磁力管家

磁力管家
为您索检到100条磁力链接,耗时2毫秒。 rss

分享给好友

【影视】 [FreeCoursesOnline.Me] [LYNDA] Learning Android Malware Analysis [FCO]
收录时间:2022-01-24 文档个数:40 文档大小:233.2 MB 最近下载:2025-05-15 人气:681 磁力链接
  • mp404 - Hunting for Malicious Activity/06 - Solution StealthMango.mp4 64.6 MB
  • mp402 - Setting Up a Malware Analysis Lab/02 - Installing reverse-engineering tools Mac.mp4 16.6 MB
  • mp402 - Setting Up a Malware Analysis Lab/03 - Installing reverse-engineering tools PC.mp4 16.1 MB
  • mp404 - Hunting for Malicious Activity/03 - Common malicious functionality.mp4 16.1 MB
  • mp405 - Conclusion/01 - Next steps.mp4 14.5 MB
  • mp402 - Setting Up a Malware Analysis Lab/04 - Finding malicious mobile applications.mp4 14.0 MB
  • mp403 - Decompiling Android Applications/02 - The manifest, classes, and resource files.mp4 12.2 MB
  • mp404 - Hunting for Malicious Activity/04 - Exfiltrated data, C2 servers, and strings.mp4 12.0 MB
  • mp403 - Decompiling Android Applications/01 - What makes an Android application.mp4 11.0 MB
  • mp402 - Setting Up a Malware Analysis Lab/01 - An overview of common analysis tools.mp4 10.5 MB
  • mp401 - Introduction/01 - Analyzing malicious Android applications.mp4 10.4 MB
  • mp404 - Hunting for Malicious Activity/02 - What are spyware applications.mp4 7.9 MB
  • mp404 - Hunting for Malicious Activity/01 - Permissions, permissions, permissions!.mp4 7.7 MB
  • mp403 - Decompiling Android Applications/04 - Decompiling the application.mp4 6.7 MB
  • mp401 - Introduction/02 - What you should know.mp4 5.3 MB
  • mp404 - Hunting for Malicious Activity/05 - Challenge StealthMango.mp4 3.8 MB
  • mp403 - Decompiling Android Applications/03 - Viewing app resources with APKTool.mp4 3.7 MB
  • srt02 - Setting Up a Malware Analysis Lab/02 - Installing reverse-engineering tools Mac.srt 12.4 kB
  • srt02 - Setting Up a Malware Analysis Lab/03 - Installing reverse-engineering tools PC.srt 10.3 kB
  • srt02 - Setting Up a Malware Analysis Lab/04 - Finding malicious mobile applications.srt 8.4 kB
【影视】 Glarysoft Malware Hunter PRO
收录时间:2024-12-15 文档个数:7 文档大小:301.2 MB 最近下载:2025-05-15 人气:729 磁力链接
  • wmvVideo instaLL.wmv 241.2 MB
  • exeGlarysoft Malware Hunter PRO.exe 57.7 MB
  • exeCrack/MalwareHunter.exe 1.2 MB
  • dllCrack/Register.dll 1.0 MB
  • txtCrack/FULL Information.txt 6.5 kB
  • txtINFO.txt 2.2 kB
  • nfoinfo.nfo 1.2 kB
【影视】 [FreeCourseLab.com] Udemy - How Hackers Create Undetectable Malware and Viruses
收录时间:2022-01-10 文档个数:33 文档大小:291.2 MB 最近下载:2025-05-15 人气:6673 磁力链接
  • mp42. Understanding Malware and Creating the Hacking Environment/3. Setting Up The Veil Framework.mp4 48.6 MB
  • mp42. Understanding Malware and Creating the Hacking Environment/4. Installing Gnome Desktop.mp4 45.1 MB
  • mp41. We Begin Here/2. Introduction to Undetectable Malware.mp4 36.7 MB
  • mp44. How Hackers Create Undetectable Malware/2. Testing Exploit on Windows 10 Machine.mp4 32.2 MB
  • mp43. Veil and Metasploit/2. Installing Metasploit.mp4 30.1 MB
  • mp44. How Hackers Create Undetectable Malware/1. Creating an Exploit.mp4 26.5 MB
  • mp43. Veil and Metasploit/5. Veil Evasion Final Installation.mp4 16.4 MB
  • mp42. Understanding Malware and Creating the Hacking Environment/1. Installing Python and Pip.mp4 14.2 MB
  • mp42. Understanding Malware and Creating the Hacking Environment/2. Installing Veil-Framework.mp4 11.6 MB
  • mp43. Veil and Metasploit/7. Introduction to Veil and The Importance in Ethical Hacking.mp4 10.7 MB
  • mp43. Veil and Metasploit/1. Wine Mono and Veil-Evasion Installation.mp4 6.6 MB
  • mp44. How Hackers Create Undetectable Malware/3. Encrypting Payload.mp4 4.8 MB
  • mp41. We Begin Here/1. Welcome and Introduction.mp4 3.3 MB
