@LiveOverflow
  @LiveOverflow
LiveOverflow | Self-Learning Reverse Engineering in 2022 @LiveOverflow | Uploaded 2 years ago | Updated 7 hours ago
There exist some awesome tools nowadays to accelerate your self-education for reverse engineering. godbolt and dogbolt are amazing to quickly learn basic assembly and reversing.

Compiler Explorer: godbolt.org
Decompiler Explorer: dogbolt.org
C code example: github.com/LiveOverflow/liveoverflow_youtube/blob/master/0x05_simple_crackme_intro_assembler/license_1.c
Introducing Decompiler Explorer - https://binary.ninja/2022/07/13/introducing-decompiler-explorer.html

00:00 - Intro
00:23 - Motivation
01:00 - How to c?
02:11 - godbolt Basic Usage
03:40 - Function Call on x64
04:30 - Intel vs ARM assembly
05:22 - godbolt Compiler Options
05:50 - Enable gcc O3 Compiler Optimization
06:35 - Decompiler Explorer dogbolt
07:16 - Comparing Decompiled main()
08:25 - Outro

-=[ ❤️ Support ]=-

→ per Video: patreon.com/join/liveoverflow
→ per Month: youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: twitter.com/LiveOverflow
→ Instagram: instagram.com/LiveOverflow
→ Blog: liveoverflow.com
→ Subreddit: reddit.com/r/LiveOverflow
→ Facebook: facebook.com/LiveOverflow
Self-Learning Reverse Engineering in 2022They Cracked My Server!Did you really find a vulnerability in Google? - ft. @PwnFunctionThe Age of Universal XSSControversial Security // BSides Berlin 2021Accidental LLM Backdoor - Prompt TricksMindmapping a Pwnable Challenge - intro_pwn/pwn1 CSCG 2020Authorization vs. Authentication (Google Bug Bounty)Crafting a Minecraft 0day...Log4j Lookups in Depth // Log4Shell CVE-2021-44228 - Part 2Self-aware Video: it knows its own YouTube Video ID?Flying Without Elytra

Self-Learning Reverse Engineering in 2022 @LiveOverflow

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER