Video Tutorial Series on Python Winappdbg for Reverse Engineers
In past I've created a few open source projects related to vulnerability research and reversing using python winappdbg module. Sometimes I receive queries/doubts over DM. So I decided to create a video tutorial series about basics of winappdbg and how it can help you automate lot of your reverse engineering effort- to kind of better use of this lock down :)
The playlist is available here
- Python Winappdbg Tutorial for Reverse Engineers 1 of 20: : Installing Winappdbg on Windows Platform
- Python Winappdbg Tutorial for Reverse Engineers 2 of 20: Launching Your First App under Debugger
- Python Winappdbg Tutorial for Reverse Engineers 3 of 20: Attaching to Existing Process
- Python Winappdbg Tutorial for Reverse Engineers 4 of 20: Handling Debug Events
- Python Winappdbg Tutorial for Reverse Engineers 5 of 20: Setting Breakpoints
- Python Winappdbg Tutorial for Reverse Engineers 6 of 20: Accessing Registers
- Python Winappdbg Tutorial for Reverse Engineers 7 of 20: Reading Writing Process Memory
- Python Winappdbg Tutorial for Reverse Engineers 8 of 20: Enumerating Process Thread & Loaded Module
- Python Winappdbg Tutorial for Reverse Engineers 9 of 20: Hooking Windows API
- Python Winappdbg Tutorial for Reverse Engineers 10 of 20: Exception (Crash)Handling within Debuggee
- Python Winappdbg Tutorial for Reverse Engineers 11 of 20: Writing Your First Mutation Fuzzer - I
- Python Winappdbg Tutorial for Reverse Engineers 12 of 20: Writing Your First Mutation Fuzzer - II
There will be around 20 videos in this series , I've uploaded first 12 of it. If you find it helpful, you can show some support by subscribing to this channel.