磁力管家

磁力管家
为您索检到1456条磁力链接,耗时1毫秒。 rss

分享给好友

【压缩文件】 [ FreeCourseWeb.com ] Introduction to Malware Analysis.zip
收录时间:2024-07-31 文档个数:1 文档大小:362.8 MB 最近下载:2025-05-16 人气:288 磁力链接
  • zip[ FreeCourseWeb.com ] Introduction to Malware Analysis.zip 362.8 MB
【安装包】 RogueKiller Anti-Malware 15.16.0.0 + Portable
收录时间:2024-04-12 文档个数:3 文档大小:113.0 MB 最近下载:2025-05-16 人气:4140 磁力链接
  • exeRogueKiller_setup.exe 48.4 MB
  • exeRogueKiller_portable64.exe 36.2 MB
  • exeRogueKiller_portable32.exe 28.3 MB
【安装包】 GridinSoft Anti-Malware 4.1.53.4986 RePack & Portable by 9649
收录时间:2021-03-08 文档个数:5 文档大小:90.8 MB 最近下载:2025-05-16 人气:598 磁力链接
  • exeGridinsoft Anti-Malware 4.1.53.exe 90.8 MB
  • cmdАнглийская portable.cmd 89 Bytes
  • cmdРусская portable.cmd 89 Bytes
  • cmdАнглийская обычная.cmd 84 Bytes
  • cmdРусская обычная.cmd 84 Bytes
【压缩文件】 How Hackers Create Undetectable Malware and Viruses
收录时间:2018-07-06 文档个数:4 文档大小:267.4 MB 最近下载:2025-05-16 人气:5187 磁力链接
  • txtTutsGalaxy.com.txt 41 Bytes
  • txtTorrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt 59 Bytes
  • txtRead Me.txt 80 Bytes
  • zipHow Hackers Create Undetectable Malware and Viruses.zip 267.4 MB
【影视】 Reverse Engineering and Malware Analysis in 21 Hours REMAC+
收录时间:2024-06-30 文档个数:239 文档大小:9.7 GB 最近下载:2025-05-16 人气:3916 磁力链接
  • mp48. Windows - PE Format/1. Learning Windows PE Format.mp4 206.8 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4 164.3 MB
  • mp47. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4 163.0 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/9. Developing InsertHead, InsertTail and Insert Methods.mp4 155.9 MB
  • mp47. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 154.3 MB
  • mp413. Permissions/5. After this video you'll understand all LINUX Permissions.mp4 147.8 MB
  • mp47. Linux - ELF Format/2. Learning ELF Fields.mp4 135.0 MB
  • mp415. C++ for Reverse Engineering - Section 1/12. Scoping Variables and Static Keyword.mp4 132.6 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4 127.5 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/4. Testing ADT List.mp4 127.2 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/11. Removing Items.mp4 126.3 MB
  • mp422. Data Structures in CC++/9. Class Templates in CPP.mp4 122.4 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4 122.3 MB
  • mp417. How Conditional Statements work Reverse Engineering and C/2. Conditional Statements in CPP.mp4 115.4 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4 112.0 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4 108.8 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4 108.2 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/5. Node and Chaining Example.mp4 107.9 MB
  • mp422. Data Structures in CC++/2. Creating Random Card Generator Using Enum and rand.mp4 107.7 MB
  • mp419. Introduction to Pointers/1. Pointers in CPP.mp4 104.6 MB
【影视】 [FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+
收录时间:2024-01-03 文档个数:254 文档大小:9.7 GB 最近下载:2025-05-16 人气:9055 磁力链接
  • mp48. Windows - PE Format/1. Learning Windows PE Format.mp4 206.8 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4 164.3 MB
  • mp47. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4 163.0 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/9. Developing InsertHead, InsertTail and Insert Methods.mp4 155.9 MB
  • mp47. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 154.3 MB
  • mp413. Permissions/5. After this video you'll understand all LINUX Permissions.mp4 147.8 MB
  • mp47. Linux - ELF Format/2. Learning ELF Fields.mp4 135.0 MB
  • mp415. C++ for Reverse Engineering - Section 1/12. Scoping Variables and Static Keyword.mp4 132.6 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4 127.5 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/4. Testing ADT List.mp4 127.2 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/11. Removing Items.mp4 126.3 MB
