Back to Browse

x64dbg Reversing a Jump Tutorial | Breakpoints, Zero Flag, Binary Patching & Cracking Basics

499 views
Apr 4, 2026
10:15

In this video, we explore a simple yet powerful reverse engineering technique using x64dbg to manipulate program flow by modifying CPU flags. Specifically, we demonstrate how to bypass or reverse a conditional jump (JZ/JNZ) by toggling the Zero Flag (ZF) in an x86/x64 application. This is a common trick used in debugging, crackme challenges, and binary analysis. 🔍 What you’ll learn: ⭐ How conditional jumps (JZ / JNZ) depend on CPU flags ⭐ Role of the Zero Flag (ZF) in branching ⭐ Using x64dbg to inspect and modify flags in real-time ⭐ Forcing execution paths without patching the binary 💡 This technique is extremely useful for: ⭐ Reverse engineering beginners ⭐ Crackme / CTF challenges ⭐ Understanding low-level program flow ⭐ Debugging tricky conditions ⚠️ Disclaimer: This content is for educational purposes only. Challenge Link: https://crackmes.one/crackme/5d63011533c5d46f00e2c305 #x64dbg #reverseengineering #debugging #x86 #x64 #assembly #zeroflag #zf #conditionaljump #jz #jnz #binaryanalysis #crackme #ctf #malwareanalysis #lowlevel #hacking #debugger #assemblytutorial #programflow SnatchDreams - Its Insane Here !! Github: https://github.com/paulpjoby

Download

1 formats

Video Formats

360pmp413.1 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

x64dbg Reversing a Jump Tutorial | Breakpoints, Zero Flag, Binary Patching & Cracking Basics | NatokHD