Analyse executable files (EXE, DLL, OCX, SYS).
Analyse binary / bytecode.
Analyse PE compilation / signature.
Analyse PE packaging / protection.
Dynamic system analysis (API, Process, Memory, Network, File).
Compare binary files.
Mathematical & reverse calculating.
Executables safe testing.
Unpack & remove binary protection (UPX, ASPack).
Remove PE protection.
Decode hash, encrypt / decrypt keys.
Extract binary executable files.
View and change the running state of a program. (Disassembling, Decompiling, Hexing).
Manipulate PE using debugging platforms.
Transforme machine code into Assembly language.
Revert the process of compilation.
Edit PE hexadecimal.
Edit executable files.
Hack into PE ressources.
Build (PE, Setup, Res).
Rebuild PE import table / DLL.
Convert scripts / binary files.
Generate patching program using binary compare.
Build binary patcher.
Build binary patch loader.
Build Key generator.
Build patcher skin.
Patcher skins:
Build patcher release / NFO file.
Build patcher release ASCII.
Build patcher sound (MX).
Patcher sounds:
Bypassing executable process.
Trial reset.
Bypassing system.
Extra miscellaneous ressources.
Assembling Machine code.
Data encoding.
Protect executable files.
Universal mobile toolkits.
Android:
IOS:
Circuit / Logical simulation.
Programming tools (Compilators).
Editing text files.
Toolkit's standalone & offline dependencies.
Reverse Engineering Docs (Beginners).
Introducing Reverse Engineering.
Learn about cracking.