  • mp422. Data Structures in CC++/9. Class Templates in CPP.mp4 122.4 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4 122.3 MB
  • mp417. How Conditional Statements work Reverse Engineering and C/2. Conditional Statements in CPP.mp4 115.4 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4 112.0 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4 108.8 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4 108.2 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/5. Node and Chaining Example.mp4 107.9 MB
  • mp422. Data Structures in CC++/2. Creating Random Card Generator Using Enum and rand.mp4 107.7 MB
  • mp419. Introduction to Pointers/1. Pointers in CPP.mp4 104.6 MB
【压缩文件】 ATM Malware
收录时间:2024-07-12 文档个数:285 文档大小:667.2 MB 最近下载:2025-05-16 人气:7062 磁力链接
  • zipEMV Malware/5ccaeb149d0311f9820d40956d36959b8d223ebbda6b3394c683c9a6c6a1ec78.zip 44.7 MB
  • zipEMV Malware/9ca464e277596f3bfb99a32cd6db4a3f8e751c0b2805ff05390ee4ecb2fefd36.zip 43.6 MB
  • zipEMV Malware/f198b82c1eaf19e0d080d4e058619f49a200c4966be5c792215a988e6472a452.zip 43.6 MB
  • zipEMV Malware/93214d9c664ca7b445a2a841b6112eb853d25109e76a81793f583209e08da03c.zip 35.2 MB
  • 7zATM Malware/d4a463c135d17239047ad4151ab2f2d084e223970e900904ecedabc0fd916545.zip.7z 24.1 MB
  • zipEMV Malware/cf4ac1badfd87b60e9e81987a9959a18a6791c9ba5070e7980efd624dc75bc38.zip 23.7 MB
  • zipEMV Malware/2d74fae5d29f1cd8bb9a95414a44a4b0ed8729d7cd8644312a7ca559b1fc5a0a.zip 15.2 MB
  • zipEMV Malware/6cb6a3e75965ebacf1f6d72096a90e9d80be6d1c9d6ebd7dd9453992140a9d5c.zip 14.4 MB
  • zipEMV Malware/33efa5660d2e5ede1d38016dd4ee737e99d77a9afe38703012e3e06d7ea05b36.zip 12.7 MB
  • zipEMV Malware/8a9980942f9ff630f0398b3dcd2a411987af9a769f91d1e96f9c880db65fd7cb.zip 8.7 MB
  • zipEMV Malware/0b6fc7b1ffd0dad8550b8cb8e1d182bc1cb60bf983f67e896b26b4df1b479919.zip 8.4 MB
  • zipEMV Malware/965547e45fd4964ae19dedcadf70cfc4201a0b949e2be3ae35b45e88b867b1b9.zip 8.4 MB
  • zipEMV Malware/a75415c8b085247e59ed34efed3fb9b4f250bf331af816558521886416dc9f64.zip 8.4 MB
  • zipEMV Malware/f1073b97ef17fbda139e883aa234e843359a71fe80a4d2389d129ec80511ad8f.zip 8.3 MB
  • zipEMV Malware/73b7f65be1873b03300f370b7da2ae695ac47ed028fdabb726d46d6787593d09.zip 8.3 MB
  • zipEMV Malware/ce9468d43785fb9c8fc4c007d89312fb1dc5afcb495ef6d4c1cd2b4a5347c9c5.zip 8.3 MB
  • zipEMV Malware/ce8714dcf9abf17bfc7781cd48502c5c9edf40c9b6aefbd7bcac17e4aa289859.zip 8.3 MB
  • zipEMV Malware/0dd2f67eebadeb44160412e8ff67991551f27c8801fad381f2261df9288188a7.zip 8.3 MB
  • zipEMV Malware/1a488d456efb1ce742ecc24ebadc46a262c751cbec58e673087c25581134b5bf.zip 8.3 MB
  • zipEMV Malware/06a284b3ac5d648edf2fc7c9053207046705bea1d88811898b2367ca4978ae39.zip 8.3 MB
【影视】 Malware Development and Reverse Engineering 1 The Basics
收录时间:2022-01-13 文档个数:235 文档大小:4.8 GB 最近下载:2025-05-16 人气:9055 磁力链接
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/05 Generating Shellcodes Using Metasploit in Kali Linux/001 Generating Shellcodes Using Metasploit in Kali Linux.mp4 193.3 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/27 Anti Virus Evasion/003 Evading Anti Virus Using Function Obfuscation and Parameter String Encryption.mp4 191.8 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/19 Process Injection/003 Process Injection - Part 1 - Explanation of APIs.mp4 169.6 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/23 Detecting and Reverse Engineering DLL Injection/001 Detect DLL Injection and Dump DLL Shellcode.mp4 166.8 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/02 Installing The Tools/002 Configuring the Virtual Machine.mp4 159.7 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/17 Trojan Engineering Using Code Caves/004 Trojanizing Crackme1 - Part 1.mp4 141.2 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/03 Building EXE and DLL and Examining PE Structure/001 Building EXE and DLL and Examining PE Structure.mp4 141.0 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/10 XOR Encryption of Payload/001 Intro To XOR Encryption.mp4 138.0 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/20 Detecting Process Injection and Reverse Engineering it/001 Detecting Process Injection and Reverse Engineering it.mp4 137.8 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/13 Reverse Engineering AES Encryption Using CryptDecrypt/001 Reverse Engineering AES Encryption Using CryptDecrypt API.mp4 125.1 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/09 Reverse Engineering Base64 Encoded Payloads/001 Reverse Engineering Base64 Encoded Payloads.mp4 122.0 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/06 Embedding Shellcode Payload in .RSRC Section and Analyzing with xdbg/002 Embedding Shellcode Payload in .RSRC Section and Analyzing with xdbg.mp4 121.2 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/04 Embedding Shellcode Payloads in EXE files/002 Embedding Shellcode Payload in .TEXT Section.mp4 115.7 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/04 Embedding Shellcode Payloads in EXE files/003 Embedding Shellcode Payload in .DATA Section.mp4 115.6 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/15 Obfuscating Functions Using GetProcAddress and XOR Encryption/002 Function Obfuscation Using GetProcAddress and XOR Encryption.mp4 115.4 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/08 Base64 Encoding of Shellcode Payload/001 Intro to Base64 Encoding of Shellcode Payload.mp4 115.3 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/22 DLL Injection/003 DLL Injection - Part 1 - Explanation of APIs, Building DLL and EXE files.mp4 114.7 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/15 Obfuscating Functions Using GetProcAddress and XOR Encryption/001 Intro to Function Obfuscation Using GetProcAddress API.mp4 112.6 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/27 Anti Virus Evasion/002 Installing Yara.mp4 108.8 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/04 Embedding Shellcode Payloads in EXE files/001 1-intro to embedding shellcode payload.mp4 102.3 MB
【文档书籍】 Malware book collection 1
收录时间:2017-02-14 文档个数:682 文档大小:655.1 MB 最近下载:2025-05-16 人气:1182 磁力链接
  • pdfComputer viruses - a high-tech desease.pdf 89.5 MB
  • pdfMalicious Cryptography - Exposing Cryptovirology.pdf 30.5 MB
  • pdfMalware Forensics Investigating and Analyzing Malicious Code.pdf 26.2 MB
  • pdfComputer Virus Survival Guide.pdf 26.1 MB
  • pdfMalware_ Von Viren, W+-rmern, Hackern und Trojanern und wie man sich vor ihnen sch+-tzt.pdf 22.6 MB
  • pdfLes virus informatiques_ th+йorie, pratique et applications.pdf 20.5 MB
  • pdfMalware Detection.pdf 19.4 MB
  • pdfDetection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008 Paris, France, July 10-11, 2008 Proceedings.pdf 14.7 MB
  • pdfComputer Viruses and Malware.pdf 11.3 MB
  • pdfPC Magazine Fighting Spyware Viruses and Malware.pdf 10.9 MB
  • chmCrimeware_ Understanding New Attacks and Defenses.chm 10.8 MB
  • pdfMalware Analyst's Cookbook and DVD.pdf 9.4 MB
  • pdfMobile Malware Attacks and Defense.pdf 7.1 MB
  • chmMalware_ Fighting Malicious Code.chm 6.7 MB
  • pdfIdentifying Malicious Code Through Reverse Engineering.pdf 6.5 MB
  • pdfOn self-reproducing computer programs.pdf 6.5 MB
  • pdfDisk-Level Behavioral Virus Detection.pdf 5.7 MB
  • pdfCryptography_ all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf 4.9 MB
  • pdfCOMPUTE!'s computer viruses.pdf 4.9 MB
  • pdfComputer virus immunization.pdf 4.7 MB
【影视】 Reverse Engineering and Malware Analysis x6432 CRMA+ 2022
收录时间:2022-04-26 文档个数:69 文档大小:5.0 GB 最近下载:2025-05-16 人气:7192 磁力链接
