磁力管家

磁力管家
为您索检到100条磁力链接,耗时2毫秒。 rss

分享给好友

【影视】 Mastering Reverse Engineering & Malware Analysis REMASM+
收录时间:2023-12-20 文档个数:86 文档大小:5.1 GB 最近下载:2025-05-16 人气:12326 磁力链接
  • mp415. Memory Manipulation/2. Testing and Analyzing Project with Readelf and GDB.mp4 232.7 MB
  • mp415. Memory Manipulation/1. Project EXABYTE.mp4 211.4 MB
  • mp44. Windows - PE Format/1. Fundamentals of Windows PE Format.mp4 206.7 MB
  • mp45. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4 164.3 MB
  • mp43. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4 163.0 MB
  • mp43. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 154.3 MB
  • mp49. Debugging x86-64/2. Debugging and Finding Variables in Memory addresses.mp4 149.7 MB
  • mp410. Writing our second 64Bit Assembly Program/2. Analyzing Output with GDB and creating makefile.mp4 137.8 MB
  • mp43. Linux - ELF Format/2. Learning ELF Fields.mp4 135.1 MB
  • mp418. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4 127.5 MB
  • mp418. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4 122.4 MB
  • mp413. Jump and Loop/1. Using Conditions and Jumping.mp4 121.7 MB
  • mp49. Debugging x86-64/3. Learning more with GDB.mp4 115.3 MB
  • mp45. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4 111.7 MB
  • mp45. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4 108.9 MB
  • mp418. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4 108.2 MB
  • mp49. Debugging x86-64/1. Starting gdb and setting flavors.mp4 102.4 MB
  • mp412. Data Display Debugger - DDD/3. Using DDD and Analyzing RAX Values.mp4 101.0 MB
  • mp42. Binary Analysis/5. Linking Phase.mp4 98.5 MB
  • mp47. Writing our first 64Bit Assembly Program/1. Hello world with makefile.mp4 92.0 MB
【影视】 Malware Development and Reverse Engineering 1 The Basics
收录时间:2022-01-13 文档个数:235 文档大小:4.8 GB 最近下载:2025-05-16 人气:9055 磁力链接
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/05 Generating Shellcodes Using Metasploit in Kali Linux/001 Generating Shellcodes Using Metasploit in Kali Linux.mp4 193.3 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/27 Anti Virus Evasion/003 Evading Anti Virus Using Function Obfuscation and Parameter String Encryption.mp4 191.8 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/19 Process Injection/003 Process Injection - Part 1 - Explanation of APIs.mp4 169.6 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/23 Detecting and Reverse Engineering DLL Injection/001 Detect DLL Injection and Dump DLL Shellcode.mp4 166.8 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/02 Installing The Tools/002 Configuring the Virtual Machine.mp4 159.7 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/17 Trojan Engineering Using Code Caves/004 Trojanizing Crackme1 - Part 1.mp4 141.2 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/03 Building EXE and DLL and Examining PE Structure/001 Building EXE and DLL and Examining PE Structure.mp4 141.0 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/10 XOR Encryption of Payload/001 Intro To XOR Encryption.mp4 138.0 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/20 Detecting Process Injection and Reverse Engineering it/001 Detecting Process Injection and Reverse Engineering it.mp4 137.8 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/13 Reverse Engineering AES Encryption Using CryptDecrypt/001 Reverse Engineering AES Encryption Using CryptDecrypt API.mp4 125.1 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/09 Reverse Engineering Base64 Encoded Payloads/001 Reverse Engineering Base64 Encoded Payloads.mp4 122.0 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/06 Embedding Shellcode Payload in .RSRC Section and Analyzing with xdbg/002 Embedding Shellcode Payload in .RSRC Section and Analyzing with xdbg.mp4 121.2 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/04 Embedding Shellcode Payloads in EXE files/002 Embedding Shellcode Payload in .TEXT Section.mp4 115.7 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/04 Embedding Shellcode Payloads in EXE files/003 Embedding Shellcode Payload in .DATA Section.mp4 115.6 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/15 Obfuscating Functions Using GetProcAddress and XOR Encryption/002 Function Obfuscation Using GetProcAddress and XOR Encryption.mp4 115.4 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/08 Base64 Encoding of Shellcode Payload/001 Intro to Base64 Encoding of Shellcode Payload.mp4 115.3 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/22 DLL Injection/003 DLL Injection - Part 1 - Explanation of APIs, Building DLL and EXE files.mp4 114.7 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/15 Obfuscating Functions Using GetProcAddress and XOR Encryption/001 Intro to Function Obfuscation Using GetProcAddress API.mp4 112.6 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/27 Anti Virus Evasion/002 Installing Yara.mp4 108.8 MB
  • mp4[TutsNode.com] - Malware Development and Reverse Engineering 1 The Basics/04 Embedding Shellcode Payloads in EXE files/001 1-intro to embedding shellcode payload.mp4 102.3 MB
【影视】 [FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+
收录时间:2024-01-03 文档个数:254 文档大小:9.7 GB 最近下载:2025-05-16 人气:9055 磁力链接
