Jump to content

Reverse Engineering: Cutter for Beginners


itsMe
 Share

Recommended Posts

Hidden Content

    Give reaction to this post to see the hidden content.

Description

If you are completely new to Cutter and want to get up and running fast then this course is for you. In this course, we will cover how to use Cutter for Windows and Linux. Cutter is an an advanced, GUI-based, free and open-source reverse-engineering platform designed to take the pain out of radare2. It’s backend is running Rizin, a fork of the radare2 engine. Cutter is created by reverse engineers for reverse engineers. Cutter releases are fully integrated with native Ghidra decompiler.  Not only can Cutter disassemble a binary file, but it can also decompile it to C language. It also has a linear disassembly view, fully featured graph view as well as mini-graph for fast navigation. Cutter also features the ability to reverse debug which other debugger lacks. This feature allows you to not only step forwards, but you can also step backwards!  Cutter also has hexdumps and stack view which allows you to trace stack, register and inspect memory on the fly.  In addition to that, you can also patch the binary, by reversing jumps, modifying instructions and bytes. This course will teach you all of the above and more.

    Designed with beginners in mind.
    Simple windows and Linux Crackme’s designed to learn reverse engineering legally
    Practical and hands-on
    Using free tools only

Suitable for:

    Reverse Engineering and Malware Analysis Students
    Anyone interested to learn to use Cutter for Reverse Engineering
    Security researchers

Prerequisite:

    Windows PC
    Basic Assembly and C/C++ language would be helpful but not mandatory
    Familiarity with basic Linux commands would be useful but not mandatory
    Everything you need to know is covered in the course

Enroll now and I will see you inside!

Who this course is for:

    Anyone interested to learn to use Cutter for Reverse Engineering
    Reverse engineering and malware analysis students
    Security researchers

Requirements

    Basic Assembly Language , C Programming
    Windows PC
    Basic Linux commands

Hidden Content

    Give reaction to this post to see the hidden content.

Hidden Content

    Give reaction to this post to see the hidden content.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.