x64 Assembly Language and Reverse Engineering Practicals
- All prices mentioned above are in United States dollar.
- This product is available at Udemy.
- At udemy.com you can purchase x64 Assembly Language and Reverse Engineering Practicals for only $549.00
- The lowest price of x64 Assembly Language and Reverse Engineering Practicals was obtained on March 26, 2026 9:14 pm.
$84.99 Original price was: $84.99.$13.00Current price is: $13.00.
Best deal at:
udemy.com
Buy for best price
Set Lowest Price Alert
×
Notify me, when price drops
Set Alert for Product: x64 Assembly Language and Reverse Engineering Practicals - $549.00

Price history
×
| Price history for x64 Assembly Language and Reverse Engineering Practicals | |
|---|---|
|
Latest updates:
|
|
Add to wishlistAdded to wishlistRemoved from wishlist 0
x64 Assembly Language and Reverse Engineering Practicals
$84.99 Original price was: $84.99.$13.00Current price is: $13.00.
Description
| Price history for x64 Assembly Language and Reverse Engineering Practicals | |
|---|---|
|
Latest updates:
|
|
Didn't find the right price? Set price alert below
Set Alert for Product: x64 Assembly Language and Reverse Engineering Practicals - $549.00

x64 Assembly Language and Reverse Engineering Practicals
★★★★★
$549.00 in stock
Udemy.com
as of March 26, 2026 9:14 pm
Understand x64 (64-bit) assembly code and apply knowledge to reversing x86 and x64 programs
Created by:
Paul Chin, PhD
College lecturer
College lecturer
Rating:4.62 (77reviews)
1206students enrolled
What Will I Learn?
- x64 (64-bit) Assembly Language
- Reverse Engineering
- x64dbg debugging
- Modifying programs
- Injecting code into 64-bit exe files
- Hollowing out 64-bit exe files
- 64-bit registers
- 64-bit memory read and write access
- x64 calling conventions
- Creating x64 functions
- Password phishing without strings
- Creating keygens
- Reversing program code logic
- Trace highlighting and animation
- Stack manipulation
- Comment tracing debug technique
- Hooking WinAPI debug technique
- File Patching
- Enabling disabled buttons
- Removing Nag Screens
- Deep Tracing to Phish out passwords
- Loop tracing techniques
- Defeating Anti-Debugger protection
- Reversing binary without strings
- Using Python to write Loaders and Memory Patcher
- Reversing Software Protected Binary without unpacking
- and more . . .
Requirements
- Preferably completed the first course in this series: Assembly Language Programming for Reverse Engineering
- Windows OS running Intel x86_86 architecture
- Oracle VirtualBox Running Windows 10 or 11 virtual machine
Target audience
- Students who have completed my first course in this series: Assembly Language Programming for Reverse Engineering
- Anyone who already know x86 Assembly (32-bit) and want to learn x64 (64-bit) Assembly from a hacker's perspective
- Security researchers
Price History
| Price history for x64 Assembly Language and Reverse Engineering Practicals | |
|---|---|
|
Latest updates:
|
|
Reviews (0)
User Reviews
0.0 out of 5
★★★★★
0
★★★★★
0
★★★★★
0
★★★★★
0
★★★★★
0
Write a review

There are no reviews yet.