Only best and comprehensive OllyDbg tutorial in CHM, HD PDF and DOC

This article along with all titles and tags are the original content of AppNee. All rights reserved. To repost or reproduce, you must add an explicit footnote along with the URL to this article!
Any manual or automated whole-website collecting/crawling behaviors are strictly prohibited.
Any resources shared on AppNee are limited to personal study and research only, any form of commercial behaviors are strictly prohibited. Otherwise, you may receive a variety of copyright complaints and have to deal with them by yourself.
Before using (especially downloading) any resources shared by AppNee, please first go to read our F.A.Q. page more or less. Otherwise, please bear all the consequences by yourself.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Ads Place

Introduction to Cracking with OllyDbg from Scratch (Spanish: INTRODUCCION AL CRACKING CON OLLYDBG DESDE CERO) was written by Ricardo Narvaja (belongs to the mailing list CrackSLatinoS) from Spanish, who has written more than 2100+ tutorials about SoftICE (old course on Windows 98) and OllyDbg (new course on Windows XP). Believe us, it is the only most perfect, amazing tutorial about OllyDbg you can find on the whole Internet.

This tutorial is specially written for those who want to master the art of software cracking using OllyDbg, providing all the necessary basic and associative knowledge. With these basics, you can read and understand other more advanced tutorials and theory. More exciting, this series of tutorial still constantly adds new content (as of this writing, in addition to the 500+ tutorials in this series, the new additional tutorials written by Ricardo Narvaja have been more than 1600 articles). That means after finishing this course, any reader will not only lay a solid foundation, but also has enough ability to learn, read increasingly complex related materials.

Notes: for many beginners, you might feel this tutorial is too complex, because most of them may fail to meet the capability requirements required for the course studying, which makes them feel difficult to continue. But please remember one thins, as long as paying some more patience, you will not be disappointed and benefit a lot in the end.

Here for everyone, AppNee collected and divided all OllyDbg tutorials in the series of Introduction to Cracking with OllyDbg from Scratch into multiple groups according to 4 languages and 3 kinds of file formats. Just hope they can maximize the convenience for guys who need them.

Finally, thanks to the great contribution for the important part of the Internet made by Ricardo Narvaja and CrackSLatinoS group, so we has benefited greatly from their great works for free.

*** CrackSLatinoS: a group of friends that like to teach, learn and practice their beloved art of reverse engineering for non-profit, out of curiosity and desire to share, always try to help starters, to fend for themselves in the cracking road.

// Table of Contents //

  • PART 001 – KNOWING Ollydbg – INSTALLATION
  • PART 002 – Number Systems – positive numbers – NEGATIVE – ASCII – THAT IS THE STACK
  • PART 003 – RECORDS AND FLAGS
  • PART 004 – ASSEMBLER INSTRUCTIONS – NOP, PUSH, POP, PUSHAD, POPAD, MOV, movsx, MOVZX, LEA, xchg,
  • PART 005 – MATHEMATICS INSTRUCTIONS – INC, DEC, ADD, ADC, SUB, SBB, MUL, IMUL, DIV, IDIV, xadd, NEG
    LOGIC INSTRUCTIONS – AND, XOR, OR, NOT –
  • PART 006 – INSTRUCTIONS – COMPARISONS AND CONDITIONAL JUMPS
  • PART 007 – INSTRUCTIONS – CALL AND RET
  • PART 008 – INSTRUCTIONS FOR LOOPS OR CYCLES (LOOP)
  • PART 009 – FIRST APPROACH TO CRACKING – crackme OF CRUEHEAD
  • PART 010 – Breakpoints – COMMON BP, ON MEMORY
  • PART 011 – Breakpoints – Breakpoints HARDWARE – BP CONDITIONAL
  • PART 012 – Windows messages – BP STANDING IN WINDOWS MESSAGES
  • PART 013 – REVERSING AND SERIAL PEZCANDO
  • PART 014 – REVERSING AND SERIAL PEZCANDO – HARCODED SERIALS
  • PART 015 – REVERSING AND SERIAL PEZCANDO – HARCODED SERIALS
  • PART 016 – REVERSING AND SERIAL PEZCANDO – HARCODED SERIALS
  • PART 017 – REVERSING AND SERIAL PEZCANDO – HARCODED SERIALS – LOOKING FOR SERIAL IN MEMORY (WHEN WE HAVE BUTTON CHECK)
  • PART 018 – REVERSING AND SERIAL PEZCANDO – LOOKING FOR SERIAL IN MEMORY (WHEN WE HAVE BUTTON CHECK)
  • PART 019 – PROTECTION ANTIDEBUGGER – how to avoid manually with plugins – api: IsDebuggerPresent –
  • PART 020 – PROTECTION ANTIDEBUGGER – how to avoid manually with plugins – NAME OF PROCESS – api: EnumProcesses
  • PART 021 – PROTECTION ANTIDEBUGGER – how to avoid manually with plugins – PROCESS BY NAME – by name or window class – api: CreateToolhelp32Snapshot, Process32First, Process32Next, FindWindowA
  • PART 022 – PROTECTION ANTIDEBUGGER – how to avoid manually with plugins – apis: UnhandeldExceptionFilter – ZwQueryInformationProcess
  • PART 023 – PROTECTION ANTIDEBUGGER – how to avoid manually with plugins – ProcessHeapFlag and NTGlobalFlag
  • PART 024 – PROTECTION ANTIDEBUGGER – Solving the Antisocial Part 23
  • PART 025 – EXCEPTIONS
  • PART 026 – Crackeando VISUAL BASIC – NAGS
  • PART 027 – Crackeando VISUAL BASIC – NAGS, METHOD 4C
  • PART 028 – Crackeando VISUAL BASIC – GRAFT IN DLL (AMENDED)
  • PART 029 – Crackeando VISUAL BASIC – P-CODE
  • PART 030 – Crackeando VISUAL BASIC – Part 2 P-CODE
  • PART 031 – UNPACKING – Definitions BASIC
  • PART 032 – UNPACKING – SEARCH OPCODES, Olly FINDER EPO, PUSHADD METHOD, METHOD EXCEPTIONS, widely used API method, METO EXECUTED FIRST API
  • PART 033 – UNPACKING – IS IAT and how to repair
  • PART 034 – UNPACKING – using PE TOOLS, ImpREC
  • PART 035 – UNPACKING – WITH OllyDump, ImpREC (EXAMPLE ASPACK)
  • PART 036 – UNPACKING – WITH OllyDump, ImpREC (OTHER PRACTICAL EXERCISE)
  • PART 037 – UNPACKING – REPAIR redirected TICKETS
  • PART 038 – UNPACKING – REPAIR redirected TICKETS
  • PART 039 – STOLEN BYTES AND SCRIPTS
  • PART 040 – SCRIPTS (UNPACKING THE PELock)
  • PART 041 – SCRIPTS (CONT UNPACKING THE PELock.)
  • PART 042 – UNPACKING – STOLEN BYTES (ACPROTECT 1.09)
  • PART 043 – UNPACKING – REPAIR STOLEN BYTES (ACPROTECT 1.09)
  • PART 044 – UNPACKING – REPAIR IAT – SCRIPTS (ACPROTECT 1.09)
  • PART 045 – UNPACKING – REPAIR IAT – DUMPEADO (ACPROTECT 1.09)
  • PART 046 – UNPACKING – FATMIKE
  • PART 047 – UNPACKING – FATMIKE (Part 2)
  • PART 048 – UNPACKING – 1,304 PESpin
  • PART 049 – UNPACKING – REPAIR IAT – PESpin 1,304 (Part 2)
  • PART 050 – UNPACKING – ANOTHER EXAMPLE
  • PART 051 – UNPACKING – Asprotect
  • PART 052 – UNPACKING – Asprotect (CONTINUED)
  • PART 053 – UNPACKING – Asprotect (CONTINUED)
  • PART 054 – UNPACKING – EXECryptor
  • PART 055 – UNPACKING – EXECryptor (CONTINUED) – IAT SCRIPT TO REPAIR
  • PART 056-EXECryptor v2.2.50.b unshelling
  • PART 057-EXECryptor v2.2.50.c/d/e/f/g unshelling
  • PART 058-EXECryptor v2.2.50.h unshelling

// Book Example Codes //

// Related Links //

// Download URLs //

Language Format Download Size
Spanish CHM reserved 99.2 MB
PDF reserved 39.8 MB
DOC reserved 49.3 MB
English PDF 65.3 MB
Portuguese PDF reserved 32.1 MB
Chinese CHM reserved 144 MB
DOC reserved 59 MB

(Homepage | WEB Home | Translated)

If some download link is missing, and you do need it, just please send an email (along with post link and missing link) to remind us to reupload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be "appnee.com".
Most of the reserved downloads (including the 32-bit version) can be requested to reupload via email.