Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

  1. Guybrush88

    Arm Assembly Internals and Reverse Engineering.pdf

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. safi coool

    Hash  Online Reverse Hash Tool v3.3 free

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. safi coool

    Hash  Online Reverse Hash Tool v3.3 free

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. download *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. maulxcurutz

    latest reverse ip tools

    https://github.com/Lainonz/Reviz
  5. tronny

    OALABS - Malware Reverse Engineering Training

    OALABS - Malware Reverse Engineering Training *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. t4ctici4n

    Legion 6.5 Bot [ Modified ] , New Reverse ip , New Mass Hidden Debug ..etc

    Link: https://fastupload.io/lku09xS6NZfGQRC/file https://multipload.io/YTGgWTKw *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. tronny

    Zero2Automated - Malware Reverse Engineering & Threat Intelligence

    Zero2Automated - Malware Reverse Engineering & Threat Intelligence *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. tronny

    Udemy - x64 Assembly Language and Reverse Engineering Practicals

    Udemy - x64 Assembly Language and Reverse Engineering Practicals 3-2024, by Paul Chin *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. player852

    Malware Analysis & Reverse Engineering Fundamentals Course

    Malware analysis and reverse engineering fundamentals course by HackerSploit Academy https://hackersploit-academy.thinkific.com/courses/malware-analysis-reverse-engineering-fundamentals-course Price ~ $35 Gdrive link: https://drive.google.com/drive/folders/15xXmcd61ZuMuGgrgz1HMTHuoFn3BXF7J
  10. omarosama

    Reverse Collapse Code Name Bakery-TENOKE

    P R E S E N T S GAME : Reverse Collapse: Code Name Bakery PUBLISHER : XD RLS DATE : 2024/03 PROTECTION : Steam STORE : https://store.steampowered.com/app/1127700/ Experience the newest tactical RPG from the creators of Girls Frontline. Some 30 years in...
  11. omarosama

    Reverse Collapse: Code Name Bakery - Deluxe Edition

    Reverse Collapse: Code Name Bakery - Deluxe Edition (v1.0.0.12 + All DLCs + Bonus Content + MULTi5) (From 9 GB) [DODI Repack] TITLE: Reverse Collapse: Code Name Bakery GENRE: Adventure, RPG, Strategy DEVELOPER: Shanghai Sunborn Network Technology Co., Ltd. PUBLISHER: XD FRANCHISE: X.D. Network...
  12. mayoufi

    Reverse Insulin Resistance And Lose Weight

    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 216.50 MB | Duration: 0h 31m Learn how to reverse insulin resistance, loose belly fat, prevent diabetes 2 and control all of your symptoms What you'll learn Identify lifestyle patterns to reverse insulin resistance...
  13. PhairZ

    Method/TUT  beginner starter course for cracking and reverse engineering crackmes

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. manocat

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+-Udemy CouponšŸ’›šŸ§”šŸ’„

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+ Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra, Game Hacking, IDA Pro, IDA Free, C++ and C! What you'll learn Launch a career in cybersecurity: Gain practical expertise in reverse engineering and malware...
  15. mjnnnnn

    [100% Off] Reverse Engineering .NET

    Click
  16. vtk20231031

    Reversing: Secrets of Reverse Engineering

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. vtk20231031

    A collection of resources for linux reverse engineering

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. mayoufi

    Kaspersky - Targeted Malware Reverse Engineering

    MP4 | Video: H264 1920x1080 | Audio: AAC 48000Hz 2 Ch Language: English | Duration: 60+ min | Size: 7.52 GB he online format of Kasperskyā€™s training helps more engineers upgrade their reversing skills and become confident users of our software disassembly product, IDA Pro Overview & objectives...
  19. tronny

    InfosecInstitute - IACRB Certified Reverse Engineering Analyst (CREA)

    InfosecInstitute - IACRB Certified Reverse Engineering Analyst (CREA) *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. Damiene

    Method/Tut  ILLEGAL7 HACKERS ALL COURSES šŸ“š

    Link: https://mega.nz/folder/DpM2jT4J#Kl_o0ryTXeIZtsMKyUgJVQ
  21. Drolord22

    (PDF Full book $15 worth) Ghidra Software Reverse Engineering by Packt

    Book: PDF DOWNLOAD: HERE
  22. werewolfpow

    REVERSE IMAGE āœ…WORKINGāœ…

    https://github.com/dessant/search-by-image *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  23. ŠŗŠ½Ī±Ī·

    Reverse Engineering .NET For Beginners (Visual Basic)

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  24. Tabproxy1

    Proxy  What is the difference between a reverse proxy and a forward proxy?