  • mp48. Windows - PE Format/1. Learning Windows PE Format.mp4 206.8 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4 164.3 MB
  • mp47. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4 163.0 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/9. Developing InsertHead, InsertTail and Insert Methods.mp4 155.9 MB
  • mp47. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 154.3 MB
  • mp413. Permissions/5. After this video you'll understand all LINUX Permissions.mp4 147.8 MB
  • mp47. Linux - ELF Format/2. Learning ELF Fields.mp4 135.0 MB
  • mp415. C++ for Reverse Engineering - Section 1/12. Scoping Variables and Static Keyword.mp4 132.6 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4 127.5 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/4. Testing ADT List.mp4 127.2 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/11. Removing Items.mp4 126.3 MB
  • mp422. Data Structures in CC++/9. Class Templates in CPP.mp4 122.4 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4 122.3 MB
  • mp417. How Conditional Statements work Reverse Engineering and C/2. Conditional Statements in CPP.mp4 115.4 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4 112.0 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4 108.8 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4 108.2 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/5. Node and Chaining Example.mp4 107.9 MB
  • mp422. Data Structures in CC++/2. Creating Random Card Generator Using Enum and rand.mp4 107.7 MB
  • mp419. Introduction to Pointers/1. Pointers in CPP.mp4 104.6 MB
【影视】 Windows Malware Analysis for Hedgehogs - Beginner Training
收录时间:2023-12-17 文档个数:258 文档大小:6.8 GB 最近下载:2025-05-16 人气:8364 磁力链接
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/3. Triage and file type basics/5. Lab Triage 2 Whole file examination.mp4 149.5 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/4. Wrapped files and installers/9. Lab Installers 1 Layer 1 Unpacking Nullsoft.mp4 145.1 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/12. Packers and unpacking methods/10. Lab Poison 1 Speakeasy API logging.mp4 136.7 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/12. Packers and unpacking methods/12. Lab Injector DLL Unpacking via VirtualAlloc.mp4 133.9 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/5. Malware Persistence and Disinfection Basics/4. Lab Services.mp4 133.8 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/11. Ransomware analysis with Ghidra and x64dbg/6. Lab Legion ransomware 5 Understanding the encryption.mp4 133.7 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/5. Malware Persistence and Disinfection Basics/5. Lab Disinfection 1 Autoruns - Run, IFEO.mp4 132.3 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/4. Wrapped files and installers/5. Lab Wrapped files 2 Obtaining the script with ACLs.mp4 130.1 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/12. Packers and unpacking methods/6. Lab Winupack 1 packing, fix disassembly in x32dbg.mp4 127.2 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/5. Malware Persistence and Disinfection Basics/6. Lab Disinfection 2 RunOnce, Active Setup, Scheduled Tasks, LNKs.mp4 119.0 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/8. Malware classification and analysis reports/9. Lab report writing 3 Malware decryption with CyberChef.mp4 114.0 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/4. Wrapped files and installers/12. Lab Installers 4 Triage of multiple files.mp4 111.3 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/11. Ransomware analysis with Ghidra and x64dbg/7. Lab Legion ransomware 6 Patching with x32dbg.mp4 110.1 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/4. Wrapped files and installers/4. Lab Wapped files 1 Triage of a wrapped file.mp4 108.0 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/3. Triage and file type basics/3. Lab Triage 1 Determine file types of unknown samples.mp4 108.0 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/11. Ransomware analysis with Ghidra and x64dbg/8. Lab Legion ransomware 7 Ransomware monitoring and file decryption test.mp4 107.4 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/6. Portable Executable format and .NET/4. Lab PE 1 MS DOS stub, COFF file header, timestamps and REPRO builds.mp4 107.3 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/12. Packers and unpacking methods/7. Lab Winupack 2 Find OEP via tracing, dump and fix imports.mp4 105.2 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/7. File analysis verdicts/9. Lab diffing3 Force strict signature verification.mp4 102.9 MB
  • mp4[TutsNode.org] - Windows Malware Analysis for Hedgehogs - Beginner Training/6. Portable Executable format and .NET/5. Lab PE 2 Optional header and section table.mp4 99.3 MB
【影视】 Reverse Engineering and Malware Analysis x6432 CRMA+ 2022
收录时间:2022-04-26 文档个数:69 文档大小:5.0 GB 最近下载:2025-05-16 人气:7192 磁力链接