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/6. Linux for MA and RE - Process Management and User ENV/1. Process Management.mp4 350.7 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/7. Linux for MA and RE - Networking and Software Control/1. Linux Networking.mp4 350.6 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/5. Archive Files.mp4 302.2 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/3. Filesystem.mp4 296.1 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/4. Linux - Logging and Webserver files.mp4 249.5 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/7. Linux for MA and RE - Networking and Software Control/2. Linux - Software Control.mp4 237.1 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/6. Linux for MA and RE - Process Management and User ENV/2. User Enviroment Variables.mp4 229.5 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/8. Network Training for Reverse Engineering and Malware Analysis/2. Network Training for Reverse Engineering and Malware Analysis - Part 2.mp4 223.7 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/2. Beginning Linux Training.mp4 185.6 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/6. Files and Permissions.mp4 165.1 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/10. Reverse Engineering Software and Malware/2. High Level vs Machine code Reversing and Execution principle.mp4 162.7 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/4. Reverse Engineering and Assembly/2. Low Level Function execution and Stacks.mp4 162.6 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/10. Reverse Engineering Software and Malware/1. Introduction to RE and Assembly.mp4 152.6 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/4. Reverse Engineering and Assembly/1. CPU Instruction set & Registers.mp4 152.5 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/1. Introduction/1. What is Reverse Engineering.mp4 148.3 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/1. Introduction/2. What is Malware Analysis.mp4 148.1 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/8. Network Training for Reverse Engineering and Malware Analysis/1. Network Training for Reverse Engineering and Malware Analysis - Part 1.mp4 146.0 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/1. Installing Kali Linux.mp4 144.5 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/2. Firewalls and Security Terminologies/1. Cyber Security - Reverse Engineering and Malware Analysis.mp4 139.9 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/2. Firewalls and Security Terminologies/2. How Firewalls Works.mp4 124.2 MB
【压缩文件】 [FTUApps.com] - Glary Malware Hunter Pro v1.170.0.788 Multilingual Portable
收录时间:2023-12-19 文档个数:5 文档大小:110.4 MB 最近下载:2025-05-16 人气:2628 磁力链接
  • rarGlary Malware Hunter Pro v1.170.0.788 Multilingual Portable [FTUApps].rar 110.4 MB
  • url0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 Bytes
  • txtReadme.txt 370 Bytes
  • url0. Websites you may like/2. FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 Bytes
  • urlFTUApps.com Download Cracked Developers Applications For Free.url 239 Bytes
【压缩文件】 Malwarebytes Anti-Malware Premium 4.2.3.199.zip
收录时间:2021-03-17 文档个数:1 文档大小:197.8 MB 最近下载:2025-05-16 人气:752 磁力链接
  • zipMalwarebytes Anti-Malware Premium 4.2.3.199.zip 197.8 MB
【影视】 Fundamentals of Malware Analysis Of Malicious Documents
收录时间:2022-01-16 文档个数:149 文档大小:1.9 GB 最近下载:2025-05-16 人气:2634 磁力链接
