x64dbg with the plugins is so flipping amazing!!! Does not get enough love! I wish I had your skills guys!
@Matt-ir1ky
2 жыл бұрын
Look up "Denuvo cracking tutorial" by voksi... He uses x64dbg exclusively and Denuvo is 100% the toughest protection in existence.
@LukeAvedon
2 жыл бұрын
@@Matt-ir1ky I looked up that tutorial! WOW WOW WOW WOW WOW!
@ShakilShahadat
2 жыл бұрын
Can you suggest some plugins?
@berkebicer5140
Жыл бұрын
master, I gave a huge respect for this. You are best x64dbg teacher ever. I love it thanks for all master
@pancakeboy12
2 жыл бұрын
Unreal, thanks for sharing. Definitely gonna have a shot at those cracks
@drygordspellweaver8761
Жыл бұрын
This was excellent content. You did many things right like enlarging the UI, showing through example, etc. Thank you for this.
@zxenon555
Жыл бұрын
Hello, I just wanted to thank you for your excellent videos and work, the way that you teach is great, remarking on those little stuff like keyboard shortcuts or menus, that although they may be usual on the daily work with this type of software, for beginners isn't so predictable or intuitive (especially if one doesn't know the vocabulary related to this field) so your way of approaching is great for us. It's a privilege to be able to learn from your work, thank you. Hope my english isn't so broken XD
@stryker2k2
Жыл бұрын
Thanks a ton! I try to keep it as simple as possible! I'm glad you enjoyed it!
@tahargermanni6205
Жыл бұрын
@@stryker2k2 Hello , Please I need your help.
@hadibq
Жыл бұрын
nice suggestion from yt! new sub indeed! Thanks for the great explanation and teaching skills!
@dewmi4403
9 ай бұрын
Dewmi is back🤩
@stryker2k2
8 ай бұрын
Hi Dewmi
@dewmi4403
8 ай бұрын
helooooooo@@stryker2k2
@chauncey5859
Жыл бұрын
Amazing video!
@hoangvantruong2942
Жыл бұрын
i really like this video. Thank you so much ^^
@JohnSmith-he5xg
2 жыл бұрын
@42:02 Just a heads up (you might already know this): you needed to change the value of the ZF register (Zero Flag). The "test" instruction sets that. Then the "je" reads the ZF value. So you could have still changed the jump behavior without reloading. Good video!
@moazelsawaf2000
Жыл бұрын
Thanks a lot, great start tutorial ❤
@stryker2k2
Жыл бұрын
I'm glad you like it! I just published another one today :)
@ani-zxk
6 ай бұрын
at 1:47 I think you meant to say 32 bit.
@stryker2k2
6 ай бұрын
Wow, yep... you're 100% correct. Good catch!
@niinuetey9878
4 ай бұрын
it will be that you did not have you studio video at the bottom corner of the screen. You can pop it up when there is the need but it is very distracting to really focus
@stryker2k2
4 ай бұрын
Thank you for the input 😊
@rikkoo
11 ай бұрын
goated video, thanks
@stryker2k2
11 ай бұрын
My pleasure! I love making walk-thrus like this :D
@MackNNations
Жыл бұрын
IDA has an option to re-examine/reformat a section as data instead of code so embedded text strings show up easier. I'm hoping Ghidra probably has something.
@P-G-77
Жыл бұрын
Very good-guy work.
@speedygonzales1335
Жыл бұрын
Great video and work, appreciate your content and style very much - thanks a lot 👍
@davidez3r098
2 жыл бұрын
You could also patch the CrackMe0x00 with Ghidra, so the check always evaluate true, and then export the executable to have an executable that always display "Password ok" even if you insert an incorrect one (: Anyway good videos!
@stryker2k2
2 жыл бұрын
I love Ghidra! Most of my channel is dedicated to it! And patching executables is by far my favorite thing about it! That and extracting embedded payloads and saving them to disk!
@davidez3r098
2 жыл бұрын
@@stryker2k2 Yeap, I mean you should do a video on patching too because, if I'm right, I didn't find one with this Ghidra feature. Or maybe there is but I didn't find it xD Have a nice coding and day!
@alisadeqi1883
2 жыл бұрын
Thank you so much.
@anntakamaki1960
Жыл бұрын
6:20 Hello sir, why do you add 4 to the stack rather than subtract? I thought stack grow towards low memory addresses.