  • mp43. Veil and Metasploit/4. Testing MSF Console.mp4 1.8 MB
  • mp43. Veil and Metasploit/6. Adding the Metasploit Folder to Veil Installation.mp4 1.5 MB
  • mp43. Veil and Metasploit/3. Metasploit Installation Complete.mp4 1.1 MB
  • vtt4. How Hackers Create Undetectable Malware/2. Testing Exploit on Windows 10 Machine.vtt 13.6 kB
  • vtt4. How Hackers Create Undetectable Malware/1. Creating an Exploit.vtt 12.4 kB
  • vtt3. Veil and Metasploit/2. Installing Metasploit.vtt 10.4 kB
  • vtt1. We Begin Here/2. Introduction to Undetectable Malware.vtt 10.3 kB
【影视】 Cisco Press - Cisco Firepower and Advanced Malware Protection LiveLessons
收录时间:2017-02-11 文档个数:59 文档大小:2.1 GB 最近下载:2025-05-15 人气:4974 磁力链接
  • mp41.4 Understanding Advanced Malware Protection (AMP) for Endpoints and Networks.mp4 141.3 MB
  • mp41.8 Understanding the Cisco Identity Services Engine (ISE).mp4 116.9 MB
  • mp42.1 Understanding Inline vs. Promiscuous Mode.mp4 116.1 MB
  • mp41.1 Understanding the New Security Threat Landscape and the Attack Continuum.mp4 75.6 MB
  • mp43.6 Troubleshooting Cisco ASA with FirePOWER Services.mp4 72.9 MB
  • mp41.6 Understanding Cisco Email Security.mp4 69.9 MB
  • mp44.1 Introducing Cisco AMP for Networks.mp4 64.3 MB
  • mp41.2 Understanding the Cisco ASA Next-Generation Firewalls and the FirePOWER Module.mp4 63.0 MB
  • mp47.1 Cisco Next-Generation IPS Deployment Scenarios.mp4 59.9 MB
  • mp44.2 Understanding Cisco AMP for Networks Licensing.mp4 59.4 MB
  • mp42.7 Understanding Cisco ASA FirePOWER Services and High Availability.mp4 58.0 MB
  • mp41.7 Understanding Cisco Web Security.mp4 50.9 MB
  • mp44.4 Troubleshooting Cisco AMP for Networks.mp4 49.8 MB
  • mp41.3 Understanding Next-Generation Intrusion Prevention Systems (NGIPS).mp4 48.6 MB
  • mp40. Cisco Firepower and Advanced Malware Protection LiveLessons- Introduction.mp4 48.0 MB
  • mp45.6 Events, File Analysis, Threat Root Cause, and Advanced Reporting.mp4 47.9 MB
  • mp42.3 Understanding Cisco ASA FirePOWER Services Sizing.mp4 45.1 MB
  • mp47.2 Configuring Cisco Next-Generation IPS Policies and Rules.mp4 44.6 MB
  • mp43.4 Configuring the Cisco ASA FirePOWER Module Using the Adaptive Security Device Manager (ASDM).mp4 43.7 MB
  • mp43.7 Configuring Cisco Firepower Threat Defense.mp4 39.3 MB
【影视】 [UdemyCourseDownloader] How to Create and Embed Malware
收录时间:2023-12-17 文档个数:59 文档大小:1.2 GB 最近下载:2025-05-15 人气:192 磁力链接
  • mp43. Payload Binding Methods/2. Embedding Malware in Normal PDF.mp4 84.7 MB
  • mp48. Create and Embed Malware Through Android/7. Embedding Malware in PDF.mp4 78.3 MB
  • mp48. Create and Embed Malware Through Android/8. Embedding Malware in Image.mp4 77.7 MB
  • mp43. Payload Binding Methods/1. Embedding Malware in Original Apk.mp4 72.3 MB
  • mp45. Create an Undetectable Payload/1. Create Undetectable Python Payloads that Bypass Antiviruses.mp4 69.2 MB
  • mp42. Create Payloads to Hack Different Operating systems/4. Create a Payload and Hack any Android Device.mp4 59.4 MB
  • mp41. Introduction/1. Introduction.mp4 50.5 MB
  • mp44. Create a Malware to Hack Over Wan/2. Hack Any Windows Machine Which is Outside The Network using Netcat tool.mp4 46.9 MB
  • mp44. Create a Malware to Hack Over Wan/3. Hack Any Android Device From Anywhere Over Internet.mp4 44.4 MB
  • mp47. Hack or Recover saved Passwords from Windows Machine/2. Get Every Single Saved Password from Remote Machine.mp4 44.2 MB
  • mp42. Create Payloads to Hack Different Operating systems/6. Create Payload and Hack Linux Systems.mp4 44.0 MB
  • mp42. Create Payloads to Hack Different Operating systems/2. Creating a Simple Payload with Metasploit.mp4 40.2 MB
  • mp47. Hack or Recover saved Passwords from Windows Machine/3. Steal Passwords Using the USB Drive.mp4 38.0 MB
