Excellent video. A tip for those who want to "automate" the skip so you don't have to change the IP every time. Check the function out and if it is just calling NtSetInformationThread or some other anti-debug code and it doesn't contain important malware code (which it usually doesn't since it is isolated anti-debug function) you can simply NOP the whole call and skip over that check every time you restart the exe\dll in the debugger.
@OALABS2 жыл бұрын
Nice tip!
@sylvesterangiho9146 Жыл бұрын
Pls I want to learn software how can you help me please
@pedrobarthacking5 ай бұрын
Amazing content! Please do more videos Reverse engineering context! thank you.
@surajsawant64693 жыл бұрын
this is amazing... nice work. thanks for sharing.
@az22523 жыл бұрын
I never thought about using graph view while using x64 lol As always, your vids are the best.
@OALABS3 жыл бұрын
Thanks! Sometimes it's very useful to see see the control flow from another perspective.
@mytechnotalent3 жыл бұрын
Brilliant as always!
@qweoiwjewiodc19542 жыл бұрын
Excellent video
@Axcmotora2 жыл бұрын
Thank you for this Good turtorial :)
@hannahprobably57653 жыл бұрын
features ! love them all 🚩❤
@hisokamorow54954 күн бұрын
Hi thank you for everything you give 👍 my question i have run a program but PID doesn't show on 64xdbg, is there any way that i can bypass that
@_why_38813 жыл бұрын
What would be the approach when the exe reproduces itself and its threads (like in process explore you can see 6times the same process)
@OALABS3 жыл бұрын
That's a completely different topic ;) You may want to check out some of our process injection unpacking tutorials.
@lucasjulianlacognata66703 жыл бұрын
Thanks Teacher, have you considered writing a book about reversing?
@OALABS3 жыл бұрын
No books, just live workshops and videos : )
@wittingsun78565 ай бұрын
Couldn't you have inserted a jump instead of the push 0?
@dmitriydibenko55292 жыл бұрын
May I ask you to make a video about Software Nanomites?)
@OALABS2 жыл бұрын
No, lol
@dmitriydibenko55292 жыл бұрын
Almost the same trick, as Enigma does to detach from the debugger. However, if I remember correctly, Enigma uses ZwSetInformationThread instead
@sylvesterangiho9146 Жыл бұрын
Hi please help me crack my software
@SilentGaming-SG Жыл бұрын
Can this method remove the x63dbg (32bit) virus???
@atoma8921 Жыл бұрын
Where is the part II?
@OALABS Жыл бұрын
On our Patreon : ) www.patreon.com/posts/analyzing-anti-57443723
@Sezdik3 жыл бұрын
hello, is there someone sleeping while you record? there is background voice.. like snoring ... just sayn
@OALABS3 жыл бұрын
Haha that's my bulldog Boris. If you check out our streams on Twitch you will see he sleeps beside my desk and has his own doggo cam