly
- 26. xAnalyzer Static Code Analyzer
- 27. Serial Fishing - how to extract serial key
- 28. Cracking Software Protection
- 29. Cracking software using loaders
- 30. Cracking Software's Anti-Debugging Protection
- 31. Cracking Software that has a combination of Packing + Anti-Debugging
- 32. Keygens
https://mega.nz/folder/XWRjVAAA#_kLgDVCfVTGAuFTDRsk1WQ