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/6. Linux for MA and RE - Process Management and User ENV/1. Process Management.mp4 350.7 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/7. Linux for MA and RE - Networking and Software Control/1. Linux Networking.mp4 350.6 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/5. Archive Files.mp4 302.2 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/3. Filesystem.mp4 296.1 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/4. Linux - Logging and Webserver files.mp4 249.5 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/7. Linux for MA and RE - Networking and Software Control/2. Linux - Software Control.mp4 237.1 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/6. Linux for MA and RE - Process Management and User ENV/2. User Enviroment Variables.mp4 229.5 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/8. Network Training for Reverse Engineering and Malware Analysis/2. Network Training for Reverse Engineering and Malware Analysis - Part 2.mp4 223.7 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/2. Beginning Linux Training.mp4 185.6 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/6. Files and Permissions.mp4 165.1 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/10. Reverse Engineering Software and Malware/2. High Level vs Machine code Reversing and Execution principle.mp4 162.7 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/4. Reverse Engineering and Assembly/2. Low Level Function execution and Stacks.mp4 162.6 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/10. Reverse Engineering Software and Malware/1. Introduction to RE and Assembly.mp4 152.6 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/4. Reverse Engineering and Assembly/1. CPU Instruction set & Registers.mp4 152.5 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/1. Introduction/1. What is Reverse Engineering.mp4 148.3 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/1. Introduction/2. What is Malware Analysis.mp4 148.1 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/8. Network Training for Reverse Engineering and Malware Analysis/1. Network Training for Reverse Engineering and Malware Analysis - Part 1.mp4 146.0 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/5. Linux for Malware Analysis and Reverse Engineering - Filesystem/1. Installing Kali Linux.mp4 144.5 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/2. Firewalls and Security Terminologies/1. Cyber Security - Reverse Engineering and Malware Analysis.mp4 139.9 MB
  • mp4[TutsNode.com] - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022/2. Firewalls and Security Terminologies/2. How Firewalls Works.mp4 124.2 MB
【影视】 Malware Development 2 Advanced Injection and API Hooking
收录时间:2022-02-04 文档个数:221 文档大小:4.0 GB 最近下载:2025-05-16 人气:6909 磁力链接
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/4. Explanation of the source code for the Trojan and password-sniffer DLL.mp4 198.4 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/3. PE Header Import Directory and IAT Structure/2. Practical on PE Header Import Directory Structure and IAT.mp4 185.0 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/2. Practical Walkthrough on Classic Cross Injections.mp4 180.1 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/2. PE Header Export Directory Structure/2. Practical Walkthrough on PE Header Export Directory Structure.mp4 172.2 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/4. Advanced Function Obfuscation/1. Introduction to Advanced Function Obfuscation.mp4 142.5 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/3. Practical Walkthrough on Heaven's Gate Injection.mp4 139.4 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/4. Encrypting Heaven's Gate.mp4 138.2 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/13. API Hooking using Inline Patch Hooking/4. Reverse Engineering Patch Hooking.mp4 136.4 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/2. Explanation of the Reflective Loading Code.mp4 125.7 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/6. Map-View Code Injection/2. Explanation of APIs Used in Map-View Code Injection.mp4 122.7 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/6. Building the DLL Injector Trojan.mp4 122.5 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/5. Thread Context Injection/2. Explanation of APIs used in Thread Context Injection.mp4 115.2 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/4. Obfuscating the Reflective Loader Strings.mp4 113.9 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/3. Using API Monitor to hunt for the password function.mp4 112.5 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/3. PE Header Import Directory and IAT Structure/1. Introduction to PE Header Import Directory and IAT Structure.mp4 108.0 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/13. API Hooking using Inline Patch Hooking/2. Explanation of Code for Patch Hooking.mp4 98.4 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/11. API Hooking Using the Detours Library/3. Practical Walkthrough on Using the Detours Library.mp4 95.5 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/5. Building the Password Sniffer DLL.mp4 91.2 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/4. Advanced Function Obfuscation/2. Practical Walkthrough on Advanced Function Obfuscation.mp4 89.6 MB
  • mp4[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/2. Installing VeraCrypt.mp4 86.6 MB
【影视】 Malware Detection and Analysis with Python
收录时间:2023-12-18 文档个数:29 文档大小:162.2 MB 最近下载:2025-05-15 人气:6808 磁力链接