  • mp46. How to be Safe From Above Attacks/2. Detect Meterpreter in Your PC using Antipwny.mp4 37.7 MB
  • mp48. Create and Embed Malware Through Android/4. Hacking Windows Machine Using Metasploit Framework.mp4 37.4 MB
  • mp42. Create Payloads to Hack Different Operating systems/1. Introduction to Metasploit.mp4 36.6 MB
  • mp42. Create Payloads to Hack Different Operating systems/5. Create Payload and Hack any Windows Machines.mp4 36.4 MB
  • mp48. Create and Embed Malware Through Android/5. Hacking Linux Machine using Metasploit.mp4 35.5 MB
  • mp48. Create and Embed Malware Through Android/3. Introduction and Installing Metasploit Framework.mp4 33.6 MB
  • mp48. Create and Embed Malware Through Android/6. Hack Andriod Devices using Metasploit.mp4 33.4 MB
【影视】 InfernalRestraints.18.07.06.Alex.More.Malware.XXX.SD
收录时间:2018-07-25 文档个数:1 文档大小:437.1 MB 最近下载:2025-05-15 人气:2439 磁力链接
  • mp4InfernalRestraints.18.07.06.Alex.More.Malware.XXX.SD.mp4 437.1 MB
【影视】 Build Undetectable Malware Using C Language
收录时间:2021-05-19 文档个数:56 文档大小:2.5 GB 最近下载:2025-05-15 人气:5501 磁力链接
  • mp45. Creating Persistance & Nesting Our Program In Windows Registry/2. Interacting With Registry In Order To Start Our Program Automaticly.mp4 209.9 MB
  • mp47. Hacking Windows 10/2. Hacking Windows 10 Target With Our Program.mp4 184.2 MB
  • mp42. Hiding Our Program & Defining Connection Points/3. Defining Connection Points To Our Backdoor.mp4 171.8 MB
  • mp43. Building Shell Function & Executing Commands/3. Server Socket Initiation.mp4 168.9 MB
  • mp43. Building Shell Function & Executing Commands/4. Making Server Compatible With Our Backdoor.mp4 149.3 MB
  • mp46. Adding Keylogger To Our Malware/1. Understanding Keylogger Code.mp4 144.1 MB
  • mp47. Hacking Windows 10/5. Is It a Browser Or Backdoor .mp4 139.9 MB
  • mp43. Building Shell Function & Executing Commands/1. Creating Our Shell Function.mp4 129.9 MB
  • mp43. Building Shell Function & Executing Commands/2. Executing Commands On Target Machine.mp4 122.6 MB
  • mp43. Building Shell Function & Executing Commands/5. Testing Our Malware For Command Execution.mp4 121.9 MB
  • mp41. Introduction & Welcome To Hacking With C!/4. How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).mp4 118.0 MB
  • mp44. Switching Directories Inside Of A Program/1. Changing Our Program Directory.mp4 99.5 MB
  • mp47. Hacking Windows 10/3. You Have Been Hacked.mp4 99.4 MB
  • mp42. Hiding Our Program & Defining Connection Points/2. Hiding Our Program Console Window.mp4 96.9 MB
  • mp46. Adding Keylogger To Our Malware/2. Adding Keylogger Function To Our Backdoor.mp4 87.1 MB
  • mp47. Hacking Windows 10/4. Changing Malware Binary In Order To Bypass Antivirus.mp4 80.3 MB
  • mp42. Hiding Our Program & Defining Connection Points/1. Explaining Malware Structure & Including Needed Libraries.mp4 79.5 MB
  • mp42. Hiding Our Program & Defining Connection Points/5. Attempting Connection Every 10 Seconds With Our Target.mp4 77.1 MB
  • mp41. Introduction & Welcome To Hacking With C!/2. What Are We Going To Learn In This Course & What You Need To Know!.mp4 67.9 MB
  • mp47. Hacking Windows 10/1. Updating Our Server Code.mp4 60.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics v3 - AI and ChatGPT Mastery in Malware Analysis
收录时间:2024-02-04 文档个数:28 文档大小:2.7 GB 最近下载:2025-05-15 人气:3680 磁力链接
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/6. Lab Unraveling Malware Mysteries in Memory with Volatility.mp4 403.3 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/3. Lab Advanced Malware Analysis - Dynamic Techniques with Process Hacker.mp4 255.6 MB
