磁力管家

磁力管家
为您索检到100条磁力链接,耗时2毫秒。 rss

分享给好友

【影视】 [FreeCourseSite.com] Udemy - Reverse Engineering, Debugging and Malware Analysis - 2021
收录时间:2021-06-21 文档个数:51 文档大小:3.9 GB 最近下载:2025-05-16 人气:1991 磁力链接
  • mp46. Software Exploitation/6. Stack Guards Bypass - Part 2.mp4 664.4 MB
  • mp46. Software Exploitation/4. Methods Exploitation.mp4 537.6 MB
  • mp46. Software Exploitation/7. Evil Server.mp4 523.5 MB
  • mp46. Software Exploitation/5. Stack Guards Bypass.mp4 405.3 MB
  • mp45. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.mp4 273.9 MB
  • mp46. Software Exploitation/3. Stack Reliability and GCC Example.mp4 190.3 MB
  • mp46. Software Exploitation/2. Low-Level View and Managing Stacks.mp4 184.7 MB
  • mp46. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.mp4 166.4 MB
  • mp44. Malware and Memory Analysis/1. Volatility Cridex.mp4 161.0 MB
  • mp44. Malware and Memory Analysis/3. Cridex Malware Analysis.mp4 161.0 MB
  • mp41. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.mp4 122.9 MB
  • mp44. Malware and Memory Analysis/2. Volatility R2D2.mp4 95.0 MB
  • mp41. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.mp4 73.4 MB
  • mp43. Malware Behavior/2. Malware Identification.mp4 63.2 MB
  • mp43. Malware Behavior/3. Presistence.mp4 47.9 MB
  • mp41. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.mp4 41.7 MB
  • mp43. Malware Behavior/1. Analysis Tools.mp4 36.4 MB
  • mp42. Operating System Components/4. Volatile Memory.mp4 36.0 MB
  • mp42. Operating System Components/2. Non-Volatile Memory.mp4 33.6 MB
  • mp42. Operating System Components/3. The Windows Registry.mp4 28.8 MB
【影视】 Practical Malware Development - Beginner Level
收录时间:2021-03-25 文档个数:120 文档大小:1.6 GB 最近下载:2025-05-16 人气:1927 磁力链接
  • mov[TutsNode.com] - Practical Malware Development - Beginner Level/04 Developing the Control Panel/018 18.Creating-a-login-page.mov 174.3 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/05 Puting All Together/026 Putting All Together (Last Touches In Client Software).mp4 111.6 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/03 Developing the Windows Malware/012 Creating Necessary Functions for Returning Information.mp4 110.9 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/04 Developing the Control Panel/025 Creating the Victim Management Pages.mp4 105.6 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/03 Developing the Windows Malware/010 Downloading Files in Victim System.mp4 87.0 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/03 Developing the Windows Malware/011 Directory Operations.mp4 80.3 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/04 Developing the Control Panel/021 Creating the Main Page of Control Panel.mp4 78.7 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/04 Developing the Control Panel/023 Creating the Command Sender Page.mp4 77.8 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/03 Developing the Windows Malware/009 Gaining Persistence on System.mp4 72.4 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/03 Developing the Windows Malware/008 Gathering Information About The Victim Computer.mp4 70.0 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/03 Developing the Windows Malware/013 Executing Commands via CMD.mp4 67.2 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/03 Developing the Windows Malware/014 Dealing with Exceptions and Fixing a minor Bug.mp4 65.2 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/02 Setting Up The Environment/005 Installing Guest Additions.mp4 51.7 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/02 Setting Up The Environment/006 Creating First Windows Application.mp4 49.6 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/03 Developing the Windows Malware/015 Connecting to the Attacker Server.mp4 47.2 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/04 Developing the Control Panel/018 Creating Login Page.mp4 43.8 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/02 Setting Up The Environment/007 Installing Apache, PHP, MySQL and ATOM on Ubuntu.mp4 40.6 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/04 Developing the Control Panel/024 Creating the Result Reciever Page.mp4 38.2 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/04 Developing the Control Panel/022 Creating the Registration Page for Victims.mp4 37.9 MB