  • mp42. Detecting Malicious Files with Python/5. Demo - Creating File and Import Hash Signatures with Python.mp4 22.4 MB
  • mp42. Detecting Malicious Files with Python/7. Integrate with the VirusTotal API.mp4 18.3 MB
  • mp43. Conducting Malware Analysis with Python/2. Analyzing Malicious Documents with Python.mp4 17.9 MB
  • mp42. Detecting Malicious Files with Python/3. Demo - Performing File Classification with Python.mp4 17.3 MB
  • mp43. Conducting Malware Analysis with Python/4. Demo - Detecting Packed Executables with Python.mp4 16.8 MB
  • zippython-malware-detection-analysis.zip 15.0 MB
  • mp42. Detecting Malicious Files with Python/6. Identify Malicious Patterns with Yara.mp4 11.9 MB
  • mp43. Conducting Malware Analysis with Python/3. Analyzing Packed Executables.mp4 8.1 MB
  • mp43. Conducting Malware Analysis with Python/5. Summary.mp4 7.4 MB
  • mp42. Detecting Malicious Files with Python/4. Working with File Hashes.mp4 6.8 MB
  • mp42. Detecting Malicious Files with Python/1. Introduction.mp4 5.8 MB
  • mp42. Detecting Malicious Files with Python/2. Performing File Classification with Python.mp4 5.6 MB
  • mp42. Detecting Malicious Files with Python/8. Getting Familiar with Existing Solutions.mp4 4.8 MB
  • mp41. Course Overview/1. Course Overview.mp4 3.2 MB
  • mp43. Conducting Malware Analysis with Python/1. Introduction.mp4 838.9 kB
  • vtt2. Detecting Malicious Files with Python/5. Demo - Creating File and Import Hash Signatures with Python.vtt 8.7 kB
  • vtt2. Detecting Malicious Files with Python/7. Integrate with the VirusTotal API.vtt 8.6 kB
  • vtt2. Detecting Malicious Files with Python/3. Demo - Performing File Classification with Python.vtt 8.1 kB
  • vtt3. Conducting Malware Analysis with Python/2. Analyzing Malicious Documents with Python.vtt 8.0 kB
  • vtt3. Conducting Malware Analysis with Python/4. Demo - Detecting Packed Executables with Python.vtt 7.5 kB
【影视】 [FreeCourseLab.com] Udemy - How Hackers Create Undetectable Malware and Viruses
收录时间:2022-01-10 文档个数:33 文档大小:291.2 MB 最近下载:2025-05-15 人气:6673 磁力链接
  • mp42. Understanding Malware and Creating the Hacking Environment/3. Setting Up The Veil Framework.mp4 48.6 MB
  • mp42. Understanding Malware and Creating the Hacking Environment/4. Installing Gnome Desktop.mp4 45.1 MB
  • mp41. We Begin Here/2. Introduction to Undetectable Malware.mp4 36.7 MB
  • mp44. How Hackers Create Undetectable Malware/2. Testing Exploit on Windows 10 Machine.mp4 32.2 MB
  • mp43. Veil and Metasploit/2. Installing Metasploit.mp4 30.1 MB
  • mp44. How Hackers Create Undetectable Malware/1. Creating an Exploit.mp4 26.5 MB
  • mp43. Veil and Metasploit/5. Veil Evasion Final Installation.mp4 16.4 MB
  • mp42. Understanding Malware and Creating the Hacking Environment/1. Installing Python and Pip.mp4 14.2 MB
  • mp42. Understanding Malware and Creating the Hacking Environment/2. Installing Veil-Framework.mp4 11.6 MB
  • mp43. Veil and Metasploit/7. Introduction to Veil and The Importance in Ethical Hacking.mp4 10.7 MB
  • mp43. Veil and Metasploit/1. Wine Mono and Veil-Evasion Installation.mp4 6.6 MB
  • mp44. How Hackers Create Undetectable Malware/3. Encrypting Payload.mp4 4.8 MB
  • mp41. We Begin Here/1. Welcome and Introduction.mp4 3.3 MB
  • mp43. Veil and Metasploit/4. Testing MSF Console.mp4 1.8 MB
  • mp43. Veil and Metasploit/6. Adding the Metasploit Folder to Veil Installation.mp4 1.5 MB
  • mp43. Veil and Metasploit/3. Metasploit Installation Complete.mp4 1.1 MB
  • vtt4. How Hackers Create Undetectable Malware/2. Testing Exploit on Windows 10 Machine.vtt 13.6 kB
  • vtt4. How Hackers Create Undetectable Malware/1. Creating an Exploit.vtt 12.4 kB
  • vtt3. Veil and Metasploit/2. Installing Metasploit.vtt 10.4 kB
  • vtt1. We Begin Here/2. Introduction to Undetectable Malware.vtt 10.3 kB
【影视】 Lynda - Wireshark - Malware and Forensics
收录时间:2018-08-31 文档个数:32 文档大小:316.2 MB 最近下载:2025-05-16 人气:6337 磁力链接
  • mp43 - 2. Capture Overview/Display filters.mp4 26.7 MB
  • mp41 - Introduction/What you should know.mp4 1.5 MB
  • mp42 - 1. Deep Packet Analysis/Create firewall rules.mp4 9.4 MB
  • mp42 - 1. Deep Packet Analysis/Cyberattacks and trends.mp4 8.8 MB
  • mp42 - 1. Deep Packet Analysis/Malware and compromised systems.mp4 4.9 MB
  • mp42 - 1. Deep Packet Analysis/Packet analysis overview.mp4 8.0 MB
  • mp42 - 1. Deep Packet Analysis/Tap into your network.mp4 8.1 MB
  • mp42 - 1. Deep Packet Analysis/Tshark.mp4 11.7 MB
  • mp42 - 1. Deep Packet Analysis/Wireshark overview.mp4 12.8 MB
  • mp43 - 2. Capture Overview/Baseline your network.mp4 7.0 MB
  • mp43 - 2. Capture Overview/Capture filters.mp4 10.3 MB
  • mp43 - 2. Capture Overview/Challenge - HTTP packets.mp4 1.8 MB
  • mp43 - 2. Capture Overview/Coloring rules.mp4 17.0 MB
  • mp41 - Introduction/Welcome.mp4 6.0 MB
  • mp43 - 2. Capture Overview/Save, export, and print.mp4 23.0 MB
  • mp43 - 2. Capture Overview/Solution - HTTP packets.mp4 8.0 MB
  • mp43 - 2. Capture Overview/Statistics.mp4 19.4 MB
  • mp43 - 2. Capture Overview/Using a ring buffer.mp4 13.6 MB
  • mp44 - 3. Unusual Traffic/Attack signatures.mp4 25.8 MB
  • mp44 - 3. Unusual Traffic/Challenge - Analyze.mp4 3.0 MB
【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics V4 - Ai and Chatgpt Mastery In Malware Analysis