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/02 Installing the Tools/002 Configuring Windows VM.mp4 159.7 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/10 Using Debuggers in Document Analysis/003 Lab_ A walkthrough on debugging a malicious office document.mp4 159.7 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/10 Using Debuggers in Document Analysis/002 Installing Lazy Office Analyzer.mp4 149.6 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/06 Performing Javascript Analysis/002 De-obfuscating Javascript.mp4 108.8 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/09 Performing VBA Script Analysis/002 VBA Script Analysis Walkthrough.mp4 108.2 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/07 Lab_ Pdf Analysis/002 Lab Exercise Walkthrough.mp4 85.0 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/06 Performing Javascript Analysis/001 Principles of Performing Javascript Analysis.mp4 82.9 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/02 Installing the Tools/001 Installing a Windows VM.mp4 81.4 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/05 Analyzing PDF Documents/006 Lab_ Using pdfid and pdf-parser.mp4 79.7 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/11 Lab_ Analyzing An Office Document/002 Lab Walkthrough_ Document Analysis.mp4 77.1 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/05 Analyzing PDF Documents/007 How to fix Yara Include File Error.mp4 72.2 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/09 Performing VBA Script Analysis/001 Principles of VBA Script Analysis.mp4 69.2 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/04 Intro to Static Analysis/001 Intro to Static Analysis and Lab on Analyzing a PDF document.mp4 62.8 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/08 Analyzing Office Documents/002 Lab - Analyzing Office Documents and Extracting VBA Macro Scripts.mp4 61.5 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/05 Analyzing PDF Documents/008 Lab_ Using peepdf.mp4 58.9 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/11 Lab_ Analyzing An Office Document/003 Lab Walkthrough_ Debugging A Malicious Office Document.mp4 55.8 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/01 Introduction/001 Intro to the course.mp4 53.3 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/05 Analyzing PDF Documents/004 String and Data Encoding.mp4 47.6 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/02 Installing the Tools/003 Installing Adobe Acrobat Reader and Microsoft Office 2013.mp4 40.4 MB
  • mp4[TutsNode.com] - Fundamentals of Malware Analysis Of Malicious Documents/03 Malware Analysis Process/001 Malware Analysis Process.mp4 39.2 MB
【影视】 Mastering Reverse Engineering & Malware Analysis REMASM+
收录时间:2023-12-20 文档个数:86 文档大小:5.1 GB 最近下载:2025-05-16 人气:12326 磁力链接
  • mp415. Memory Manipulation/2. Testing and Analyzing Project with Readelf and GDB.mp4 232.7 MB
  • mp415. Memory Manipulation/1. Project EXABYTE.mp4 211.4 MB
  • mp44. Windows - PE Format/1. Fundamentals of Windows PE Format.mp4 206.7 MB
  • mp45. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4 164.3 MB
  • mp43. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4 163.0 MB
  • mp43. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 154.3 MB
  • mp49. Debugging x86-64/2. Debugging and Finding Variables in Memory addresses.mp4 149.7 MB
  • mp410. Writing our second 64Bit Assembly Program/2. Analyzing Output with GDB and creating makefile.mp4 137.8 MB
  • mp43. Linux - ELF Format/2. Learning ELF Fields.mp4 135.1 MB
  • mp418. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4 127.5 MB
  • mp418. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4 122.4 MB
  • mp413. Jump and Loop/1. Using Conditions and Jumping.mp4 121.7 MB
  • mp49. Debugging x86-64/3. Learning more with GDB.mp4 115.3 MB
  • mp45. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4 111.7 MB
  • mp45. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4 108.9 MB
  • mp418. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4 108.2 MB
  • mp49. Debugging x86-64/1. Starting gdb and setting flavors.mp4 102.4 MB
  • mp412. Data Display Debugger - DDD/3. Using DDD and Analyzing RAX Values.mp4 101.0 MB
  • mp42. Binary Analysis/5. Linking Phase.mp4 98.5 MB
