- x86 Course
- Part 1: Goals
- Part 2: Techniques
- Part 3: Types Of Malware
- Part 4: x86 Assembly Intro
- Part 5: Binary Number System
- Part 6: Hexadecimal Number System
- Part 7: Transistors And Memory
- Part 8 - Bytes, Words, Double Words, etc...
- Part 9: x86 Basic Architecture
- Part 10: General-purpose Registers
- Part 11: Segment Registers
- Part 12: Instruction Pointer Register
- Part 13: Control Registers
- Part 14: Flags
- Part 15: Stack
- Part 16: Heap
- Part 17 – How To Install Linux
- Part 18 - vim Text Editor
- Part 19 - Why Learn Assembly
- Part 20 - Instruction Code Handling
- Part 21 - How To Compile A Program
- Part 22 - ASM Program 1 [Moving Immediate Data]
- Part 23 - ASM Debugging 1 [Moving Immediate Data]
- Part 24 - ASM Hacking 1 [Moving Immediate Data]
- Part 25 - ASM Program 2 [Moving Data Between Registers]
- Part 26 - ASM Debugging 2 [Moving Data Between Registers]
- Part 27 - ASM Hacking 2 [Moving Data Between Registers]
- Part 28 - ASM Program 3 [Moving Data Between Memory And Registers]
- Part 29 - ASM Debugging 3 [Moving Data Between Memory And Registers]
- Part 30 - ASM Hacking 3 [Moving Data Between Memory And Registers]
- Part 31 - ASM Program 4 [Moving Data Between Registers And Memory]
- Part 32 - ASM Debugging 4 [Moving Data Between Registers And Memory]
- Part 33 - ASM Hacking 4 [Moving Data Between Registers And Memory]
- Part 34 - ASM Program 5 [Indirect Addressing With Registers]
- Part 35 - ASM Debugging 5 [Indirect Addressing With Registers]
- Part 36 - ASM Hacking 5 [Indirect Addressing With Registers]
- Part 37 - ASM Program 6 [CMOV Instructions]
- Part 38 - ASM Debugging 6 [CMOV Instructions]
- Part 39 - ASM Hacking 6 [CMOV Instructions]
- Part 40 - Conclusion
- ARM-32 Course 1
- Part 1 – The Meaning Of Life
- Part 2 - Number Systems
- Part 3 - Binary Addition
- Part 4 - Binary Subtraction
- Part 5 - Word Lengths
- Part 6 - Registers
- Part 7 - Program Counter
- Part 8 - CPSR
- Part 9 - Link Register
- Part 10 - Stack Pointer
- Part 11 - ARM Firmware Boot Procedures
- Part 12 - Von Neumann Architecture
- Part 13 - Instruction Pipeline
- Part 14 - ADD
- Part 15 - Debugging ADD
- Part 16 - Hacking ADD
- Part 17 - ADDS
- Part 18 – Debugging ADDS
- Part 19 – Hacking ADDS
- Part 20 – ADC
- Part 21 – Debugging ADC
- Part 22 – Hacking ADC
- Part 23 – SUB
- Part 24 – Debugging SUB
- Part 25 – Hacking SUB
- ARM-32 Course 2
- Part 1 – The Meaning Of Life Part 2
- Part 2 – Number Systems
- Part 3 – Binary Addition
- Part 4 – Binary Subtraction
- Part 5 – Word Lengths
- Part 6 – Registers
- Part 7 – Program Counter
- Part 8 - CPSR
- Part 9 - Link Register
- Part 10 - Stack Pointer
- Part 11 - Firmware Boot Procedures
- Part 12 - Von Neumann Architecture
- Part 13 - Instruction Pipeline
- Part 14 - Hello World
- Part 15 - Debugging Hello World
- Part 16 - Hacking Hello World
- Part 17 - Constants
- Part 18 – Debugging Constants
- Part 19 – Hacking Constants
- Part 20 – Character Variables
- Part 21 – Debugging Character Variables
- Part 22 – Hacking Character Variables
- Part 23 – Boolean Variables
- Part 24 – Debugging Boolean Variables
- Part 25 – Hacking Boolean Variables
- Part 26 – Integer Variables
- Part 27 – Debugging Integer Variables
- Part 28 – Hacking Integer Variables
- Part 29 – Float Variables
- Part 30 – Debugging Float Variables
- Part 31 – Hacking Float Variables
- Part 32 – Double Variables
- Part 33 – Debugging Double Variables