收录时间:2024-03-22 文档个数:29 文档大小:1.6 GB 最近下载:2025-05-16 人气:5512 磁力链接
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/7 - LabDeveloping Automated Deep Learning Strategies for Fileless Malware Detection.mp4 224.1 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/21 - Lab Metamorphic Malware Detection using Graph Neural Networks.mp4 174.7 MB
  • mp4~Get Your Files Here !/6 - Innovative Effective Malware Analysis with ChatGPT Strategies Techniques/27 - Lab Deploying ChatGPT for InDepth Malware Code Behavior Analysis.mp4 168.2 MB
  • mp4~Get Your Files Here !/2 - Advanced Detection of Stealthy MalwareLeveraging Memory Forensics DeepLearning/10 - Lab Implementing Deep Learning for Enhanced Detection of Stealthy Malware.mp4 155.1 MB
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/2 - Unraveling the Features of Fileless Malware for Effective Detection.mp4 80.8 MB
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/3 - Advanced Techniques in Fileless Malware Detection.mp4 72.1 MB
  • mp4~Get Your Files Here !/5 - AIDriven Analysis of Malware Executables/22 - Behavioral and Executable Malware A Unified AI Detection Strategy.mp4 71.1 MB
  • mp4~Get Your Files Here !/3 - Modernizing Future of Malware Defense Automated Platforms and Sandbox Solutions/11 - Enhancing Malware Analysis through Advanced Automation Platforms.mp4 56.0 MB
  • mp4~Get Your Files Here !/2 - Advanced Detection of Stealthy MalwareLeveraging Memory Forensics DeepLearning/8 - Deep Learnings Edge and Memory forensics in Unmasking Obfuscated Malware.mp4 50.7 MB
  • mp4~Get Your Files Here !/5 - AIDriven Analysis of Malware Executables/23 - Lab Detecting Malware in Executable Files.mp4 49.5 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/14 - Understanding Metamorphic Malware Evolution Behavior and Defense.mp4 49.1 MB
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/1 - Decoding Fileless Malware A Deep Dive into AIDriven Detection Mechanisms.mp4 45.8 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/18 - Exploring Control Flow Graphs and Graph Neural Networks.mp4 45.6 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/16 - Advanced Techniques for Metamorphic Malware Detection.mp4 41.1 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/19 - Deep Dive into Malware Analysis using Control Flow Graphs Graph Neural Network.mp4 39.6 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/15 - Dissecting Metamorphic Malware Understanding What Changes What Stays the Same.mp4 36.7 MB
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/5 - Algorithmic Approaches in AIDriven Fileless Malware Analysis.mp4 35.0 MB
  • mp4~Get Your Files Here !/3 - Modernizing Future of Malware Defense Automated Platforms and Sandbox Solutions/13 - Merging Defenses How Fileless Malware Detection Integrates with System Architec.mp4 30.3 MB
  • mp4~Get Your Files Here !/3 - Modernizing Future of Malware Defense Automated Platforms and Sandbox Solutions/12 - Harnessing Malware Sandbox Platforms for Enhanced Enterprise Security Infrastruc.mp4 27.6 MB
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/6 - Building Malware Detection ModelUtilizing Memory Forensics for Dataset Creation.mp4 27.3 MB
【影视】 Build Undetectable Malware Using C Language
收录时间:2021-05-19 文档个数:56 文档大小:2.5 GB 最近下载:2025-05-15 人气:5501 磁力链接
  • mp45. Creating Persistance & Nesting Our Program In Windows Registry/2. Interacting With Registry In Order To Start Our Program Automaticly.mp4 209.9 MB
  • mp47. Hacking Windows 10/2. Hacking Windows 10 Target With Our Program.mp4 184.2 MB
  • mp42. Hiding Our Program & Defining Connection Points/3. Defining Connection Points To Our Backdoor.mp4 171.8 MB
  • mp43. Building Shell Function & Executing Commands/3. Server Socket Initiation.mp4 168.9 MB
  • mp43. Building Shell Function & Executing Commands/4. Making Server Compatible With Our Backdoor.mp4 149.3 MB
  • mp46. Adding Keylogger To Our Malware/1. Understanding Keylogger Code.mp4 144.1 MB
  • mp47. Hacking Windows 10/5. Is It a Browser Or Backdoor .mp4 139.9 MB
  • mp43. Building Shell Function & Executing Commands/1. Creating Our Shell Function.mp4 129.9 MB
  • mp43. Building Shell Function & Executing Commands/2. Executing Commands On Target Machine.mp4 122.6 MB
  • mp43. Building Shell Function & Executing Commands/5. Testing Our Malware For Command Execution.mp4 121.9 MB
  • mp41. Introduction & Welcome To Hacking With C!/4. How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).mp4 118.0 MB
  • mp44. Switching Directories Inside Of A Program/1. Changing Our Program Directory.mp4 99.5 MB
  • mp47. Hacking Windows 10/3. You Have Been Hacked.mp4 99.4 MB
  • mp42. Hiding Our Program & Defining Connection Points/2. Hiding Our Program Console Window.mp4 96.9 MB
  • mp46. Adding Keylogger To Our Malware/2. Adding Keylogger Function To Our Backdoor.mp4 87.1 MB
  • mp47. Hacking Windows 10/4. Changing Malware Binary In Order To Bypass Antivirus.mp4 80.3 MB
  • mp42. Hiding Our Program & Defining Connection Points/1. Explaining Malware Structure & Including Needed Libraries.mp4 79.5 MB
  • mp42. Hiding Our Program & Defining Connection Points/5. Attempting Connection Every 10 Seconds With Our Target.mp4 77.1 MB