  • mp4[TutsNode.com] - Practical Malware Development - Beginner Level/04 Developing the Control Panel/016 Creating a Database For Control Panel.mp4 35.0 MB
【影视】 Futanari.24.10.18.Fanta.Sie.And.Matty.Mila.Malware.XXX.1080p.MP4-FETiSH[XC]
收录时间:2024-11-22 文档个数:2 文档大小:1.0 GB 最近下载:2025-05-16 人气:1923 磁力链接
  • mp4futanari.24.10.18.fanta.sie.and.matty.mila.malware.mp4 1.0 GB
  • nfoTorrent Downloaded From XXXClub.to .nfo 34 Bytes
【影视】 [UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
收录时间:2022-05-07 文档个数:38 文档大小:285.9 MB 最近下载:2025-05-15 人气:1880 磁力链接
  • mp405. Identifying Malware Use of Cryptography/01. Purpose of Cryptography in Malware.mp4 20.7 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/03. Demo - Dynamic API Resolution.mp4 20.7 MB
  • mp405. Identifying Malware Use of Cryptography/03. Demo - Finding Cryptography.mp4 19.9 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/04. Lab - Tracing Import Table Construction.mp4 19.5 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/02. Walking the PEB, Parsing a PE.mp4 19.1 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Obfuscation in Visual Basic for Applications (VBA).mp4 19.0 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/04. Lab - Defeating String Obfuscation.mp4 17.8 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Demo - Defeating VBA Obfuscation.mp4 17.5 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/03. Demo - Identifying String Obfuscation.mp4 15.5 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Demo - Defeating PowerShell Obfuscation.mp4 15.5 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Lab - Performing Comprehensive Analysis.mp4 14.5 MB
  • mp401. How Obfuscation Affects Your Analysis/02. How Obfuscation Impacts Analysis.mp4 12.3 MB
  • mp405. Identifying Malware Use of Cryptography/04. Lab - Analyzing Malware That Uses Cryptography.mp4 10.7 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/02. String Obfuscation.mp4 8.9 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Prevalent Obfuscation Techniques.mp4 6.8 MB
  • mp405. Identifying Malware Use of Cryptography/02. Tools to Help Identify Use of Cryptography .mp4 6.0 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/01. Differences from Interpreted Code.mp4 5.3 MB
  • mp401. How Obfuscation Affects Your Analysis/03. What You Should Know.mp4 5.3 MB
  • mp401. How Obfuscation Affects Your Analysis/01. Understanding Code Obfuscation.mp4 4.3 MB
  • mp400. Course Overview/00. Course Overview.mp4 3.6 MB
【影视】 Malware Hunting with Mark Russinovich and Sysinternals Tools
收录时间:2017-03-15 文档个数:100 文档大小:359.7 MB 最近下载:2025-05-16 人气:1806 磁力链接
  • mp4Malware Hunting with Mark Russinovich and the Sysinternals Tools.mp4 324.0 MB
  • txtReadme.txt 3.0 kB
  • txtSysinternals Suite May 26 2015 RELEASE/Readme.txt 2.8 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/accesschk.exe 683.2 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AccessEnum.exe 175.0 kB
  • chmSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AdExplorer.chm 50.4 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADExplorer.exe 479.8 kB
  • chmSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.chm 401.6 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.exe 1.0 MB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/adrestore.exe 150.3 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autologon.exe 148.9 kB
  • chmSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autoruns.chm 50.5 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autoruns.exe 680.6 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autorunsc.exe 593.0 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Bginfo.exe 847.0 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Cacheset.exe 154.4 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Clockres.exe 151.9 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Contig.exe 208.0 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Coreinfo.exe 892.1 kB
  • sysSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ctrl2cap.amd.sys 10.1 kB
【影视】 Reverse Engineering, Debugging and Malware Analysis - 2021
收录时间:2022-01-12 文档个数:26 文档大小:3.9 GB 最近下载:2025-05-16 人气:1623 磁力链接
  • mp406 Software Exploitation/006 Stack Guards Bypass - Part 2.mp4 664.4 MB
  • mp406 Software Exploitation/004 Methods Exploitation.mp4 537.6 MB
  • mp406 Software Exploitation/007 Evil Server.mp4 523.5 MB
  • mp406 Software Exploitation/005 Stack Guards Bypass.mp4 405.3 MB
  • mp405 Debugging/001 Low Level (Assembly) Debugging With Immunity Debugger.mp4 273.9 MB
  • mp406 Software Exploitation/003 Stack Reliability and GCC Example.mp4 190.3 MB
  • mp406 Software Exploitation/002 Low-Level View and Managing Stacks.mp4 184.7 MB
  • mp406 Software Exploitation/001 Software Exploitation Intro and Stack Frames in Memory.mp4 166.4 MB
  • mp404 Malware and Memory Analysis/001 Volatility Cridex.mp4 161.0 MB
  • mp404 Malware and Memory Analysis/003 Cridex Malware Analysis.mp4 161.0 MB
  • mp401 Reverse Engineering Fundamentals/001 Reverse Engineering Fundamentals.mp4 122.9 MB
  • mp404 Malware and Memory Analysis/002 Volatility R2D2.mp4 95.0 MB
  • mp401 Reverse Engineering Fundamentals/002 Reverse Engineering Tools.mp4 73.4 MB
  • mp403 Malware Behavior/002 Malware Identification.mp4 63.2 MB
  • mp403 Malware Behavior/003 Presistence.mp4 47.9 MB
  • mp401 Reverse Engineering Fundamentals/003 Analysis Types and Reporting.mp4 41.7 MB
  • mp403 Malware Behavior/001 Analysis Tools.mp4 36.4 MB
  • mp402 Operating System Components/004 Volatile Memory.mp4 36.0 MB
  • mp402 Operating System Components/002 Non-Volatile Memory.mp4 33.6 MB
  • mp402 Operating System Components/003 The Windows Registry.mp4 28.8 MB
【影视】 [FreeCourseLab.com] Udemy - How Hackers Create Malware and Infiltrate Victim Machines
收录时间:2018-11-12 文档个数:21 文档大小:173.7 MB 最近下载:2025-05-06 人气:1562 磁力链接
  • mp41. Introduction/1. Introduction and Welcome.mp4 13.9 MB
  • vtt1. Introduction/1. Introduction and Welcome.vtt 8.4 kB
  • mp42. Initial Building Blocks/1. Introduction to Malware and Trojans.mp4 8.1 MB
  • vtt2. Initial Building Blocks/1. Introduction to Malware and Trojans.vtt 5.3 kB
  • mp42. Initial Building Blocks/2. Installing C C++ Compiler.mp4 14.9 MB
  • vtt2. Initial Building Blocks/2. Installing C C++ Compiler.vtt 5.7 kB
  • mp42. Initial Building Blocks/3. Downloading Additional Applications.mp4 15.1 MB
  • vtt2. Initial Building Blocks/3. Downloading Additional Applications.vtt 5.7 kB
  • mp43. Lets Create Malware!/1. Creating a Malware Program with Codeblocks.mp4 23.3 MB
  • vtt3. Lets Create Malware!/1. Creating a Malware Program with Codeblocks.vtt 9.5 kB
  • mp43. Lets Create Malware!/2. Running Apache Server and Uploading Malware to Server.mp4 31.3 MB
  • vtt3. Lets Create Malware!/2. Running Apache Server and Uploading Malware to Server.vtt 10.0 kB
  • mp43. Lets Create Malware!/3. Using Reverse Shell on Victim's PC.mp4 26.4 MB
  • vtt3. Lets Create Malware!/3. Using Reverse Shell on Victim's PC.vtt 9.0 kB
  • mp43. Lets Create Malware!/4. Viewing Access Logs and Introduction to the Metasploit Framerwork.mp4 23.2 MB
  • vtt3. Lets Create Malware!/4. Viewing Access Logs and Introduction to the Metasploit Framerwork.vtt 8.6 kB
  • mp43. Lets Create Malware!/5. What to Do When Victim is on a Different Network.mp4 8.8 MB
  • vtt3. Lets Create Malware!/5. What to Do When Victim is on a Different Network.vtt 3.2 kB
  • mp43. Lets Create Malware!/6. Using Metasploit to Create an Exploit.mp4 8.7 MB
  • vtt3. Lets Create Malware!/6. Using Metasploit to Create an Exploit.vtt 3.7 kB
【影视】 [ DevCourseWeb.com ] Udemy - A-Z Malware Design and Analysis
收录时间:2022-02-09 文档个数:28 文档大小:1.6 GB 最近下载:2025-05-15 人气:1522 磁力链接
  • mp4~Get Your Files Here !/01 - Part 1 - Essential Theories/004 Binary Analysis Fundementals.mp4 484.4 MB
  • mp4~Get Your Files Here !/01 - Part 1 - Essential Theories/002 Lecture 2_ Malware Introdcution.mp4 210.2 MB