@stryker2k2
Жыл бұрын
I may have made a mistake in saying that. The main goal was to demonstrate how I use x64dbg; so I appologize if I slipped on some of the particulars.
@anntakamaki1960
Жыл бұрын
@@stryker2k2 ok, thanks for clarifying.
@barongello
11 ай бұрын
0x0A is Line Feed, not Carriage Return (which is 0x0D)
@stryker2k2
8 ай бұрын
Yes, yes it is. Thank you for the correction.
@aniketbose4360
Жыл бұрын
i want to do source level debugging in x64dbg. i tried searching google but o help. I can debug only with assembly my source file not showing in the source tab
@debnathmriganka2010
2 ай бұрын
Hello, can you give me exe file with reverse engineering, this is 30 days trial but working full. can you please help me.
@stryker2k2
Ай бұрын
You can find the executables at: github.com/stryker2k2/dbg-demo/tree/master/crackmes
@aleahmontes8019
7 ай бұрын
where did you write your assembly code at?
@stryker2k2
7 ай бұрын
You can find my asm code at: github.com/stryker2k2/dbg-demo/blob/master/assem/assem_0x00.asm
@_sayroto_
Жыл бұрын
when i klick the enter button in the terminator it quits and i don t know why
@alisadeqi1883
2 жыл бұрын
I have a software that could not crack it. And also could not find solution for it. If I send you the software, would you mind creating a tutorial on how to crack it ?
@breachbase
10 ай бұрын
This is super useful, thank you!
@stryker2k2
8 ай бұрын
I'm glad you liked it!
@RenoRivsan
5 ай бұрын
Help... I want to reverse engineer a Patch... So I have the offsets to edit on HXD provided by the person who made the patch... Now how to I find that Offset into x64bg so I can see what string he looked for to patched it.
@stryker2k2
Ай бұрын
Most program load at 0x40000000 (or something like that). Open up a Programming Calculator and add the offset to 0x40000000. Likewise, you can also use a program like PEStudio or CFFExplorer to view exactly where the program starts.
@fred700
Жыл бұрын
Is there anyone who has tried "debugging" Fractal Software Chaotica? I have tried a while now but don't really manage to do it. Would be really thankfull for hints ;)
@jeromenowe9331
Жыл бұрын
Weird to hear an human in this video instead of stupid useless and horrible sounds (some call it "music"). Very good content.
@stryker2k2
Жыл бұрын
Thanks! I started off in this industry learning from those exact videos and promising myself to make better ones! It's my way of giving back 😊
@miraclecharacter_
4 ай бұрын
HOW CAN I TALK TO YOU ?
@stryker2k2
4 ай бұрын
In normal capitalization.
@hexploit2736
2 ай бұрын
@@stryker2k2 🤣
@gauravrajak007
5 ай бұрын
Sir, Please crack expert high score 5.0 and PDF 4+ database
@stryker2k2
Ай бұрын
I can do that... if Adobe pays me to do for a Bug Bounty program. But I won't do it as KZitem video.
@ElenaGolmez
Жыл бұрын
can you crack one if i send it to you?
@ElenaGolmez
Жыл бұрын
drive.google.com/file/d/1xp1XN-E9fh1dXnhZCN3NmVHJ6F7R1v8y/view?usp=sharing here it is
@mokilasto
3 ай бұрын
bro this is mlaware
@stryker2k2
Ай бұрын
Nope. But, you should treat every executable as if it is malware and always launch it in a network-less virtual machine. So... yes? But no.
@mokilasto
Ай бұрын
@@stryker2k2 Ok thank u it works 👍I love your video
@simpleperson3234
Жыл бұрын
Thank you for your service, Sir. What was your MOS in the military career?
@stryker2k2
Жыл бұрын
I did a lot of everything during my military career. Everything from being in a support element, to front lines patrol, parachuting out of airplanes, repelling out of helicopters, and being in places that we 'never were at'. It was an amazing career.
@ilvichingo1844
Жыл бұрын
hi, can you help me with a difficult program to crack it? pls?
@khanra17
10 ай бұрын
Its Ghidra not Gidra
@stryker2k2
8 ай бұрын
lmao! Shhhhh... don't tell anyone.
@maxsmith2320
Жыл бұрын
Nice one. My challenge to you crack Vectric Aspire 11.5 ...... I've seen cracked ones but they made it so complicated, so hope with your knowledge and experience you could do a big favor to many of us.
Пікірлер: 67