  • mp41. Introduction & Welcome To Hacking With C!/2. What Are We Going To Learn In This Course & What You Need To Know!.mp4 67.9 MB
  • mp47. Hacking Windows 10/1. Updating Our Server Code.mp4 60.2 MB
【影视】 Reverse Engineering Malware
收录时间:2017-08-28 文档个数:29 文档大小:2.9 GB 最近下载:2025-05-15 人气:5407 磁力链接
  • mp4Reverse Engineering Malware Day 1 Part 17 Malware Unpacking.mp4 319.8 MB
  • mp4Reverse Engineering Malware Day 1 Part 11 Data Encoding - Common Algorithms - Base64.mp4 302.4 MB
  • mp4Reverse Engineering Malware Day 2 Part 5 Anti-Analysis Examples.mp4 256.1 MB
  • mp4Reverse Engineering Malware Day 1 Part 10 Data Encoding - Common Algorithms - Caesar Cipher & XOR.mp4 223.6 MB
  • mp4Reverse Engineering Malware Day 2 Part 1 Network Communications - Introduction, Finding the Code.mp4 203.7 MB
  • mp4Reverse Engineering Malware Day 1 Part 15 Data Decoding.mp4 182.8 MB
  • mp4Reverse Engineering Malware Day 2 Part 3 DLL Analysis.mp4 180.8 MB
  • mp4Reverse Engineering Malware Day 1 Part 3 Triage, Tasks, and Tools.mp4 131.8 MB
  • mp4Reverse Engineering Malware Day 2 Part 4 Anti-Analysis.mp4 107.1 MB
  • mp4Reverse Engineering Malware Day 1 Part 1 Prerequisites.mp4 105.1 MB
  • mp4Reverse Engineering Malware Day 1 Part 12 Data Encoding - Common Algorithms - Crypto.mp4 99.9 MB
  • mp4Reverse Engineering Malware Day 1 Part 9 Data Encoding.mp4 99.0 MB
  • mp4Reverse Engineering Malware Day 1 Part 14 Data Encoding - Common Algorithms - String Obfuscation.mp4 94.5 MB
  • mp4Reverse Engineering Malware Day 2 Part 2 Network Communications - Command & Control, Indicators.mp4 94.4 MB
  • mp4Reverse Engineering Malware Day 1 Part 7 Know Your Tools.mp4 74.6 MB
  • mp4Reverse Engineering Malware Day 1 Part 5 Analysis Methods.mp4 74.5 MB
  • mp4Reverse Engineering Malware Day 1 Part 2 Analysis Goals.mp4 68.1 MB
  • mp4Reverse Engineering Malware Day 2 Part 7 Shellcode Analysis.mp4 64.3 MB
  • mp4Reverse Engineering Malware Day 1 Part 6 Execution and Persistence.mp4 42.6 MB
  • mp4Reverse Engineering Malware Day 1 Part 13 Data Encoding - Common Algorithms - Compression.mp4 37.8 MB
【影视】 Cisco Press - Cisco Firepower and Advanced Malware Protection LiveLessons
收录时间:2017-02-11 文档个数:59 文档大小:2.1 GB 最近下载:2025-05-15 人气:4974 磁力链接
  • mp41.4 Understanding Advanced Malware Protection (AMP) for Endpoints and Networks.mp4 141.3 MB
  • mp41.8 Understanding the Cisco Identity Services Engine (ISE).mp4 116.9 MB
  • mp42.1 Understanding Inline vs. Promiscuous Mode.mp4 116.1 MB
  • mp41.1 Understanding the New Security Threat Landscape and the Attack Continuum.mp4 75.6 MB
  • mp43.6 Troubleshooting Cisco ASA with FirePOWER Services.mp4 72.9 MB
  • mp41.6 Understanding Cisco Email Security.mp4 69.9 MB
  • mp44.1 Introducing Cisco AMP for Networks.mp4 64.3 MB
  • mp41.2 Understanding the Cisco ASA Next-Generation Firewalls and the FirePOWER Module.mp4 63.0 MB
  • mp47.1 Cisco Next-Generation IPS Deployment Scenarios.mp4 59.9 MB
  • mp44.2 Understanding Cisco AMP for Networks Licensing.mp4 59.4 MB
  • mp42.7 Understanding Cisco ASA FirePOWER Services and High Availability.mp4 58.0 MB
  • mp41.7 Understanding Cisco Web Security.mp4 50.9 MB
  • mp44.4 Troubleshooting Cisco AMP for Networks.mp4 49.8 MB
  • mp41.3 Understanding Next-Generation Intrusion Prevention Systems (NGIPS).mp4 48.6 MB
  • mp40. Cisco Firepower and Advanced Malware Protection LiveLessons- Introduction.mp4 48.0 MB
  • mp45.6 Events, File Analysis, Threat Root Cause, and Advanced Reporting.mp4 47.9 MB
  • mp42.3 Understanding Cisco ASA FirePOWER Services Sizing.mp4 45.1 MB
  • mp47.2 Configuring Cisco Next-Generation IPS Policies and Rules.mp4 44.6 MB
  • mp43.4 Configuring the Cisco ASA FirePOWER Module Using the Adaptive Security Device Manager (ASDM).mp4 43.7 MB
  • mp43.7 Configuring Cisco Firepower Threat Defense.mp4 39.3 MB
【影视】 [FreeCoursesOnline.Me] [LYNDA] Ethical Hacking The Complete Malware Analysis Process [FCO]
收录时间:2021-03-07 文档个数:58 文档大小:212.0 MB 最近下载:2025-05-15 人气:4962 磁力链接
  • mp404-Advanced_Techniques/003-Polymorphic_malware.mp4 19.3 MB
  • mp406-Conclusion/001-Whats_next_.mp4 14.1 MB
  • mp404-Advanced_Techniques/001-Hiding_malware.mp4 13.5 MB
  • mp403-Malware_Detection/001-Indicators_of_compromise.mp4 12.6 MB
  • mp405-Reverse_Engineering_Malware/004-Analyzing_BlackEnergy_and_GreyEnergy.mp4 12.0 MB
  • mp401-Introduction/001-What_malware_is_and_how_it_behaves.mp4 10.9 MB
  • mp402-Introduction_to_Malware/005-How_malware_achieves_persistence.mp4 10.1 MB
  • mp402-Introduction_to_Malware/008-Virus_construction_kits.mp4 9.4 MB
  • mp404-Advanced_Techniques/004-Using_cryptography_in_ransomware.mp4 9.3 MB
  • mp405-Reverse_Engineering_Malware/001-Using_reverse_engineering_to_understand_code.mp4 9.2 MB
  • mp405-Reverse_Engineering_Malware/002-Considering_malware_in_families.mp4 8.5 MB
  • mp402-Introduction_to_Malware/010-The_MITRE_ATTCK_repository.mp4 8.4 MB
  • mp404-Advanced_Techniques/006-Analyzing_Win32.Sodin.mp4 6.9 MB
  • mp403-Malware_Detection/003-Sandboxing_malware.mp4 6.8 MB
  • mp402-Introduction_to_Malware/006-Digging_into_rootkits.mp4 6.7 MB
  • mp402-Introduction_to_Malware/004-How_malware_works.mp4 6.4 MB
  • mp402-Introduction_to_Malware/007-Automating_malware_with_botnets.mp4 6.0 MB