  • mp4~Get Your Files Here !/02 - Practical Part/005 Learning how to setup and use IDA-Pro.mp4 193.7 MB
  • mp4~Get Your Files Here !/03 - Write your own malware_/001 Create your own real-world malware for learning and analysis - part 1.mp4 170.0 MB
  • mp4~Get Your Files Here !/01 - Part 1 - Essential Theories/003 Lecture 3_ Software Exploitations in Malware Design.mp4 123.0 MB
  • mp4~Get Your Files Here !/03 - Write your own malware_/004 Create your own real-world malware for learning and analysis - Last part.mp4 92.4 MB
  • mp4~Get Your Files Here !/02 - Practical Part/003 How to pack and unpack executable files.mp4 88.1 MB
  • mp4~Get Your Files Here !/03 - Write your own malware_/002 Create your own real-world malware for learning and analysis - part 2.mp4 86.3 MB
  • mp4~Get Your Files Here !/02 - Practical Part/001 Understanding the PE analysis of an executable file { part 1 }.mp4 82.0 MB
  • mp4~Get Your Files Here !/02 - Practical Part/002 Analying the PE structure of your executable file.mp4 45.0 MB
  • mp4~Get Your Files Here !/03 - Write your own malware_/003 Create your own real-world malware for learning and analysis - part 3.mp4 18.7 MB
  • mp4~Get Your Files Here !/02 - Practical Part/004 Identidying the packing algorithm used in a given file.mp4 14.4 MB
  • mp4~Get Your Files Here !/01 - Part 1 - Essential Theories/001 Introduction.mp4 13.3 MB
  • srt~Get Your Files Here !/01 - Part 1 - Essential Theories/004 Binary Analysis Fundementals_en.srt 102.8 kB
  • srt~Get Your Files Here !/03 - Write your own malware_/001 Create your own real-world malware for learning and analysis - part 1_en.srt 46.0 kB
  • srt~Get Your Files Here !/01 - Part 1 - Essential Theories/003 Lecture 3_ Software Exploitations in Malware Design_en.srt 33.0 kB
  • srt~Get Your Files Here !/02 - Practical Part/005 Learning how to setup and use IDA-Pro_en.srt 22.0 kB
  • srt~Get Your Files Here !/02 - Practical Part/001 Understanding the PE analysis of an executable file { part 1 }_en.srt 19.4 kB
  • srt~Get Your Files Here !/02 - Practical Part/003 How to pack and unpack executable files_en.srt 12.4 kB
  • srt~Get Your Files Here !/03 - Write your own malware_/002 Create your own real-world malware for learning and analysis - part 2_en.srt 12.2 kB
【影视】 build-undetectable-malware-using-c-language-ethical-hacking
收录时间:2022-01-10 文档个数:53 文档大小:4.3 GB 最近下载:2025-05-12 人气:1502 磁力链接
  • mp4course/05 - Creating Persistance & Nesting Our Program In Windows Registry/002 Interacting With Registry In Order To Start Our Program Automaticly.mp4 370.4 MB
  • mp4course/07 - Hacking Windows 10/002 Hacking Windows 10 Target With Our Program.mp4 319.3 MB
  • mp4course/02 - Hiding Our Program & Defining Connection Points/003 Defining Connection Points To Our Backdoor.mp4 305.9 MB
  • mp4course/03 - Building Shell Function & Executing Commands/003 Server Socket Initiation.mp4 301.5 MB
  • mp4course/03 - Building Shell Function & Executing Commands/004 Making Server Compatible With Our Backdoor.mp4 258.7 MB
  • mp4course/06 - Adding Keylogger To Our Malware/001 Understanding Keylogger Code.mp4 244.9 MB
  • mp4course/07 - Hacking Windows 10/004 Is It a Browser Or Backdoor.mp4 236.3 MB
  • mp4course/03 - Building Shell Function & Executing Commands/001 Creating Our Shell Function.mp4 231.8 MB
  • mp4course/03 - Building Shell Function & Executing Commands/002 Executing Commands On Target Machine.mp4 223.5 MB
  • mp4course/03 - Building Shell Function & Executing Commands/005 Testing Our Malware For Command Execution.mp4 221.2 MB
  • mp4course/01 - Introduction & Welcome To Hacking With C!/004 How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).mp4 201.9 MB
  • mp4course/02 - Hiding Our Program & Defining Connection Points/002 Hiding Our Program Console Window.mp4 179.1 MB
  • mp4course/04 - Switching Directories Inside Of A Program/001 Changing Our Program Directory.mp4 174.5 MB
  • mp4course/07 - Hacking Windows 10/003 You Have Been Hacked.mp4 174.0 MB