  • mp47. Writing our first 64Bit Assembly Program/1. Hello world with makefile.mp4 92.0 MB
【影视】 [FreeCourseSite.com] Udemy - Reverse Engineering, Debugging and Malware Analysis - 2021
收录时间:2021-06-21 文档个数:51 文档大小:3.9 GB 最近下载:2025-05-16 人气:1991 磁力链接
  • mp46. Software Exploitation/6. Stack Guards Bypass - Part 2.mp4 664.4 MB
  • mp46. Software Exploitation/4. Methods Exploitation.mp4 537.6 MB
  • mp46. Software Exploitation/7. Evil Server.mp4 523.5 MB
  • mp46. Software Exploitation/5. Stack Guards Bypass.mp4 405.3 MB
  • mp45. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.mp4 273.9 MB
  • mp46. Software Exploitation/3. Stack Reliability and GCC Example.mp4 190.3 MB
  • mp46. Software Exploitation/2. Low-Level View and Managing Stacks.mp4 184.7 MB
  • mp46. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.mp4 166.4 MB
  • mp44. Malware and Memory Analysis/1. Volatility Cridex.mp4 161.0 MB
  • mp44. Malware and Memory Analysis/3. Cridex Malware Analysis.mp4 161.0 MB
  • mp41. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.mp4 122.9 MB
  • mp44. Malware and Memory Analysis/2. Volatility R2D2.mp4 95.0 MB
  • mp41. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.mp4 73.4 MB
  • mp43. Malware Behavior/2. Malware Identification.mp4 63.2 MB
  • mp43. Malware Behavior/3. Presistence.mp4 47.9 MB
  • mp41. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.mp4 41.7 MB
  • mp43. Malware Behavior/1. Analysis Tools.mp4 36.4 MB
  • mp42. Operating System Components/4. Volatile Memory.mp4 36.0 MB
  • mp42. Operating System Components/2. Non-Volatile Memory.mp4 33.6 MB
  • mp42. Operating System Components/3. The Windows Registry.mp4 28.8 MB
【压缩文件】 [ FreeCourseWeb.com ] Udemy - Android Malware Analysis - From Zero to Hero.zip
收录时间:2022-02-13 文档个数:1 文档大小:732.0 MB 最近下载:2025-05-16 人气:1267 磁力链接
  • zip[ FreeCourseWeb.com ] Udemy - Android Malware Analysis - From Zero to Hero.zip 732.0 MB
【安装包】 Gridinsoft Anti-Malware 4.1.76.5140 incl patch [CrackingPatching]
收录时间:2021-03-10 文档个数:6 文档大小:150.9 MB 最近下载:2025-05-16 人气:822 磁力链接
  • exegsam-4.1.76-setup.exe 107.7 MB
  • zippatch.zip 43.2 MB
  • txtHow to Install.txt 3.5 kB
  • URLSupport Us CrackingPatching.com.URL 265 Bytes
  • URLLike Us Facebook.URL 257 Bytes
  • txtPassword is 123.txt 18 Bytes
【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics V5 - Ai and Chatgpt Mastery In Malware Analysis
收录时间:2024-04-25 文档个数:25 文档大小:1.8 GB 最近下载:2025-05-16 人气:3335 磁力链接
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/20 - Lab AI Trojan Attack Detection using Meta Neural Analysis.mp4 442.4 MB
  • mp4~Get Your Files Here !/4 - Encrypted Traffic Analysis Malware Detection Without Decryption/14 - Lab Malware Detection within Encrypted Traffic.mp4 331.1 MB
  • mp4~Get Your Files Here !/6 - AI in Malware Forensics Evaluation Trends and Future Directions/23 - Navigating the Horizon The Role of AI in Shaping the Future of Malware Analysis.mp4 143.3 MB
  • mp4~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/4 - Lab Implementing Autoencoders in Polymorphic Malware Analysis.mp4 137.8 MB
  • mp4~Get Your Files Here !/3 - Attribution Mastery Identifying the Origins of Malware Threats/11 - Lab Automating IoC Extraction with ChatGPT for Cybersecurity Analysis.mp4 65.6 MB
  • mp4~Get Your Files Here !/3 - Attribution Mastery Identifying the Origins of Malware Threats/10 - Lab Applying SVM for Attribution Modeling in Malware Analysis.mp4 64.4 MB
  • mp4~Get Your Files Here !/4 - Encrypted Traffic Analysis Malware Detection Without Decryption/13 - Advanced Techniques for Identifying Malwares in Encrypted Traffic.mp4 59.1 MB
  • mp4~Get Your Files Here !/2 - AIDriven Analysis of Malware Behavior/8 - Lab ChatGPT Condenses Quick Insights from Complex Security Reports.mp4 56.4 MB
  • mp4~Get Your Files Here !/2 - AIDriven Analysis of Malware Behavior/7 - Lab AIbased Behavioral Malware Analysis.mp4 52.7 MB
