How to Use x64dbg for Static Analysis
Learn how to use x64dbg for graphical static analysis and reverse engineering. Disassemble programs, trace code execution, modify behavior, and patch software—all within a powerful debugger ideal for malware analysis and binary inspection.
What You’ll Learn
This How to Use x64dbg for Static Analysis will teach you:
- How to use x64dbg: Disassemble and analyze programs visually.
- Set breakpoints: Pause execution at key locations and trace step-by-step.
- Patch programs: Alter binaries directly using the x64dbg interface.
- Reverse engineering: Explore file structure, CPU registers, and mapped memory.
- Graphical static analysis: Understand program flow with graph views.
- Modify behavior: Change values, reverse jumps, and adjust flags.
- xAnalyzer plugin: Set up and enhance static analysis capabilities.
- 64-bit crackme: Solve examples and practice with real executable challenges.
Included in the How to Use x64dbg
Suitable for the Following Careers
Course Content
Section 1: Introduction
Section 2: Introduction to Static Analysis
Section 3: Installing x64dbg and xAnalyzer plugin and using it
Section 4: Graphical Static analysis
Section 5: Practice on graphical static analysis and file patching
Section 6: Static analysis on 64-bit programs
Section 7: Resources for further studies
Audio Version of Training
OPEN FULL CURRICULUM
Requirements
Description of How to Use x64dbg for Static Analysis
This hands-on course teaches you how to use x64dbg for static analysis and reverse engineering. While many tools offer disassembly, x64dbg stands out with its powerful graphical interface and ability to show control flow, registers, memory layout, and file headers. You’ll explore how to use x64dbg to inspect file offsets, analyze the current module, follow arguments, and perform changes to executable behavior—step-by-step.
From installing x64dbg and the xAnalyzer plugin to practicing on real 64-bit crackme examples, you'll develop a strong grasp of how to navigate a program’s structure using addresses, hex views, and commands. You’ll also learn how to set breakpoints, inspect function calls, view the stack and CPU activity, and ultimately write patches or modify DLL behavior. With a strong focus on reverse engineering, security, and debugging, this course is ideal for anyone who wants to begin analyzing binaries the professional way.
- Disassemble EXE files and view program structure with graphical tools
- Trace execution paths and understand function entry and file headers
- Modify registers, patch code, and adjust control flow logic
- Use the command bar and CPU pane to search and interact with data
- Practice solving real-world challenges using mapped memory and flags
- Explore Windows processes, modules, and error points in active programs
- Develop the skills to perform reverse engineering confidently and efficiently
Mastering this course means you'll be able to work within x64dbg's CPU space, track execution hits, convert code for analysis, and save key findings. You'll gain the skills to perform static analysis, reverse engineer software, and debug with clarity.
Who Is This Course For
This course is ideal for developers, students, and security professionals interested in reverse engineering, static analysis, or debugging. Whether you're exploring malware behavior, modifying EXE files, or learning how programs work at a low level, x64dbg is the perfect free tool to begin.
Course Instructor
Paul Chin is a semi-retired college lecturer with over 20 years of experience in teaching computing and information technology. His interests span reverse engineering, coding, graphics design, app and game development, music, health, spirituality, and well-being. In his spare time, Paul enjoys playing the piano and keyboard.
Paul is passionate about teaching both face-to-face and online, aiming to educate and inspire others to succeed and live their dreams. His course topics include reverse engineering with tools like dnSpy, Cutter, and x64dbg, WiFi hacking, C programming, HTML, JavaScript, and VR game development.
Read More
Read Less
Testimonials
Abhijith P R.
I attended this session just to recall/refresh all basic stuff on application analysis, based on my past practical experience. Really good for beginners. Definitely a starting point for analysis.
It would be good if instructor can share more info on different type of analyzers exists, some basic info on code obfuscation and the purpose of why we do this in real world.
Ben B.
I've completed this plus a few of the instructor's other courses now, and I am a big fan of his teaching style. He has sent me down quite the reverse engineering rabbit hole, and it has been a very enjoyable learning experience.
Nicholas B.
Yet another great course! You finally made me realize the importance of the graphical interface in debuggers. My first ever experiments with RE involved trying to use IDA, and boy was that a disaster. I finally understand the importance of the graphical interface of a debugger. Besides that, once again another very straightforward, engaging course. Material is organized and easily explained. Beginner-friendly lessons with a sense of determination to complete the assignments.
Show More
Show Less