  • mp4course/02 - Hiding Our Program & Defining Connection Points/001 Explaining Malware Structure & Including Needed Libraries.mp4 151.3 MB
  • mp4course/06 - Adding Keylogger To Our Malware/002 Adding Keylogger Function To Our Backdoor.mp4 149.5 MB
  • mp4course/02 - Hiding Our Program & Defining Connection Points/005 Attempting Connection Every 10 Seconds With Our Target.mp4 138.3 MB
  • mp4course/01 - Introduction & Welcome To Hacking With C!/002 What Are We Going To Learn In This Course & What You Need To Know!.mp4 108.8 MB
  • mp4course/01 - Introduction & Welcome To Hacking With C!/003 Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine.mp4 104.0 MB
  • mp4course/07 - Hacking Windows 10/001 Updating Our Server Code.mp4 102.4 MB
【影视】 [FreeTutorials.Us] undetectable-malware
收录时间:2018-01-31 文档个数:20 文档大小:291.0 MB 最近下载:2025-05-10 人气:1448 磁力链接
  • mp401-we-begin-here/001-welcome-and-introduction.mp4 3.3 MB
  • mp401-we-begin-here/002-introduction-to-undetectable-malware.mp4 36.7 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/003-installing-python-and-pip.mp4 14.2 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/004-installing-veilframework.mp4 11.6 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/005-setting-up-the-veil-framework.mp4 48.6 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/006-installing-gnome-desktop.mp4 45.1 MB
  • mp403-veil-and-metasploit/007-wine-mono-and-veilevasion-installation.mp4 6.6 MB
  • mp403-veil-and-metasploit/008-installing-metasploit.mp4 30.1 MB
  • mp403-veil-and-metasploit/009-metasploit-installation-complete.mp4 1.1 MB
  • mp403-veil-and-metasploit/010-testing-msf-console.mp4 1.8 MB
  • mp403-veil-and-metasploit/011-veil-evasion-final-installation.mp4 16.4 MB
  • mp403-veil-and-metasploit/012-adding-the-metasploit-folder-to-veil-installation.mp4 1.5 MB
  • mp403-veil-and-metasploit/013-introduction-to-veil-and-the-importance-in-ethical-hacking.mp4 10.7 MB
  • mp404-how-hackers-create-undetectable-malware/014-creating-an-exploit.mp4 26.5 MB
  • mp404-how-hackers-create-undetectable-malware/015-testing-exploit-on-windows-10-machine.mp4 32.2 MB
  • mp404-how-hackers-create-undetectable-malware/016-encrypting-payload.mp4 4.7 MB
  • txt[FreeCoursesOnline.Us].txt 138 Bytes
  • urlFreeCoursesOnline.Us.url 225 Bytes
  • txt[FreeTutorials.Us].txt 75 Bytes
  • urlFreetutorials.Us.url 119 Bytes
【影视】 License to Kill Malware Hunting with the Sysinternals Tools
收录时间:2017-03-08 文档个数:100 文档大小:913.6 MB 最近下载:2025-05-16 人气:1383 磁力链接
  • mp4License to Kill Malware Hunting with the Sysinternals Tools.mp4 877.9 MB
  • txtReadme.txt 3.3 kB
  • txtSysinternals Suite May 26 2015 RELEASE/Readme.txt 2.8 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/accesschk.exe 683.2 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AccessEnum.exe 175.0 kB
  • chmSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AdExplorer.chm 50.4 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADExplorer.exe 479.8 kB
  • chmSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.chm 401.6 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.exe 1.0 MB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/adrestore.exe 150.3 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autologon.exe 148.9 kB
  • chmSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autoruns.chm 50.5 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autoruns.exe 680.6 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autorunsc.exe 593.0 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Bginfo.exe 847.0 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Cacheset.exe 154.4 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Clockres.exe 151.9 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Contig.exe 208.0 kB
  • exeSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Coreinfo.exe 892.1 kB
  • sysSysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ctrl2cap.amd.sys 10.1 kB
【影视】 Getting Started Analyzing Malware Infections
收录时间:2017-02-22 文档个数:51 文档大小:261.3 MB 最近下载:2025-05-07 人气:1327 磁力链接
  • pdfanalyzing-malware-infections-getting-started/1-analyzing-malware-infections-getting-started-m1-slides.pdf 692.4 kB