- Part 34 – Hacking Double Variables
- Part 35 – SizeOf Operator
- Part 36 – Debugging SizeOf Operator
- Part 37 – Hacking SizeOf Operator
- Part 38 – Pre-Increment Operator
- Part 39 – Debugging Pre-Increment Operator
- Part 40 – Hacking Pre-Increment Operator
- Part 41 – Post-Increment Operator
- Part 42 – Debugging Post-Increment Operator
- Part 43 – Hacking Post-Increment Operator
- Part 44 – Pre-Decrement Operator
- Part 45 – Debugging Pre-Decrement Operator
- Part 46 – Hacking Pre-Decrement Operator
- Part 47 – Post-Decrement Operator
- Part 48 – Debugging Post-Decrement Operator
- Part 49 – Hacking Post-Decrement Operator
- x64 Course
- Part 1 – The Cyber Revolution
- Part 2 - Transistors
- Part 3 - Logic Gates
- Part 4 - Number Systems
- Part 5 - Binary Addition
- Part 6 - Binary Subtraction
- Part 7 - Word Lengths
- Part 8 - General Architecture
- Part 9 - Calling Conventions
- Part 10 - Boolean Instructions
- Part 11 - Pointers
- Part 12 - Load Effective Address
- Part 13 - The Data Segment
- Part 14 - SHL Instruction
- Part 15 - SHR Instruction
- Part 16 - ROL Instruction
- Part 17 - ROR Instruction
- Part 18 - Boot Sector Basics [Part 1]
- Part 19 - Boot Sector Basics [Part 2]
- Part 20 - Boot Sector Basics [Part 3]
- Part 21 - Boot Sector Basics [Part 4]
- Part 22 - Boot Sector Basics [Part 5]
- Part 23 - Boot Sector Basics [Part 6]
- Part 24 - Boot Sector Basics [Part 7]
- Part 25 - Boot Sector Basics [Part 8]
- Part 26 - Boot Sector Basics [Part 9]
- Part 27 - x64 Assembly [Part 1]
- Part 28 - x64 Assembly [Part 2]
- Part 29 - x64 Assembly [Part 3]
- Part 30 - x64 Assembly [Part 4]
- Part 31 - x64 Assembly [Part 5]
- Part 32 - x64 Assembly [Part 6]
- Part 33 - x64 Assembly [Part 7]
- Part 34 - x64 C++ 1 Code [Part 1]
- Part 35 - x64 C++ 2 Debug [Part 2]
- Part 36 - x64 C++ 3 Hacking [Part 3]
- Part 37 - x64 C & Genesis Of Life
- Part 38 - x64 Networking Basics
- Part 39 - Why C?
- Part 40 - Hacking Hello World!
- Part 41 - Hacking Variables!
- Part 42 - Hacking Branches!
- Part 43 - Hacking Pointers!
- ARM-64 Course
- Part 1 - The Meaning Of Life
- Part 2 - Development Setup
- Part 3 - "Hello World"
- Part 4 - Debugging "Hello World"
- Part 5 - Hacking "Hello World"
- Part 6 - Basic I/O
- Part 7 - Debugging Basic I/O
- Part 8 - Hacking Basic I/O
- Part 9 - Character Primitive Datatype
- Part 10 - Debugging Character Primitive Datatype
- Part 11 - Hacking Character Primitive Datatype
- Part 12 - Boolean Primitive Datatype
- Part 13 - Debugging Boolean Primitive Datatype
- Part 14 - Hacking Boolean Primitive Datatype
- Part 15 - Float Primitive Datatype
- Part 16 - Debugging Float Primitive Datatype
- Part 17 - Hacking Float Primitive Datatype
- Part 18 - Double Primitive Datatype
- Part 19 - Debugging Double Primitive Datatype
- Part 20 - Hacking Double Primitive Datatype
- Pico Hacking Course
- Part 1 - The Why, The How...
- Part 2 - Hello World
- Part 3 - Debugging Hello World
- Part 4 - Hacking Hello World
- Part 5 - char
- Part 6 - Debugging char
- Part 7 - Hacking char
- Part 8 - int
- Part 9 - Debugging int
- Part 10 - Hacking int
- Part 11 - float
- Part 12 - Debugging float
- Part 13 - Hacking float
- Part 14 - double
- Part 15 - Debugging double
- Part 16 - Hacking double
- Part 17 - "ABSOLUTE POWER CORRUPTS ABSOLUTELY!", The Tragic Tale Of Input...
- Part 18 - "FOR 800 YEARS HAVE I TRAINED JEDI!", The FORCE That IS Input...
- Part 19 - Input
- Part 20 - Debugging Input