A series of easy software examples to demonstrate the use of x64dbg.
- assem_series: Simple "Hello World!" samples to show the similarities between what is written in Assembly Code versus what is seen in x64dbg
- main_series: Small grouping of samples to show how DLLs are loaded and how DLLs are seen (and dumped) in x64dbg
- func_0x01: Example of using Ghidra side-by-side to assist in naming function is x64dbg
- crackme_series: Ten crackme challenges from Shogun Labs to test x64dbg skills
- https://www.ired.team/offensive-security/code-injection-process-injection/process-injection
- https://www.ired.team/offensive-security/code-injection-process-injection/dll-injection
- https://blog.didierstevens.com/2017/09/08/quickpost-dlldemo/
- http://blog.opensecurityresearch.com/2013/01/windows-dll-injection-basics.html