  • pdfanalyzing-malware-infections-getting-started/2-analyzing-malware-infections-getting-started-m2-slides.pdf 582.1 kB
  • pdfanalyzing-malware-infections-getting-started/3-analyzing-malware-infections-getting-started-m3-slides.pdf 411.5 kB
  • pdfanalyzing-malware-infections-getting-started/4-analyzing-malware-infections-getting-started-m4-slides.pdf 755.7 kB
  • pdfanalyzing-malware-infections-getting-started/5-analyzing-malware-infections-getting-started-m5-slides.pdf 527.6 kB
  • mp401 - Course Overview - Course Overview.mp4 7.3 MB
  • mp402 - Investigating Malware Infections - Problem Statement.mp4 4.8 MB
  • mp403 - Investigating Malware Infections - Understanding Phishing Tactics.mp4 6.5 MB
  • mp404 - Investigating Malware Infections - Indicators of Compromise.mp4 4.6 MB
  • mp405 - Investigating Malware Infections - Analyzing a Suspicious Mail.mp4 11.6 MB
  • mp406 - Investigating Malware Infections - Setting up an Analysis Environment.mp4 4.5 MB
  • mp407 - Investigating Malware Infections - Analyzing Malware Off Network.mp4 3.7 MB
  • mp408 - Investigating Malware Infections - Snapshotting.mp4 2.4 MB
  • mp409 - Investigating Malware Infections - Safe Handling Procedures.mp4 5.2 MB
  • mp410 - Investigating Malware Infections - Safe Handling in Practice.mp4 12.7 MB
  • mp411 - Investigating Malware Infections - Summary.mp4 2.3 MB
  • mp412 - Analyzing Malicious Links - Classifying Malicious Links.mp4 4.8 MB
  • mp413 - Analyzing Malicious Links - Exploit Kits.mp4 3.4 MB
  • mp414 - Analyzing Malicious Links - Malicious Resources.mp4 3.6 MB
  • mp415 - Analyzing Malicious Links - Victim's Perspective of an Infection.mp4 3.6 MB
【影视】 [FreeCoursesOnline.Me] Skillshare - Malware Analysis Course for IT security - [FCO]
收录时间:2018-11-22 文档个数:15 文档大小:489.7 MB 最近下载:2025-05-15 人气:1262 磁力链接
  • mp41. Introduction to Malware Analysis.mp4 7.1 MB
  • mp42. Malware Analysis Course Outline.mp4 9.9 MB
  • mp43. Malware Analysis Lab Setup.mp4 25.4 MB
  • mp44. Malware Analysis Taking and Restoring.mp4 26.9 MB
  • mp45. Part 1 Using Monitoring Tools.mp4 71.3 MB
  • mp46. Network Analysis.mp4 65.4 MB
  • mp47. Analyzing Inner Encryption.mp4 94.9 MB
  • mp48. Olly Essentials.mp4 85.6 MB
  • mp49. Analyzing and Decrypting Mysterious File.mp4 102.9 MB
  • htmlDiscuss.FreeTutorials.Us.html 169.7 kB
  • htmlFreeCoursesOnline.Me.html 110.9 kB
  • htmlFreeTutorials.Eu.html 104.7 kB
  • txtPresented By SaM.txt 33 Bytes
  • txt[TGx]Downloaded from torrentgalaxy.org.txt 524 Bytes
  • txtTorrent Downloaded From GloDls.to.txt 84 Bytes
【影视】 [FreeCoursesOnline.Me] SkillShare - Android Reversing And Malware Analysis
收录时间:2021-03-27 文档个数:15 文档大小:709.9 MB 最近下载:2025-05-16 人气:1226 磁力链接
  • mp47-Static analysis of android malware.mp4 210.6 MB
  • mp410-Dynamic analysis of android malware.mp4 77.5 MB
  • mp41-Apk in a Nutshell.mp4 76.0 MB
  • mp44-Reverse engg using apktool.mp4 72.1 MB
  • mp45-Introduction to android malwares.mp4 67.1 MB
  • mp49-Dynamic analysis with droidbox.mp4 61.1 MB
  • mp48-Introduction to android tamer.mp4 45.7 MB
  • mp43-Reversing the source code.mp4 43.0 MB
  • mp42-Introduction to Reverse Enginnering of Android App.mp4 30.0 MB
  • mp46-Dynamic vs static.mp4 26.9 MB
  • url0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles & Community based Forum.url 377 Bytes
  • url0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
  • url0. Websites you may like/3. (FTUApps.com) Download Cracked Developers Applications For Free.url 239 Bytes
  • txt0. Websites you may like/How you can help our Group!.txt 208 Bytes
  • url0. Websites you may like/2. (NulledPremium.com) Download E-Learning, E-Books, Audio-Books, & more.etc.url 163 Bytes
【影视】 [ DevCourseWeb.com ] Udemy - Learn Reverse Engineering With Android Malware Analysis
收录时间:2024-02-05 文档个数:710 文档大小:577.5 MB 最近下载:2025-05-15 人气:1223 磁力链接
  • mp4~Get Your Files Here !/5. Malware case study Exodus spyware/1. Exodus malware case study.mp4 77.2 MB
  • mp4~Get Your Files Here !/3. Building applications Android malware examples/1. Building and reverse engineering simple malware.mp4 72.3 MB
  • mp4~Get Your Files Here !/3. Building applications Android malware examples/2. Building a simple phishing application.mp4 55.5 MB
  • mp4~Get Your Files Here !/2. The Fundementals/4. Introduction to obfuscation in Android.mp4 48.0 MB
  • mp4~Get Your Files Here !/4. Miscellaneous Techniques/1. Retrieving application's from a device.mp4 44.6 MB
  • mp4~Get Your Files Here !/2. The Fundementals/2. Introduction to Android Malware Analysis.mp4 43.1 MB
  • mp4~Get Your Files Here !/1. Introduction/2. Tooling.mp4 41.0 MB
  • mp4~Get Your Files Here !/2. The Fundementals/1. Introduction to Android Reverse Engineering.mp4 39.6 MB
  • mp4~Get Your Files Here !/4. Miscellaneous Techniques/2. Using machine learning to identify malware.mp4 33.9 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 32.3 MB
  • mp4~Get Your Files Here !/6. Wrap Up/1. Thanks and wrap up.mp4 22.8 MB
  • pdf~Get Your Files Here !/2. The Fundementals/2.1 malware-book.pdf 20.3 MB
  • pdf~Get Your Files Here !/2. The Fundementals/2.2 malware-intro.pdf 8.3 MB
  • dex~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/dex/debug/mergeExtDexDebug/classes.dex 5.3 MB
  • pdf~Get Your Files Here !/2. The Fundementals/5.1 obfuscation.pdf 4.8 MB
  • apk~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/apk/debug/app-debug.apk 4.0 MB
  • pdf~Get Your Files Here !/2. The Fundementals/1.2 reverse-engineering.pdf 3.5 MB
  • pdf~Get Your Files Here !/2. The Fundementals/1.1 ios-and-android-re.pdf 3.5 MB
  • xml~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/incremental/mergeDebugResources/merger.xml 1.6 MB
  •  Building applications  Android malware examples/simplemalware/app/build/intermediates/incremental/debug-mergeJavaRes/zip-cache/93DqCsxRP16jyBW1wbfr9hOZXiw=~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/incremental/debug-mergeJavaRes/zip-cache/93DqCsxRP16jyBW1wbfr9hOZXiw= 1.4 MB
【影视】 InfernalRestraints.18.07.06.Alex.More.Malware.XXX.720p.MP4-KTR[rarbg]
收录时间:2018-08-02 文档个数:3 文档大小:3.0 GB 最近下载:2025-05-16 人气:1161 磁力链接
  • txtRARBG.txt 30 Bytes
  • mp4infernalrestraints.18.07.06.alex.more.malware.mp4 3.0 GB
  • nfoinfernalrestraints.18.07.06.alex.more.malware.nfo 5.2 kB
【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics V2 - Classic and Ai - Chatgpt In Decoding and Evasion
收录时间:2024-04-26 文档个数:35 文档大小:1.4 GB 最近下载:2025-05-14 人气:1126 磁力链接
  • mp4~Get Your Files Here !/2 - Decoding the Hidden Unpacking and Analyzing Encoded Malware/9 - Lab Exercise Insights into Encoded Executable File with EXEinfoPE.mp4 236.5 MB
  • mp4~Get Your Files Here !/4 - AI ChatGPT Driven Malware Analysis Static Techniques to Reverse Engineering/22 - Lab Exercise AI in Static Malware Analysis.mp4 145.4 MB
  • mp4~Get Your Files Here !/2 - Decoding the Hidden Unpacking and Analyzing Encoded Malware/7 - Lab Exercise Analyzing Encoded Malicious Executables with PEiD.mp4 138.4 MB
  • mp4~Get Your Files Here !/3 - Advanced Evasion Techniques and Analyzing Encrypted Malware/16 - LAB Partial File Encryption Payload Injection Malware Analysis.mp4 118.3 MB
  • mp4~Get Your Files Here !/3 - Advanced Evasion Techniques and Analyzing Encrypted Malware/14 - LAB Encrypted Malware Executable File Analysis by VT VSJ.mp4 74.2 MB
  • mp4~Get Your Files Here !/4 - AI ChatGPT Driven Malware Analysis Static Techniques to Reverse Engineering/24 - Lab Exercise Utilizing Random Forest Regressors in Malware Impact Prediction.mp4 66.5 MB
  • mp4~Get Your Files Here !/4 - AI ChatGPT Driven Malware Analysis Static Techniques to Reverse Engineering/25 - Lab Exercise ChatGPTAssisted Reverse Engineering in Malware Assembly Analysis.mp4 57.7 MB
  • mp4~Get Your Files Here !/3 - Advanced Evasion Techniques and Analyzing Encrypted Malware/15 - LAB Payload Encryption Malware Analysis.mp4 44.3 MB
  • mp4~Get Your Files Here !/4 - AI ChatGPT Driven Malware Analysis Static Techniques to Reverse Engineering/21 - Key Static Features Identification for Enhanced AI Malware Analysis.mp4 39.7 MB
