# Reverse-Engineering-Tutorial **Repository Path**: lnroboczy/Reverse-Engineering-Tutorial ## Basic Information - **Project Name**: Reverse-Engineering-Tutorial - **Description**: A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures. - **Primary Language**: Unknown - **License**: Apache-2.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-05-17 - **Last Updated**: 2021-05-17 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ![image](https://raw.githubusercontent.com/mytechnotalent/Reverse-Engineering-Tutorial/master/Reverse%20Engineering%20TEMPLATE.jpg) # Reverse Engineering Tutorial A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
## PROMOTIONAL VIDEO - WATCH NOW [HERE](https://youtu.be/Yz0zFsp0qzE) ON YOUTUBE
## Lesson 1: Assembly Language - Basic Malware Reverse Engineering (Part 1: Goals) This tutorial will begin with the basic concepts of malware reverse engineering and graduate to an entry-level basic examination of Assembly Language. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 2: Assembly Language - Basic Malware Reverse Engineering (Part 2: Techniques) This tutorial will address the two basic techniques that you can employ when analyzing malware. The first being static analysis and the other being dynamic analysis. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-1/) to read the article on LinkedIn. ## Lesson 3: Assembly Language - Basic Malware Reverse Engineering (Part 3: Types Of Malware) This tutorial will address the basic forms of malware and how they work in simple terms. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-2/) to read the article on LinkedIn. ## Lesson 4: Assembly Language - Basic Malware Reverse Engineering (Part 4: x86 Assembly Intro) This tutorial will address x86 Assembly Languages and their usage to produce object code for the aforementioned series of processors. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-3/) to read the article on LinkedIn. ## Lesson 5: Assembly Language - Basic Malware Reverse Engineering (Part 5: Binary Number System) This tutorial will address the very basics of the binary number system. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-4/) to read the article on LinkedIn. ## Lesson 6: Assembly Language - Basic Malware Reverse Engineering (Part 6: Hexadecimal Number System) This tutorial will address the very basics of the hexadecimal number system. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-5/) to read the article on LinkedIn. ## Lesson 7: Assembly Language - Basic Malware Reverse Engineering (Part 7: Transistors And Memory) This tutorial will address the basics of transistors and memory. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6/) to read the article on LinkedIn. ## Lesson 8: Assembly Language - Basic Malware Reverse Engineering (Part 8 - Bytes, Words, Double Words, etc...) This tutorial will address the basics of memory and examine our first GDB debugger instance and examine our first real look into our computers memory and instructions. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-7/) to read the article on LinkedIn. ## Lesson 9: Assembly Language - Basic Malware Reverse Engineering (Part 9: x86 Basic Architecture) This tutorial will address the basic architecture of an x86 processor. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-8/) to read the article on LinkedIn. ## Lesson 10: Assembly Language - Basic Malware Reverse Engineering (Part 10: General-purpose Registers) This tutorial will address the general purpose x86 registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-9/) to read the article on LinkedIn. ## Lesson 11: Assembly Language - Basic Malware Reverse Engineering (Part 11: Segment Registers) This tutorial will address the x86 segment registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-10/) to read the article on LinkedIn. ## Lesson 12: Assembly Language - Basic Malware Reverse Engineering (Part 12: Instruction Pointer Register) This tutorial will address the x86 instruction pointer register. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-11/) to read the article on LinkedIn. ## Lesson 13: Assembly Language - Basic Malware Reverse Engineering (Part 13: Control Registers) This tutorial will address the x86 control registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-12/) to read the article on LinkedIn. ## Lesson 14: Assembly Language - Basic Malware Reverse Engineering (Part 14: Flags) This tutorial will address the status, control and systems flags. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-13/) to read the article on LinkedIn. ## Lesson 15: Assembly Language - Basic Malware Reverse Engineering (Part 15: Stack) This tutorial will address the stack. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-14/) to read the article on LinkedIn. ## Lesson 16: Assembly Language - Basic Malware Reverse Engineering (Part 16: Heap) This tutorial will address the heap. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-15/) to read the article on LinkedIn. ## Lesson 17: Assembly Language - Basic Malware Reverse Engineering (Part 17 – How To Install Linux) This tutorial will address how to install Ubuntu Linux on both Windows and MAC. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-16/) to read the article on LinkedIn. ## Lesson 18: Assembly Language - Basic Malware Reverse Engineering (Part 18 - vim Text Editor) This tutorial will address how to install the vim text editor. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-17/) to read the article on LinkedIn. ## Lesson 19: Assembly Language - Basic Malware Reverse Engineering (Part 19 - Why Learn Assembly) This tutorial will address the age old question of why to bother understanding the basics of Assembly Language. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-18/) to read the article on LinkedIn. ## Lesson 20: Assembly Language - Basic Malware Reverse Engineering (Part 20 - Instruction Code Handling) This tutorial will address op codes and instruction code handling. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-19/) to read the article on LinkedIn. ## Lesson 21: Assembly Language - Basic Malware Reverse Engineering (Part 21 - How To Compile A Program) This tutorial will address how to compile a basic x86 Assembly Program. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6174148486322233344/) to read the article on LinkedIn. ## Lesson 22: Assembly Language - Basic Malware Reverse Engineering (Part 22 - ASM Program 1 [Moving Immediate Data]) This tutorial will address how to create our first real Assembly Program by moving immediate data. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6176700362704056320/) to read the article on LinkedIn. ## Lesson 23: Assembly Language - Basic Malware Reverse Engineering (Part 23 - ASM Debugging 1 [Moving Immediate Data]) This tutorial will address how to debug our first real Assembly Program by moving immediate data. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6179235028048834560/) to read the article on LinkedIn. ## Lesson 24: Assembly Language - Basic Malware Reverse Engineering (Part 24 - ASM Hacking 1 [Moving Immediate Data]) This tutorial will address how to hack our first real Assembly Program by moving immediate data. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6181749648739282944/) to read the article on LinkedIn. ## Lesson 25: Assembly Language - Basic Malware Reverse Engineering (Part 25 - ASM Program 2 [Moving Data Between Registers]) This tutorial will address how to create our second real Assembly Program by moving between registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6184290421015871488/) to read the article on LinkedIn. ## Lesson 26: Assembly Language - Basic Malware Reverse Engineering (Part 26 - ASM Debugging 2 [Moving Data Between Registers]) This tutorial will address how to debug our second real Assembly Program by moving between registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6186852494581198848/) to read the article on LinkedIn. ## Lesson 27: Assembly Language - Basic Malware Reverse Engineering (Part 27 - ASM Hacking 2 [Moving Data Between Registers]) This tutorial will address how to hack our second real Assembly Program by moving between registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6189381915728973824/) to read the article on LinkedIn. ## Lesson 28: Assembly Language - Basic Malware Reverse Engineering (Part 28 - ASM Program 3 [Moving Data Between Memory And Registers]) This tutorial will address how to create our third real Assembly Program by moving between memory and registers -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6191923581476184064/) to read the article on LinkedIn. ## Lesson 29: Assembly Language - Basic Malware Reverse Engineering (Part 29 - ASM Debugging 3 [Moving Data Between Memory And Registers]) This tutorial will address how to debug our third real Assembly Program by moving between memory and registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6194452403807363072/) to read the article on LinkedIn. ## Lesson 30: Assembly Language - Basic Malware Reverse Engineering (Part 30 - ASM Hacking 3 [Moving Data Between Memory And Registers]) This tutorial will address how to hack our third real Assembly Program by moving between memory and registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6196977244754186240/) to read the article on LinkedIn. ## Lesson 31: Assembly Language - Basic Malware Reverse Engineering (Part 31 - ASM Program 4 [Moving Data Between Registers And Memory]) This tutorial will address how to create our fourth real Assembly Program by moving between registers and memory. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6199521459321217024/) to read the article on LinkedIn. ## Lesson 32: Assembly Language - Basic Malware Reverse Engineering (Part 32 - ASM Debugging 4 [Moving Data Between Registers And Memory]) This tutorial will address how to debug our fourth real Assembly Program by moving between registers and memory. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6202084078657769472/) to read the article on LinkedIn. ## Lesson 33: Assembly Language - Basic Malware Reverse Engineering (Part 33 - ASM Hacking 4 [Moving Data Between Registers And Memory]) This tutorial will address how to hack our fourth real Assembly Program by moving between registers and memory. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6204613196200845313/) to read the article on LinkedIn. ## Lesson 34: Assembly Language - Basic Malware Reverse Engineering (Part 34 - ASM Program 5 [Indirect Addressing With Registers]) This tutorial will address how to create our fifth real Assembly Program by indirect addressing with registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6207141090722619392/) to read the article on LinkedIn. ## Lesson 35: Assembly Language - Basic Malware Reverse Engineering (Part 35 - ASM Debugging 5 [Indirect Addressing With Registers]) This tutorial will address how to debug our fifth real Assembly Program by indirect addressing with registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6209671278844997632/) to read the article on LinkedIn. ## Lesson 36: Assembly Language - Basic Malware Reverse Engineering (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers]) This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6212225805402009600/) to read the article on LinkedIn. ## Lesson 37: Assembly Language - Basic Malware Reverse Engineering (Part 37 - ASM Program 6 [CMOV Instructions]) This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6214770773354123264/) to read the article on LinkedIn. ## Lesson 38: Assembly Language - Basic Malware Reverse Engineering (Part 38 - ASM Debugging 6 [CMOV Instructions]) This tutorial will address how to debug our sixth real Assembly Program with CMOV instructions. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6216651661075582976/) to read the article on LinkedIn. ## Lesson 39: Assembly Language - Basic Malware Reverse Engineering (Part 39 - ASM Hacking 6 [CMOV Instructions]) This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6219938772826492928/) to read the article on LinkedIn. ## Lesson 40: Assembly Language - Basic Malware Reverse Engineering (Part 40 - Conclusion) This tutorial will conclude this x86 tutorial. -> Click [HERE](https://www.linkedin.com/pulse/assembly-language-basic-malware-reverse-engineering-kevin-m-thomas-6222371031936434176/) to read the article on LinkedIn. ## Lesson 41: ARM Assembly (Part 1 – The Meaning Of Life) This tutorial will introduce our ARM Assembly tutorial series. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-1-meaning-life-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 42: ARM Assembly (Part 2 - Number Systems) This tutorial will discuss number systems such as binary, decimal and hexadecimal in detail. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-2-number-systems-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 43: ARM Assembly (Part 3 - Binary Addition) This tutorial will discuss binary addition. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-3-binary-addition-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 44: ARM Assembly (Part 4 - Binary Subtraction) This tutorial will discuss binary subtraction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-4-binary-subtraction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 45: ARM Assembly (Part 5 - Word Lengths) This tutorial will discuss word lengths. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-5-word-lengths-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 46: ARM Assembly (Part 6 - Registers) This tutorial will discuss registers. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-6-registers-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 47: ARM Assembly (Part 7 - Program Counter) This tutorial will discuss the program counter. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-7-program-counter-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 48: ARM Assembly (Part 8 - CPSR) This tutorial will discuss the CPSR. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-8-cpsr-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 49: ARM Assembly (Part 9 - Link Register) This tutorial will discuss the Link Register. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-9-link-register-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 50: ARM Assembly (Part 10 - Stack Pointer) This tutorial will discuss the Stack Pointer. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-10-stack-pointer-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 51: ARM Assembly (Part 11 - ARM Firmware Boot Procedures) This tutorial will discuss ARM Firmware Boot Procedures. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-11-firmware-boot-procedures-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 52: ARM Assembly (Part 12 - Von Neumann Architecture) This tutorial will discuss Von Neumann Architecture. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-12-von-neumann-architecture-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 53: ARM Assembly (Part 13 - Instruction Pipeline) This tutorial will discuss the instruction pipeline. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-13-instruction-pipeline-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 54: ARM Assembly (Part 14 - ADD) This tutorial will discuss the add instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-14-add-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 55: ARM Assembly (Part 15 - Debugging ADD) This tutorial will discuss debugging the add instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-15-debugging-add-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 56: ARM Assembly (Part 16 - Hacking ADD) This tutorial will discuss hacking the add instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-16-hacking-add-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 57: ARM Assembly (Part 17 - ADDS) This tutorial will discuss the adds instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-17-adds-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 58: ARM Assembly (Part 18 – Debugging ADDS) This tutorial will discuss debugging the adds instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-18-debugging-adds-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 59: ARM Assembly (Part 19 – Hacking ADDS) This tutorial will discuss hacking the adds instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-19-hacking-adds-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 60: ARM Assembly (Part 20 – ADC) This tutorial will discuss the ADC instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-20-adc-kevin-m-thomas) to read the article on LinkedIn. ## Lesson 61: ARM Assembly (Part 21 – Debugging ADC) This tutorial will discuss debugging the ADC instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-21-adc-debugging-kevin-m-thomas) to read the article on LinkedIn. ## Lesson 62: ARM Assembly (Part 22 – Hacking ADC) This tutorial will discuss hacking the ADC instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-22-adc-hacking-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 63: ARM Assembly (Part 23 – SUB) This tutorial will discuss the SUB instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-23-sub-kevin-m-thomas) to read the article on LinkedIn. ## Lesson 64: ARM Assembly (Part 24 – Debugging SUB) This tutorial will discuss debugging the SUB instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-24-debugging-sub-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 65: ARM Assembly (Part 25 – Hacking SUB) This tutorial will discuss hacking the SUB instruction. -> Click [HERE](https://www.linkedin.com/pulse/arm-assembly-part-25-hacking-sub-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 66: ARM Reverse Engineering (Part 1 – The Meaning Of Life Part 2) This tutorial will introduce our ARM Reverse Engineering course. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-1-meaning-life-2-kevin-m-thomas) to read the article on LinkedIn. ## Lesson 67: ARM Reverse Engineering (Part 2 – Number Systems) This tutorial will discuss number systems. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-2-number-systems-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 68: ARM Reverse Engineering (Part 3 – Binary Addition) This tutorial will discuss binary addition. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-3-binary-addition-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 69: ARM Reverse Engineering (Part 4 – Binary Subtraction) This tutorial will discuss binary subtraction. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-4-binary-subtraction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 70: ARM Reverse Engineering (Part 5 – Word Lengths) This tutorial will discuss word lengths. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-5-word-lengths-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 71: ARM Reverse Engineering (Part 6 – Registers) This tutorial will discuss registers. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-6-registers-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 72: ARM Reverse Engineering (Part 7 – Program Counter) This tutorial will discuss program counter. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-7-program-counter-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 73: ARM Reverse Engineering (Part 8 - CPSR) This tutorial will discuss the CPSR. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-8-cpsr-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 74: ARM Reverse Engineering (Part 9 - Link Register) This tutorial will discuss the link register. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-9-link-register-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 75: ARM Reverse Engineering (Part 10 - Stack Pointer) This tutorial will discuss the stack pointer. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-10-stack-pointer-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 76: ARM Reverse Engineering (Part 11 - Firmware Boot Procedures) This tutorial will discuss the firmware boot procedures. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-11-firmware-boot-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 77: ARM Reverse Engineering (Part 12 - Von Neumann Architecture) This tutorial will discuss the Von Neumann Architecture. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-12-von-neumann-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 78: ARM Reverse Engineering (Part 13 - Instruction Pipeline) This tutorial will discuss the instruction pipeline. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-13-instruction-pipeline-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 79: ARM Reverse Engineering (Part 14 - Hello World) This tutorial will discuss the basics of a hello world program in ARM 32-bit. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-14-hello-world-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 80: ARM Reverse Engineering (Part 15 - Debugging Hello World) This tutorial will discuss debugging hello world. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-15-debugging-hello-world-thomas/) to read the article on LinkedIn. ## Lesson 81: ARM Reverse Engineering (Part 16 - Hacking Hello World) This tutorial will discuss hacking hello world. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-16-hacking-hello-world-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 82: ARM Reverse Engineering (Part 17 - Constants) This tutorial will discuss constants. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-17-constants-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 83: ARM Reverse Engineering (Part 18 – Debugging Constants) This tutorial will discuss debugging constants. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-18-debugging-constants-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 84: ARM Reverse Engineering (Part 19 – Hacking Constants) This tutorial will discuss hacking constants. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-19-hacking-constants-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 85: ARM Reverse Engineering (Part 20 – Character Variables) This tutorial will discuss character variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-20-character-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 86: ARM Reverse Engineering (Part 21 – Debugging Character Variables) This tutorial will discuss debugging character variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-21-debugging-character-variables-thomas/) to read the article on LinkedIn. ## Lesson 87: ARM Reverse Engineering (Part 22 – Hacking Character Variables) This tutorial will discuss hacking character variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-22-hacking-character-variables-thomas/) to read the article on LinkedIn. ## Lesson 88: ARM Reverse Engineering (Part 23 – Boolean Variables) This tutorial will discuss boolean variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-23-boolean-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 89: ARM Reverse Engineering (Part 24 – Debugging Boolean Variables) This tutorial will discuss debugging boolean variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-24-debugging-boolean-variables-thomas/) to read the article on LinkedIn. ## Lesson 90: ARM Reverse Engineering (Part 25 – Hacking Boolean Variables) This tutorial will discuss hacking boolean variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-25-hacking-boolean-variables-thomas/) to read the article on LinkedIn. ## Lesson 91: ARM Reverse Engineering (Part 26 – Integer Variables) This tutorial will discuss integer variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-26-integer-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 92: ARM Reverse Engineering (Part 27 – Debugging Integer Variables) This tutorial will discuss debugging integer variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-27-debugging-integer-variables-thomas/) to read the article on LinkedIn. ## Lesson 93: ARM Reverse Engineering (Part 28 – Hacking Integer Variables) This tutorial will discuss hacking integer variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-28-hacking-integer-variables-thomas/) to read the article on LinkedIn. ## Lesson 94: ARM Reverse Engineering (Part 29 – Float Variables) This tutorial will discuss float variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-29-float-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 95: ARM Reverse Engineering (Part 30 – Debugging Float Variables) This tutorial will discuss debugging float variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-30-debugging-float-variables-thomas/) to read the article on LinkedIn. ## Lesson 96: ARM Reverse Engineering (Part 31 – Hacking Float Variables) This tutorial will discuss hacking float variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-30-debugging-float-variables-thomas-1/) to read the article on LinkedIn. ## Lesson 97: ARM Reverse Engineering (Part 32 – Double Variables) This tutorial will discuss double variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-32-double-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 98: ARM Reverse Engineering (Part 33 – Debugging Double Variables) This tutorial will discuss debugging double variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-33-debugging-double-variables-thomas/) to read the article on LinkedIn. ## Lesson 99: ARM Reverse Engineering (Part 34 – Hacking Double Variables) This tutorial will discuss hacking double variables. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-34-hacking-double-variables-thomas/) to read the article on LinkedIn. ## Lesson 100: ARM Reverse Engineering (Part 35 – SizeOf Operator) This tutorial will discuss the sizeof operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-35-sizeof-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 101: ARM Reverse Engineering (Part 36 – Debugging SizeOf Operator) This tutorial will discuss debugging sizeof operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-36-debugging-sizeof-operator-thomas/) to read the article on LinkedIn. ## Lesson 102: ARM Reverse Engineering (Part 37 – Hacking SizeOf Operator) This tutorial will discuss hacking sizeof operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-37-hacking-sizeof-operator-thomas/) to read the article on LinkedIn. ## Lesson 103: ARM Reverse Engineering (Part 38 – Pre-Increment Operator) This tutorial will discuss the pre-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-38-pre-increment-operator-thomas/) to read the article on LinkedIn. ## Lesson 104: ARM Reverse Engineering (Part 39 – Debugging Pre-Increment Operator) This tutorial will discuss debugging pre-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-39-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 105: ARM Reverse Engineering (Part 40 – Hacking Pre-Increment Operator) This tutorial will discuss hacking pre-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-40-hacking-pre-increment-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 106: ARM Reverse Engineering (Part 41 – Post-Increment Operator) This tutorial will discuss the post-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-41-post-increment-operator-thomas/) to read the article on LinkedIn. ## Lesson 107: ARM Reverse Engineering (Part 42 – Debugging Post-Increment Operator) This tutorial will discuss debugging post-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-42-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 108: ARM Reverse Engineering (Part 43 – Hacking Post-Increment Operator) This tutorial will discuss hacking post-increment operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-43-hacking-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 109: ARM Reverse Engineering (Part 44 – Pre-Decrement Operator) This tutorial will discuss the pre-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-44-pre-decrement-operator-thomas/) to read the article on LinkedIn. ## Lesson 110: ARM Reverse Engineering (Part 45 – Debugging Pre-Decrement Operator) This tutorial will discuss debugging pre-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-45-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 111: ARM Reverse Engineering (Part 46 – Hacking Pre-Decrement Operator) This tutorial will discuss hacking pre-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-46-hacking-pre-decrement-kevin-m-thomas/ to read the article on LinkedIn. ## Lesson 112: ARM Reverse Engineering (Part 47 – Post-Decrement Operator) This tutorial will discuss post-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-47-post-decrement-operator-thomas/) to read the article on LinkedIn. ## Lesson 113: ARM Reverse Engineering (Part 48 – Debugging Post-Decrement Operator) This tutorial will discuss debugging post-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-48-debugging-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 114: ARM Reverse Engineering (Part 49 – Hacking Post-Decrement Operator) This tutorial will discuss hacking post-decrement operator. -> Click [HERE](https://www.linkedin.com/pulse/arm-reverse-engineering-part-49-hacking-operator-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 115: x64 Reverse Engineering (Part 1 – The Cyber Revolution) This tutorial will discuss the cyber revolution. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-1-cyber-revolution-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 116: x64 Reverse Engineering (Part 2 - Transistors) This tutorial will discuss transistors. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-2-transistors-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 117: x64 Reverse Engineering (Part 3 - Logic Gates) This tutorial will discuss logic gates. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-3-logic-gates-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 118: x64 Reverse Engineering (Part 4 - Number Systems) This tutorial will discuss number systems. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-4-number-systems-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 119: x64 Reverse Engineering (Part 5 - Binary Addition) This tutorial will discuss binary addition. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-5-binary-addition-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 120: x64 Reverse Engineering (Part 6 - Binary Subtraction) This tutorial will discuss binary subtraction. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-6-binary-subtraction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 121: x64 Reverse Engineering (Part 7 - Word Lengths) This tutorial will discuss word lengths. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-7-word-lengths-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 122: x64 Reverse Engineering (Part 8 - General Architecture) This tutorial will discuss the general architecture. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-8-general-architecture-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 123: x64 Reverse Engineering (Part 9 - Calling Conventions) This tutorial will discuss calling conventions. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-9-calling-conventions-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 124: x64 Reverse Engineering (Part 10 - Boolean Instructions) This tutorial will discuss boolean instructions. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-10-boolean-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 125: x64 Reverse Engineering (Part 11 - Pointers) This tutorial will discuss pointers. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-11-pointers-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 126: x64 Reverse Engineering (Part 12 - Load Effective Address) This tutorial will discuss load effective address. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-12-load-effective-address-thomas/) to read the article on LinkedIn. ## Lesson 127: x64 Reverse Engineering (Part 13 - The Data Segment) This tutorial will discuss the data segment. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-13-data-segment-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 128: x64 Reverse Engineering (Part 14 - SHL Instruction) This tutorial will discuss the shl instruction. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-14-shl-instruction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 129: x64 Reverse Engineering (Part 15 - SHR Instruction) This tutorial will discuss the shr instruction. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-15-shr-instruction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 130: x64 Reverse Engineering (Part 16 - ROL Instruction) This tutorial will discuss rol instruction. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-16-rol-instruction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 131: x64 Reverse Engineering (Part 17 - ROR Instruction) This tutorial will discuss the ror instruction. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-17-ror-instruction-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 132: x64 Reverse Engineering (Part 18 - Boot Sector Basics [Part 1]) This tutorial will discuss boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-18-boot-sector-basics-1-thomas/) to read the article on LinkedIn. ## Lesson 133: x64 Reverse Engineering (Part 19 - Boot Sector Basics [Part 2]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-18-boot-sector-basics-2-thomas/) to read the article on LinkedIn. ## Lesson 134: x64 Reverse Engineering (Part 20 - Boot Sector Basics [Part 3]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-20-boot-sector-basics-3-thomas/) to read the article on LinkedIn. ## Lesson 135: x64 Reverse Engineering (Part 21 - Boot Sector Basics [Part 4]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-21-boot-sector-basics-4-thomas/) to read the article on LinkedIn. ## Lesson 136: x64 Reverse Engineering (Part 22 - Boot Sector Basics [Part 5]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-22-boot-sector-basics-5-thomas/) to read the article on LinkedIn. ## Lesson 137: x64 Reverse Engineering (Part 23 - Boot Sector Basics [Part 6]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-23-boot-sector-basics-6-thomas/) to read the article on LinkedIn. ## Lesson 138: x64 Reverse Engineering (Part 24 - Boot Sector Basics [Part 7]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-24-boot-sector-basics-7-thomas/) to read the article on LinkedIn. ## Lesson 139: x64 Reverse Engineering (Part 25 - Boot Sector Basics [Part 8]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-25-boot-sector-basics-8-thomas/) to read the article on LinkedIn. ## Lesson 140: x64 Reverse Engineering (Part 26 - Boot Sector Basics [Part 9]) This tutorial will discuss more boot sector basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-26-boot-sector-basics-9-thomas/) to read the article on LinkedIn. ## Lesson 141: x64 Reverse Engineering (Part 27 - x64 Assembly [Part 1]) This tutorial will discuss x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-27-assembly-1-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 142: x64 Reverse Engineering (Part 28 - x64 Assembly [Part 2]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-28-assembly-2-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 143: x64 Reverse Engineering (Part 29 - x64 Assembly [Part 3]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-29-assembly-3-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 144: x64 Reverse Engineering (Part 30 - x64 Assembly [Part 4]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-30-assembly-4-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 145: x64 Reverse Engineering (Part 31 - x64 Assembly [Part 5]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-31-assembly-5-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 146: x64 Reverse Engineering (Part 32 - x64 Assembly [Part 6]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-32-assembly-6-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 147: x64 Reverse Engineering (Part 33 - x64 Assembly [Part 7]) This tutorial will discuss more x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-33-assembly-7-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 148: x64 Reverse Engineering (Part 34 - x64 C++ 1 Code [Part 1]) This tutorial will discuss c++ code as it relates to 64-bit assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-34-c-1-code-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 149: x64 Reverse Engineering (Part 35 - x64 C++ 2 Debug [Part 2]) This tutorial will discuss more c++ code as it relates to 64-bit assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-35-c-1-debug-2-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 150: x64 Reverse Engineering (Part 36 - x64 C++ 3 Hacking [Part 3]) This tutorial will discuss more c++ code as it relates to 64-bit assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-36-c-1-hacking-3-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 151: x64 Reverse Engineering (Part 37 - x64 C & Genesis Of Life) This tutorial will discuss c and how it relates to x64 assembly. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-37-c-genesis-life-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 152: x64 Reverse Engineering (Part 38 - x64 Networking Basics) This tutorial will discuss x64 networking basics. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-38-networking-basics-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 153: x64 Reverse Engineering (Part 39 - Why C?) This tutorial will discuss the power of the c language. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-39-why-c-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 154: x64 Reverse Engineering (Part 40 - Hacking Hello World!) This tutorial will discuss hacking hello world. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-40-hacking-hello-world-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 155: x64 Reverse Engineering (Part 41 - Hacking Variables!) This tutorial will discuss hacking variables. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-41-hacking-variables-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 156: x64 Reverse Engineering (Part 42 - Hacking Branches!) This tutorial will discuss hacking branches. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-42-hacking-branches-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 157: x64 Reverse Engineering (Part 43 - Hacking Pointers!) This tutorial will discuss hacking pointers. -> Click [HERE](https://www.linkedin.com/pulse/x64-reverse-engineering-part-43-hacking-pointers-kevin-m-thomas/) to read the article on LinkedIn. ## Lesson 158: Hacking C++ ARM 64 (Part 1 - The Meaning Of Life) In this lesson we will discuss the course concepts and the meaning of life. -> Click [HERE](https://www.linkedin.com/pulse/lesson-1-hacking-c-arm-64-part-meaning-life-kevin-thomas/) to read the article on LinkedIn. ## Lesson 159: Hacking C++ ARM 64 (Part 2 - Development Setup) In this lesson we will discuss how to set up our development in 64-bit ARM with Kali Linux. -> Click [HERE](https://www.linkedin.com/pulse/lesson-2-hacking-c-arm-64-part-development-setup-kevin-thomas/) to read the article on LinkedIn. ## Lesson 160: Hacking C++ ARM 64 (Part 3 - "Hello World") In this lesson we will discuss how to write and compile a simple hello world program in C++. -> Click [HERE](https://www.linkedin.com/pulse/lesson-2-hacking-c-arm-64-part-hello-world-kevin-thomas/) to read the article on LinkedIn. ## Lesson 161: Hacking C++ ARM 64 (Part 4 - Debugging "Hello World") In this lesson we will debug our simple hello world program. -> Click [HERE](https://www.linkedin.com/pulse/lesson-4-hacking-c-arm-64-part-debugging-hello-world-kevin-thomas/) to read the article on LinkedIn. ## Lesson 162: Hacking C++ ARM 64 (Part 5 - Hacking "Hello World") In this lesson we will hack our simple hello world program. -> Click [HERE](https://www.linkedin.com/pulse/lesson-5-hacking-c-arm-64-part-hello-world-kevin-thomas/) to read the article on LinkedIn. ## Lesson 163: Hacking C++ ARM 64 (Part 6 - Basic I/O) In this lesson we will discuss how to write and compile a simple basicio program in C++ and discuss basic input validation. -> Click [HERE](https://www.linkedin.com/pulse/lesson-6-hacking-c-arm-64-part-basic-io-kevin-thomas/) to read the article on LinkedIn. ## Lesson 164: COMING SOON!
## Supplimental 32-bit ARM - Hacking Hello World This tutorial hacks a 32-bit ARM hello world program. -> Click [HERE](https://github.com/mytechnotalent/0x01_arm_32_hacking_hello_world/) to read the GitHub tutorial. ## Supplimental 32-bit ARM - Hacking Int This tutorial hacks a 32-bit ARM int program. -> Click [HERE](https://github.com/mytechnotalent/0x02_arm_32_hacking_int) to read the GitHub tutorial. ## Supplimental 32-bit ARM - Hacking Float This tutorial hacks a 32-bit ARM float program. -> Click [HERE](https://github.com/mytechnotalent/0x03_arm_32_hacking_float) to read the GitHub tutorial. ## Supplimental 32-bit ARM - Hacking Double This tutorial hacks a 32-bit ARM double program. -> Click [HERE](https://github.com/mytechnotalent/0x04_arm_32_hacking_double) to read the GitHub tutorial. ## Supplimental 32-bit ARM - Hacking Char This tutorial hacks a 32-bit ARM char program. -> Click [HERE](https://github.com/mytechnotalent/0x05_arm_32_hacking_char) to read the GitHub tutorial. ## Supplimental 32-bit ARM - Hacking Char Pointer This tutorial hacks a 32-bit ARM char pointer program. -> Click [HERE](https://github.com/mytechnotalent/0x06_arm_32_hacking_char_pointer) to read the GitHub tutorial.
## License [Apache License, Version 2.0](https://www.apache.org/licenses/LICENSE-2.0)