  • mp404-Advanced_Techniques/005-Understanding_advanced_persistent_threats.mp4 5.7 MB
  • mp402-Introduction_to_Malware/002-The_evolution_of_malware.mp4 5.7 MB
  • mp405-Reverse_Engineering_Malware/003-Automated_malware_analysis.mp4 5.6 MB
【影视】 Malware Alex More
收录时间:2018-08-03 文档个数:1 文档大小:3.0 GB 最近下载:2025-05-15 人气:4781 磁力链接
  • mp4IR - Jul 06, 2018 - Alex More high.mp4 3.0 GB
【影视】 Reverse Engineering & Malware Analysis of .NET & Java
收录时间:2022-01-18 文档个数:116 文档大小:1.5 GB 最近下载:2025-05-16 人气:4028 磁力链接
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/01 Introduction/003 Configuring the Virtual Machine.mp4 159.8 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/07 Lab Demo on Reverse Engineering .NET executables/002 Lab Demo Walkthrough_ Reverse Engineering .NET.mp4 107.7 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/08 Lab Exercise_ Analyzing a .NET Malware (SamSam Ransomware)/002 Lab_ Reverse Engineering .NET Ransomware - Part 1.mp4 107.3 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/11 Reverse Engineering and Malware Analysis of Java Binary Using ByteCode Viewer/002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.mp4 102.4 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/11 Reverse Engineering and Malware Analysis of Java Binary Using ByteCode Viewer/003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.mp4 99.1 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/06 Using dnSpy/001 Using dnSpy for the first time.mp4 94.8 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/01 Introduction/002 Install a Virtual Machine.mp4 81.4 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/09 Lab Exercise_ Analyzing a .NET Spyware Trojan (Infostealer)/002 Dynamic Analysis of .NET Trojan - Part 2.mp4 78.4 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/08 Lab Exercise_ Analyzing a .NET Malware (SamSam Ransomware)/003 Lab_ Reverse Engineering .NET Ransomware - Part 2.mp4 74.2 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/01 Introduction/004 Installing Tools_ FlareVM.mp4 62.5 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/12 Lab Exercise_ Analyzing a Java RAT (Crossrat Trojan)/002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).mp4 61.6 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/09 Lab Exercise_ Analyzing a .NET Spyware Trojan (Infostealer)/001 Dynamic Analysis of .NET Trojan - Part 1.mp4 53.1 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/04 Principles of .NET Analysis/002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.mp4 51.6 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/01 Introduction/001 Introduction.mp4 42.8 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/03 Installing ILDASM and ILASM/001 Installing ILDASM and ILASM.mp4 41.1 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/04 Principles of .NET Analysis/001 Principles of .NET Analysis.mp4 36.9 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/05 Installing dnSpy/001 Installing dnSpy.mp4 33.7 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/02 Principles of .NET and Java Malware Analysis/001 Principles of .NET and Java Malware Analysis.mp4 33.4 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/10 Principles of Java Bytecodes/001 Principles of Java Bytecodes.mp4 30.0 MB
  • mp4[TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java/10 Principles of Java Bytecodes/002 Analyzing Java ByteCodes by Disassembling.mp4 25.6 MB
【影视】 Reverse Engineering and Malware Analysis in 21 Hours REMAC+
收录时间:2024-06-30 文档个数:239 文档大小:9.7 GB 最近下载:2025-05-16 人气:3916 磁力链接
  • mp48. Windows - PE Format/1. Learning Windows PE Format.mp4 206.8 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4 164.3 MB
  • mp47. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4 163.0 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/9. Developing InsertHead, InsertTail and Insert Methods.mp4 155.9 MB
  • mp47. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 154.3 MB
  • mp413. Permissions/5. After this video you'll understand all LINUX Permissions.mp4 147.8 MB
  • mp47. Linux - ELF Format/2. Learning ELF Fields.mp4 135.0 MB
  • mp415. C++ for Reverse Engineering - Section 1/12. Scoping Variables and Static Keyword.mp4 132.6 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4 127.5 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/4. Testing ADT List.mp4 127.2 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/11. Removing Items.mp4 126.3 MB
  • mp422. Data Structures in CC++/9. Class Templates in CPP.mp4 122.4 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4 122.3 MB
  • mp417. How Conditional Statements work Reverse Engineering and C/2. Conditional Statements in CPP.mp4 115.4 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4 112.0 MB
  • mp46. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4 108.8 MB
  • mp44. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4 108.2 MB
  • mp423. ADT and Nodes in C++ for Reverse Engineering/5. Node and Chaining Example.mp4 107.9 MB
  • mp422. Data Structures in CC++/2. Creating Random Card Generator Using Enum and rand.mp4 107.7 MB
  • mp419. Introduction to Pointers/1. Pointers in CPP.mp4 104.6 MB
【影视】 Malware and Incident Response
收录时间:2022-01-09 文档个数:55 文档大小:3.3 GB 最近下载:2025-05-16 人气:3841 磁力链接
  • mp4[TutsNode.com] - Malware and Incident Response/03-1.1 Malware Threat Landscape.mp4 632.7 MB
  • mp4[TutsNode.com] - Malware and Incident Response/20-5.3 Entry Points.mp4 552.6 MB
  • mp4[TutsNode.com] - Malware and Incident Response/08-2.2 How to Correctly Set Up a Lab.mp4 260.0 MB
  • mp4[TutsNode.com] - Malware and Incident Response/07-2.1 Why Set Up a Malware Lab.mp4 186.3 MB
  • mp4[TutsNode.com] - Malware and Incident Response/26-7.1 What to Look for.mp4 158.2 MB
  • mp4[TutsNode.com] - Malware and Incident Response/24-6.3 Other Techniques.mp4 153.7 MB
  • mp4[TutsNode.com] - Malware and Incident Response/13-3.4 Sandbox and Network.mp4 151.9 MB
  • mp4[TutsNode.com] - Malware and Incident Response/15-4.1 Wireshark.mp4 149.0 MB
  • mp4[TutsNode.com] - Malware and Incident Response/16-4.2 Column Setup.mp4 128.0 MB
  • mp4[TutsNode.com] - Malware and Incident Response/04-1.2 Malware Analysis.mp4 125.6 MB
  • mp4[TutsNode.com] - Malware and Incident Response/22-6.1 Registry Persistence.mp4 117.6 MB
  • mp4[TutsNode.com] - Malware and Incident Response/10-3.1 Cuckoo Sandbox.mp4 108.5 MB
  • mp4[TutsNode.com] - Malware and Incident Response/23-6.2 Analyzing for Persistence.mp4 95.8 MB
  • mp4[TutsNode.com] - Malware and Incident Response/12-3.3 Networking and Internet Connections.mp4 79.4 MB
  • mp4[TutsNode.com] - Malware and Incident Response/19-5.2 Image Header.mp4 61.1 MB
  • mp4[TutsNode.com] - Malware and Incident Response/18-5.1 PE File Format.mp4 58.9 MB
  • mp4[TutsNode.com] - Malware and Incident Response/01-Malware and Incident Response LiveLessons - Introduction.mp4 43.9 MB
  • mp4[TutsNode.com] - Malware and Incident Response/27-Malware and Incident Response LiveLessons - Summary.mp4 33.7 MB
  • mp4[TutsNode.com] - Malware and Incident Response/09-Learning objectives.mp4 28.6 MB
  • mp4[TutsNode.com] - Malware and Incident Response/17-Learning objectives.mp4 24.7 MB
【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics v3 - AI and ChatGPT Mastery in Malware Analysis
收录时间:2024-02-04 文档个数:28 文档大小:2.7 GB 最近下载:2025-05-15 人气:3680 磁力链接
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/6. Lab Unraveling Malware Mysteries in Memory with Volatility.mp4 403.3 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/3. Lab Advanced Malware Analysis - Dynamic Techniques with Process Hacker.mp4 255.6 MB
  • mp4~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/3. Lab Implementing Clustering Technique&Feature Engg in Malware Variant Analysis.mp4 210.8 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/9. Lab Deep Neural Networks for Effective and Efficient Malware Detection&Analysis.mp4 199.6 MB
  • mp4~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/2. Lab Implementing Malware Behavior Profiling with RF.mp4 128.8 MB
  • mp4~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/4. LabAdvanced Ransomware Behavior Prediction & Classification with Deep Learning.mp4 128.4 MB
  • mp4~Get Your Files Here !/1. Advanced Multi-Stage Malware Analysis AI Synergy and Correlation Insights/3. Lab Visualizing Feature Correlations in Malware Analysis Using Heatmaps.mp4 124.4 MB
  • mp4~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/2. Lab Ransomware Analysis and Dissection.mp4 116.2 MB
  • mp4~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/2. Determining Optimal Clustering Size for Effective Malware Variant Detection.mp4 109.4 MB
  • mp4~Get Your Files Here !/2. Forecasting Malware Threats Predictive Analytics and Time Series Modeling/3. Lab Implementing Advanced Analytics TSA for Predicting Future Malware Threats.mp4 96.9 MB
  • mp4~Get Your Files Here !/2. Forecasting Malware Threats Predictive Analytics and Time Series Modeling/2. Beyond Real-Time Predicting Malware Threats Before They Happen.mp4 80.2 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/5. Key Features for Effective Memory Analysis.mp4 77.8 MB
  • mp4~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/1. Decoding the Ransomware Lifecycle From Initial Infiltration to Encryption.mp4 75.2 MB
  • mp4~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/3. Demystifying AI in Malware Analysis Explainable AI.mp4 75.0 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/1. Introduction to Dynamic malware analysis.mp4 66.2 MB
  • mp4~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/4. Lab SHAP-based Explainability in Malware Detection with RF.mp4 65.4 MB
  • mp4~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/1. Identification and Analysis of Malware Variants through Unsupervised Clustering.mp4 61.8 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/4. Dynamic Malware Analysis Challenges, Solutions, and the Road Ahead.mp4 61.7 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/2. Key Features for Dynamic Memory Analysis.mp4 60.5 MB
  • mp4~Get Your Files Here !/1. Advanced Multi-Stage Malware Analysis AI Synergy and Correlation Insights/2. Unveiling the Mechanics of Correlation Analysis in Multi-Stage Malware Detection.mp4 46.5 MB
【影视】 futanari.24.10.18.fanta.sie.and.matty.mila.malware.mp4
收录时间:2024-11-27 文档个数:1 文档大小:1.0 GB 最近下载:2025-05-16 人气:3653 磁力链接
  • mp4futanari.24.10.18.fanta.sie.and.matty.mila.malware.mp4 1.0 GB
共5页 上一页 1 2 3 4 5 下一页