<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>&#xFF28;&#xFF49;&#xFF44;&#xFF45;&#xFF3A;&#xFF45;&#xFF52;&#xFF4F;&#xFF2F;&#xFF4E;&#xFF45;</provider_name><provider_url>https://hide01.ir</provider_url><title>&#x62F;&#x648;&#x631;&#x647; Pentester Academy - Reverse Engineering Win32 Applications</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="eLc6wHj8Jm"&gt;&lt;a href="https://hide01.ir/pa-reverse-engineering-win32-applications/"&gt;&#x62F;&#x648;&#x631;&#x647; Pentester Academy &#x2013; Reverse Engineering Win32 Applications&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://hide01.ir/pa-reverse-engineering-win32-applications/embed/#?secret=eLc6wHj8Jm" width="600" height="338" title="&#x201C;&#x62F;&#x648;&#x631;&#x647; Pentester Academy &#x2013; Reverse Engineering Win32 Applications&#x201D; &#x2014; &#xFF28;&#xFF49;&#xFF44;&#xFF45;&#xFF3A;&#xFF45;&#xFF52;&#xFF4F;&#xFF2F;&#xFF4E;&#xFF45;" data-secret="eLc6wHj8Jm" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://hide01.ir/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://hide01.ir/wp-content/uploads/2024/07/win32.png</thumbnail_url><thumbnail_width>375</thumbnail_width><thumbnail_height>375</thumbnail_height><description>This course will familiarize students with all aspects of reverse engineering (reversing) Windows 32-bit applications for the purposes of locating flaws and developing exploits. By the end of this course students will be able to understand, locate, and exploit all of the common flows in 32-bit Windows software. These flaws include, but are not limited [&hellip;]</description></oembed>