  • mp4~Get Your Files Here !/2 - AIDriven Analysis of Malware Behavior/6 - Decoding File Behaviors Spotting Malicious and Benign Patterns.mp4 49.8 MB
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/15 - Unmasking AI Trojans A Glimpse into Hidden Threats.mp4 43.1 MB
  • mp4~Get Your Files Here !/4 - Encrypted Traffic Analysis Malware Detection Without Decryption/12 - Malware Detection in Encrypted Traffic Without Decryption.mp4 40.8 MB
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/19 - Meta Neural Trojan Detection Workflow.mp4 39.3 MB
  • mp4~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/5 - Real Time Case Study Tackling Polymorphic Malware Threats.mp4 38.6 MB
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/17 - Unraveling the Mystique Inner Workings of Meta Neural Analysis.mp4 38.2 MB
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/16 - Defense Against Neural Trojan Attacks.mp4 37.8 MB
  • mp4~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/2 - Understanding Autoencoders A Deep Dive.mp4 34.5 MB
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/18 - Meta Neural Analysis for AI Trojan Detection.mp4 31.3 MB
  • mp4~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/1 - The Complex World of Polymorphic Malware Lifecycle and Detection Strategies.mp4 30.2 MB
  • mp4~Get Your Files Here !/3 - Attribution Mastery Identifying the Origins of Malware Threats/9 - Uncovering the Puppet Masters Advanced Attribution in Malware Analysis.mp4 29.5 MB
【影视】 Reverse Engineering Malware with Ghidra
收录时间:2024-08-16 文档个数:59 文档大小:309.4 MB 最近下载:2025-05-16 人气:750 磁力链接
  • mp403. Enhancing Your Reversing Workflow/03. Demo- Function Analysis.mp4 66.1 MB
  • mp402. Working with Ghidra’s Core Components/05. Demo- Analyzing a Trojan.mp4 40.6 MB
  • mp404. Harnessing Ghidra’s Superpowers/01. Working with the Decompiler.mp4 31.1 MB
  • mp404. Harnessing Ghidra’s Superpowers/05. Demo- Scripting Example.mp4 25.8 MB
  • mp401. Software Reverse Engineering with Ghidra/04. Demo- Getting Started with Ghidra.mp4 22.8 MB
  • mp404. Harnessing Ghidra’s Superpowers/03. Demo- Headless Analyzer.mp4 18.2 MB
  • mp403. Enhancing Your Reversing Workflow/01. Enhancing the CodeBrowser.mp4 15.0 MB
  • mp403. Enhancing Your Reversing Workflow/02. Function Analysis Tools and Techniques.mp4 12.6 MB
  • mp402. Working with Ghidra’s Core Components/03. Exploring the Main User Interface.mp4 11.1 MB
  • mp402. Working with Ghidra’s Core Components/04. Ghidra’s Decompiler.mp4 10.7 MB
  • mp401. Software Reverse Engineering with Ghidra/01. Reverse Engineering and the Ghidra Software Reverse Engineering (SRE) Tools.mp4 9.8 MB
  • mp401. Software Reverse Engineering with Ghidra/03. What You Should Know.mp4 6.6 MB
  • mp402. Working with Ghidra’s Core Components/02. Projects and Auto-analysis.mp4 6.6 MB
  • mp404. Harnessing Ghidra’s Superpowers/04. Ghidra Scripts.mp4 4.4 MB
  • mp402. Working with Ghidra’s Core Components/01. Exploring Ghidra’s Main Components and Features.mp4 4.4 MB
  • mp404. Harnessing Ghidra’s Superpowers/06. Conclusion and Course Wrap-up.mp4 4.2 MB
  • mp404. Harnessing Ghidra’s Superpowers/02. Headless Analyzer.mp4 4.1 MB
  • mp401. Software Reverse Engineering with Ghidra/02. Malware Packing, Obfuscation, and Other Mayhem.mp4 4.0 MB
  • mp400. Course Overview/00. Course Overview.mp4 3.8 MB
  • mp401. Software Reverse Engineering with Ghidra/00. Module Introduction.mp4 1.5 MB
【安装包】 GridinSoft Anti-Malware 4.0.13.233 RePack & Portable by 9649
收录时间:2018-10-08 文档个数:5 文档大小:158.1 MB 最近下载:2025-05-15 人气:252 磁力链接
  • exeGridinsoft Anti-Malware 4.0.13.exe 158.1 MB
  • cmdАнглийская portable.cmd 89 Bytes
  • cmdАнглийская обычная.cmd 84 Bytes
  • cmdРусская portable.cmd 89 Bytes
  • cmdРусская обычная.cmd 84 Bytes
共73页 上一页 1 2 3 4 5 6 7 8 下一页