    The difference between a forward proxy and a reverse proxy is the objects they are acting on. The forward proxy is the request of the proxy client, which is aware of the existence of the proxy server, and is often used in scenarios such as scientific Internet surfing, breaking access...
  25. tronny

    Kaspersky - Targeted Malware Reverse Engineering, by Denis Legezo

    Kaspersky - Targeted Malware Reverse Engineering, by Denis Legezo *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  26. xxmart

    Linux Essentials For Hackers

    Watch Online On Mega Link:- Click Here
  27. carxproveteran

    Ethical Hacking: Reverse Shells

    Ethical Hacking: Reverse Shells Hack Windows and Linux boxes What you'll learn Hack Windows computers Hack Linux computers Use shells Create Malicious Executables *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. manocat

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+-Udemy Coupon

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+ Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra, Game Hacking, IDA Pro, IDA Free, C++ and C! What you'll learn Launch a career in cybersecurity: Gain practical expertise in reverse engineering and malware...
  29. carlosboyd

    XWorm v5.0 Cracked / Reverse Engineering Lab

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. carlosboyd

    XWorm v5.1-5.2 Cracked / Reverse Engineering Lab

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  31. zeroroz

    [100% Off] Mastering Reverse Engineering &Amp; Malware Analysis | Remasm+

    What youā€™ll learn The theory behind disassembly and its role in reverse engineering. The four stages of binary analysis: Preprocessing, Compilation, Assembly, and Linking. The compilation process breakdown and the purpose of each phase. Working with symbolic information in stripped and not...
  32. f3d0m43ver

    Reversing secrets of reverse engineering (Eldad Eilam) - EPUB

    Reversing secrets of reverse engineering (Eldad Eilam) - EPUB Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with...
  33. f3d0m43ver

    Practical reverse engineering x86, x64, ARM, Windows Kernel - PDF

    Practical reverse engineering x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation by Bruce Dang, Alexandre Gazet, Elias Bachaalany, SĆ©bastien Josse - PDF Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or...
  34. jain

    OTUS Reverse Engineering professional

    https://mega.nz/file/QpZnXSKB#hxnLKW8TV1yhAs6ipEAl-6JHV91vrhnjRPdZb1SWtsI šŸ“‚ File password : server_z
  35. carxproveteran

    Mastering x86-64 Real Assembly Language from Zero | 2023ASM+ āœØšŸ‘ŒāœØāœØ

    Mastering x86-64 Real Assembly Language from Zero | 2023ASM+ Every Code is Open Source if you know ASSEMBLY Programming | Reverse Engineering, Ethical Hacking, Windows, Linux, MP... What you'll learn Write efficient x86-64 assembly programs. Use NASM assembler for optimal coding. Analyze and...
  36. tentradox

    Brute  Reverse IP for cracking

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. Hemanth

    Learn Ethical Hacking & Reverse Engineering

    Link: https://www.udemy.com/course/ethical-hacking-hacking-real-websites/?couponCode=DEC2_FREE Happy Learning Guy's šŸ¤—
  38. lestersmith777999

    DECRYPTING OBJECT X AES CIPHER BY REVERSE ENGINEERING

    DECRYPTING OBJECT X AES CIPHER BY REVERSE ENGINEERING The complexity of implementing an AES vector initialization checker with all these specific conditions in Assembly and Ruby is considerable for a chat environment. Here is a very simple example in Ruby that checks the sequential nature of a...
  39. Hemanth

    šŸ„¶Reverse Engineering & Malware Analysis in 21 Hours | REMAC+

    Link : https://www.udemy.com/course/reverse_engineering/?couponCode=OCSALY-YOUTUBE-1M Just Click and Enroll and Happy Learning Dudes...šŸ¤—
  40. Hemanth

    šŸ”„Ethical Hacking: Reverse Shells

    Link: https://www.udemy.com/course/ethical-hacking-reverse-shells/?couponCode=HBDINDIRA Just Click and Enroll and Happy Learning Dudes...šŸ¤—
  41. carxproveteran

    Ethical Hacking: Reverse Shells

    Ethical Hacking: Reverse Shells Hack Windows and Linux boxes What you'll learn Hack Windows computers Hack Linux computers Use shells Create Malicious Executables *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  42. smike

    Assembly Language Programming for Reverse Engineering

    Course Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. smike

    p

    Course Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. rarara007

    Course/Tutorial  [ebook][pdf, epub] Practical Binary Analysis | $35 |

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. sokerino89

    Brute  Seed Bruteforce Metamask - Could someone reverse engineer it for us?

    Leave link here: https://github.com/kida-grams/Crypto-Wallet-Cracker-Stealer-2023
  46. carxproveteran

    Game Hacking: Cheat Engine Game Hacking Basics

    Game Hacking: Cheat Engine Game Hacking Basics Introduction to reverse engineering and memory hacking using Cheat Engine What you'll learn How to get started with Cheat Engine How to hack a process memory Finding variables and pointers in memory Using data structures to hack health and ammo...
  47. carxproveteran

    Learn Ethical Hacking & Reverse Engineering

    Learn Ethical Hacking & Reverse Engineering Fun way to learn Ethical Hacking & Reverse Engineering by hacking real practice websites & reversing CrackMe's What you'll learn Web Hacking Website defacement Tampering Cookies Hacking Admin Passwords Hack Bank Accounts to Transfer Money Stealing...
  48. SxxNGx

    Reverse Engineering and Memory Hacking

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. MulaBhai

    āœ…REVERSE SHELL CHEAT-SHEET TOOLāœ…

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. ITSUKI69

    Malware Reverse Engineering Course

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom