diff --git a/_posts/2018-08-21-hypervisor-from-scratch-part-1.md b/_posts/2018-08-21-hypervisor-from-scratch-part-1.md index c7a20f6b..03cbec51 100644 --- a/_posts/2018-08-21-hypervisor-from-scratch-part-1.md +++ b/_posts/2018-08-21-hypervisor-from-scratch-part-1.md @@ -27,7 +27,7 @@ author: ![](../../assets/images/hypervisor-from-scratch-1-cover.png) -**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications.** +**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications. A free and comprehensive tutorial on hypervisor-based reverse engineering is available at [OpenSecurityTraining2's website](https://ost2.fyi/dbg3301) (_preferred_) and [YouTube](https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY), which demonstrates numerous practical examples on how to utilize hypervisors for reverse engineering.** **Notice**: The _**Hypervisor From Scratch**_ tutorial is completely revised in **August 2022**. Codes from all parts are updated, unnecessary details are removed, and new explanations and materials are added to the tutorial. diff --git a/_posts/2018-09-03-hypervisor-from-scratch-part-2.md b/_posts/2018-09-03-hypervisor-from-scratch-part-2.md index 67cb7673..b309dc24 100644 --- a/_posts/2018-09-03-hypervisor-from-scratch-part-2.md +++ b/_posts/2018-09-03-hypervisor-from-scratch-part-2.md @@ -24,7 +24,7 @@ author: ![](../../assets/images/hypervisor-from-scratch-2-cover.png) -**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications.** +**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications. A free and comprehensive tutorial on hypervisor-based reverse engineering is available at [OpenSecurityTraining2's website](https://ost2.fyi/dbg3301) (_preferred_) and [YouTube](https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY), which demonstrates numerous practical examples on how to utilize hypervisors for reverse engineering.** ## **Introduction** diff --git a/_posts/2018-09-15-hypervisor-from-scratch-part-3.md b/_posts/2018-09-15-hypervisor-from-scratch-part-3.md index 6a508cfd..944d5e4a 100644 --- a/_posts/2018-09-15-hypervisor-from-scratch-part-3.md +++ b/_posts/2018-09-15-hypervisor-from-scratch-part-3.md @@ -29,7 +29,7 @@ author: ![](../../assets/images/hypervisor-from-scratch-3-cover.png) -**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications.** +**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications. A free and comprehensive tutorial on hypervisor-based reverse engineering is available at [OpenSecurityTraining2's website](https://ost2.fyi/dbg3301) (_preferred_) and [YouTube](https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY), which demonstrates numerous practical examples on how to utilize hypervisors for reverse engineering.** ## **Introduction** diff --git a/_posts/2018-10-05-hypervisor-from-scratch-part-4.md b/_posts/2018-10-05-hypervisor-from-scratch-part-4.md index b0e1c894..3651746e 100644 --- a/_posts/2018-10-05-hypervisor-from-scratch-part-4.md +++ b/_posts/2018-10-05-hypervisor-from-scratch-part-4.md @@ -31,7 +31,7 @@ author: ![](../../assets/images/hypervisor-from-scratch-4-cover.png) -**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications.** +**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications. A free and comprehensive tutorial on hypervisor-based reverse engineering is available at [OpenSecurityTraining2's website](https://ost2.fyi/dbg3301) (_preferred_) and [YouTube](https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY), which demonstrates numerous practical examples on how to utilize hypervisors for reverse engineering.** ## **Introduction** diff --git a/_posts/2018-12-16-hypervisor-from-scratch-part-5.md b/_posts/2018-12-16-hypervisor-from-scratch-part-5.md index a8f6ac63..fc1eb283 100644 --- a/_posts/2018-12-16-hypervisor-from-scratch-part-5.md +++ b/_posts/2018-12-16-hypervisor-from-scratch-part-5.md @@ -26,7 +26,7 @@ author: ![](../../assets/images/hypervisor-from-scratch-part-5-cover.png) -**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications.** +**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications. A free and comprehensive tutorial on hypervisor-based reverse engineering is available at [OpenSecurityTraining2's website](https://ost2.fyi/dbg3301) (_preferred_) and [YouTube](https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY), which demonstrates numerous practical examples on how to utilize hypervisors for reverse engineering.** ## **Introduction** diff --git a/_posts/2019-02-25-hypervisor-from-scratch-part-6.md b/_posts/2019-02-25-hypervisor-from-scratch-part-6.md index bc3d1008..b65b4c1b 100644 --- a/_posts/2019-02-25-hypervisor-from-scratch-part-6.md +++ b/_posts/2019-02-25-hypervisor-from-scratch-part-6.md @@ -25,7 +25,7 @@ author: ![](../../assets/images/hypervisor-from-scratch-6-cover.png) -**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications.** +**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications. A free and comprehensive tutorial on hypervisor-based reverse engineering is available at [OpenSecurityTraining2's website](https://ost2.fyi/dbg3301) (_preferred_) and [YouTube](https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY), which demonstrates numerous practical examples on how to utilize hypervisors for reverse engineering.** ## Introduction diff --git a/_posts/2020-01-20-hypervisor-from-scratch-part-7.md b/_posts/2020-01-20-hypervisor-from-scratch-part-7.md index 5b64b338..df03a09e 100644 --- a/_posts/2020-01-20-hypervisor-from-scratch-part-7.md +++ b/_posts/2020-01-20-hypervisor-from-scratch-part-7.md @@ -34,7 +34,7 @@ author: ![](../../assets/images/hypervisor-from-scratch-7-cover.png) -**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications.** +**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications. A free and comprehensive tutorial on hypervisor-based reverse engineering is available at [OpenSecurityTraining2's website](https://ost2.fyi/dbg3301) (_preferred_) and [YouTube](https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY), which demonstrates numerous practical examples on how to utilize hypervisors for reverse engineering.** ## **Introduction** diff --git a/_posts/2020-03-24-hypervisor-from-scratch-part-8.md b/_posts/2020-03-24-hypervisor-from-scratch-part-8.md index 596dab4c..4f6fa844 100644 --- a/_posts/2020-03-24-hypervisor-from-scratch-part-8.md +++ b/_posts/2020-03-24-hypervisor-from-scratch-part-8.md @@ -32,7 +32,7 @@ author: ![](../../assets/images/hypervisor-from-scratch-8-cover.png) -**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications.** +**If you're looking to use a hypervisor for analysis and reverse engineering tasks, check out [HyperDbg](https://github.com/HyperDbg/HyperDbg) Debugger. It's a hypervisor-based debugger designed specifically for analyzing, fuzzing, and reversing applications. A free and comprehensive tutorial on hypervisor-based reverse engineering is available at [OpenSecurityTraining2's website](https://ost2.fyi/dbg3301) (_preferred_) and [YouTube](https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY), which demonstrates numerous practical examples on how to utilize hypervisors for reverse engineering.** ## **Introduction**