  • mp4~Get Your Files Here !/2 - Decoding the Hidden Unpacking and Analyzing Encoded Malware/10 - Lab Exercise Decoding UPXPacked Malware with VirusTotal Analysis.mp4 36.0 MB
  • mp4~Get Your Files Here !/4 - AI ChatGPT Driven Malware Analysis Static Techniques to Reverse Engineering/23 - Lab Exercise Neural Networks in Static Malware Analysis.mp4 34.9 MB
  • mp4~Get Your Files Here !/2 - Decoding the Hidden Unpacking and Analyzing Encoded Malware/6 - Demystifying Executables Insights into PEiD.mp4 34.8 MB
  • mp4~Get Your Files Here !/6 - Advancing into NextGen ChatGPT and AIDriven Malware Analysis/31 - Recap and Integration of Learned Concepts.mp4 34.1 MB
  • mp4~Get Your Files Here !/3 - Advanced Evasion Techniques and Analyzing Encrypted Malware/18 - Navigating the Blind Spots Strategies for Responses to Malware Evasion Techniqu.mp4 30.0 MB
  • mp4~Get Your Files Here !/2 - Decoding the Hidden Unpacking and Analyzing Encoded Malware/8 - Decoding Executable with EXEinfo PE.mp4 27.8 MB
  • mp4~Get Your Files Here !/3 - Advanced Evasion Techniques and Analyzing Encrypted Malware/12 - Advanced Malware Evasion Techniques.mp4 24.7 MB
  • mp4~Get Your Files Here !/1 - Malware Forensics Classic Strategies and AIDriven Techniques/1 - Harnessing AI in Malware Forensics.mp4 22.4 MB
  • mp4~Get Your Files Here !/3 - Advanced Evasion Techniques and Analyzing Encrypted Malware/17 - Unveiling Hidden Malware Techniques for Behavioral Analysis of Encrypted Execut.mp4 22.0 MB
  • mp4~Get Your Files Here !/2 - Decoding the Hidden Unpacking and Analyzing Encoded Malware/5 - Lab Exercise Encoding Executable Files with UPX.mp4 21.8 MB
  • mp4~Get Your Files Here !/3 - Advanced Evasion Techniques and Analyzing Encrypted Malware/13 - Unveiling the Cloak Malware Evasion and Detection Strategies.mp4 21.3 MB
【影视】 [FreeCoursesOnline.Me] [Packt] Advanced Malware Analysis - [FCO]
收录时间:2021-05-18 文档个数:40 文档大小:691.2 MB 最近下载:2025-05-15 人气:1123 磁力链接
  • mp43.Advanced Dynamic Malware Analysis/14.Malware Analysis Using OllyDbg.mp4 64.6 MB
  • mp45.How to Detect and Defend against Malware in a Network/29.How to Setup Snort.mp4 49.8 MB
  • mp46.How to Deal with Evasive Malware/33.Examples of Unpacking a Malware Program.mp4 49.1 MB
  • mp43.Advanced Dynamic Malware Analysis/15.Features of OllyDbg.mp4 44.1 MB
  • mp44.Advanced Static Malware Analysis/21.Loading and Navigating Using IDA Pro.mp4 39.1 MB
  • mp44.Advanced Static Malware Analysis/24.Analysing Malware Using IDA Pro.mp4 35.7 MB
  • mp43.Advanced Dynamic Malware Analysis/17.Malware Analysis Using WINDBG.mp4 34.0 MB
  • mp44.Advanced Static Malware Analysis/22.Functions in IDA.mp4 31.6 MB
  • mp44.Advanced Static Malware Analysis/23.IDA Pro Graphic Features.mp4 31.2 MB
  • mp43.Advanced Dynamic Malware Analysis/18.Features of WINDBG.mp4 23.9 MB
  • mp46.How to Deal with Evasive Malware/31.How to Detect Packed Malware.mp4 21.7 MB
  • mp41.Exploring Malware Functionalities/02.Backdoors.mp4 21.0 MB
  • mp41.Exploring Malware Functionalities/06.Rootkits.mp4 19.0 MB
  • mp42.Malware Advanced Techniques/09.Data Encoding.mp4 17.7 MB
  • mp41.Exploring Malware Functionalities/05.Ransomware.mp4 16.9 MB
  • mp44.Advanced Static Malware Analysis/19.Advanced Notes on the x86 Architecture.mp4 16.9 MB
  • mp41.Exploring Malware Functionalities/01.The Course Overview.mp4 16.8 MB
  • mp43.Advanced Dynamic Malware Analysis/12.An Overview of the Windows Environment.mp4 15.4 MB
  • mp42.Malware Advanced Techniques/07.Privilege Escalation.mp4 14.3 MB
  • mp42.Malware Advanced Techniques/10.Covert Launching Techniques.mp4 14.2 MB
【影视】 Futanari.24.10.18.Fanta.Sie.And.Matty.Mila.Malware.XXX.1080p.HEVC.x265.PRT
收录时间:2024-11-29 文档个数:2 文档大小:499.8 MB 最近下载:2025-05-15 人气:1037 磁力链接
  • mp4Futanari.24.10.18.Fanta.Sie.And.Matty.Mila.Malware.XXX.1080p.HEVC.x265.PRT.mp4 499.8 MB
  • nfoProvided by PornRips.to.nfo 47 Bytes
【影视】 InfernalRestraints.18.07.06.Alex.More.Malware.XXX.SD.MP4-KLEENEX
收录时间:2018-07-27 文档个数:2 文档大小:437.1 MB 最近下载:2025-05-15 人气:1021 磁力链接
  • mp4InfernalRestraints.18.07.06.Alex.More.Malware.XXX.SD.MP4-KLEENEX.mp4 437.1 MB
  • txtRARBG.txt 30 Bytes
共5页 上一页 1 2 3 4 5 下一页