Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.

Lena151 Reverse Engineering Tutorials

Infohash:

9ECDC87F9D0DD6969F8D74C8DE731A4D2E1DF7A6

Type:

Other

Title:

Lena151 Reverse Engineering Tutorials

Category:

Other/Other

Uploaded:

2008-02-09 (by jojoyohan)

Description:

All of Lena151's tutorials in one torrent.

Files count:

311

Size:

187.20 Mb

Trackers:

udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969

Comments:

Baseit (2008-09-19)

Btw, since these are tuts for REing, those folders probably had keygen examples, which are usually taken to be viruses or worms.

Baseit (2008-09-19)

For an update - I just finished downloading - and Kaspersky only found one malware, and that being the unpacker in tut 20, which I just took a look at that specific tut stating that some protectors for unpackers appear to be malicious since they self-write themselves to 'protect' the exe. So it's just a false alarm - no worries people.

mopi (2008-11-29)

01 Olly + assembler + patching a basic reverseme
02 Keyfiling the reverseme + assembler
03 Basic nag removal + header problems
04 Basic + aesthetic patching
05 Comparing on changes in conditional jumps, animate over/in, breakpoints
06 "The plain stupid patching method", searching for textstrings
07 Intermediate level patching, Kanal in PEiD
08 Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor
09 Explaining the Visual Basic concept, introduction to SmartCheck and configuration
10 Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick.
11 Intermediate patching using Olly's "pane window".
12 Guiding a program by multiple patching.
13 The use of API's in software, avoiding doublechecking tricks.
14 More difficult schemes and an introduction to inline patching.
15 How to study behaviour in the code, continued inlining using a pointer.
16 Reversing using resources.
17 Insights and practice in basic (self)keygenning.
18 Diversion code, encryption/decryption, selfmodifying code and polymorphism.
19 Debugger detected and anti-anti-techniques.
20 Packers and protectors : an introduction.
21 Imports rebuilding.
22 API Redirection.
23 Stolen bytes.
24 Patching at runtime using loaders from lena151 original.
25 Continued patching at runtime & unpacking armadillo standard protection.
26 Machine specific loaders, unpacking & debugging armadillo.
27 tElock + advanced patching.
28 Bypassing & killing server checks.
29 Killing & inlining a more difficult server check
30 SFX, Run Trace & more advanced string searching.
31 Delphi in Olly & DeDe.
32 Author tricks, HIEW & approaches in inline patching.
33 The FPU, integrity checks & loader versus patcher.
34 Reversing techniques in packed software & a S&R loader for ASProtect.
35 Inlining inside polymorphic code.
36 Keygenning.
37 In-depth unpacking & anti-anti-debugging a combination packer / protector.
38 Lena is back! This time unpacking is continued & she takes a look in to the world of debugger detection by DLL's and TLS.
39 Inlining a blowfish scheme in a packed & CRC protected DLL + unpacking ASProtect SKE 2.2
40 Obfuscation and algorithm hiding.

glafe (2009-04-25)

SEED PLZ!!!!

welhim (2013-02-05)

can anyone of you seed?

uneric1 (2013-05-20)

Mind you, I'd feel much better downloading it from some popular website/archive. The files in the tutorials are all too suspicious by themselves for me to risk a "what if this .exe was modified" no offense jojoyohan! Plus COME ON!! couldn't you put these files in a .zip or .rar archive? The files are just getting deleted by my antivirus as soon as they are downloaded. Anyway I googled for lena151 and found an archive at tuts4you.com. Better you do the same!!