  • mp4~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/3. Lab Implementing Clustering Technique&Feature Engg in Malware Variant Analysis.mp4 210.8 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/9. Lab Deep Neural Networks for Effective and Efficient Malware Detection&Analysis.mp4 199.6 MB
  • mp4~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/2. Lab Implementing Malware Behavior Profiling with RF.mp4 128.8 MB
  • mp4~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/4. LabAdvanced Ransomware Behavior Prediction & Classification with Deep Learning.mp4 128.4 MB
  • mp4~Get Your Files Here !/1. Advanced Multi-Stage Malware Analysis AI Synergy and Correlation Insights/3. Lab Visualizing Feature Correlations in Malware Analysis Using Heatmaps.mp4 124.4 MB
  • mp4~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/2. Lab Ransomware Analysis and Dissection.mp4 116.2 MB
  • mp4~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/2. Determining Optimal Clustering Size for Effective Malware Variant Detection.mp4 109.4 MB
  • mp4~Get Your Files Here !/2. Forecasting Malware Threats Predictive Analytics and Time Series Modeling/3. Lab Implementing Advanced Analytics TSA for Predicting Future Malware Threats.mp4 96.9 MB
  • mp4~Get Your Files Here !/2. Forecasting Malware Threats Predictive Analytics and Time Series Modeling/2. Beyond Real-Time Predicting Malware Threats Before They Happen.mp4 80.2 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/5. Key Features for Effective Memory Analysis.mp4 77.8 MB
  • mp4~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/1. Decoding the Ransomware Lifecycle From Initial Infiltration to Encryption.mp4 75.2 MB
  • mp4~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/3. Demystifying AI in Malware Analysis Explainable AI.mp4 75.0 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/1. Introduction to Dynamic malware analysis.mp4 66.2 MB
  • mp4~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/4. Lab SHAP-based Explainability in Malware Detection with RF.mp4 65.4 MB
  • mp4~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/1. Identification and Analysis of Malware Variants through Unsupervised Clustering.mp4 61.8 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/4. Dynamic Malware Analysis Challenges, Solutions, and the Road Ahead.mp4 61.7 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/2. Key Features for Dynamic Memory Analysis.mp4 60.5 MB
  • mp4~Get Your Files Here !/1. Advanced Multi-Stage Malware Analysis AI Synergy and Correlation Insights/2. Unveiling the Mechanics of Correlation Analysis in Multi-Stage Malware Detection.mp4 46.5 MB
【影视】 [FreeCourseLab.com] Udemy - Reverse Engineering, Debugging and Malware Analysis - 2021
收录时间:2024-04-24 文档个数:49 文档大小:3.9 GB 最近下载:2025-05-15 人气:2565 磁力链接
  • mp46. Software Exploitation/6. Stack Guards Bypass - Part 2.mp4 664.4 MB
  • mp46. Software Exploitation/4. Methods Exploitation.mp4 537.6 MB
  • mp46. Software Exploitation/7. Evil Server.mp4 523.5 MB
  • mp46. Software Exploitation/5. Stack Guards Bypass.mp4 405.3 MB
  • mp45. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.mp4 273.9 MB
  • mp46. Software Exploitation/3. Stack Reliability and GCC Example.mp4 190.3 MB
  • mp46. Software Exploitation/2. Low-Level View and Managing Stacks.mp4 184.7 MB
  • mp46. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.mp4 166.4 MB
  • mp44. Malware and Memory Analysis/1. Volatility Cridex.mp4 161.0 MB
  • mp44. Malware and Memory Analysis/3. Cridex Malware Analysis.mp4 161.0 MB
  • mp41. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.mp4 122.9 MB
  • mp44. Malware and Memory Analysis/2. Volatility R2D2.mp4 95.0 MB
  • mp41. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.mp4 73.4 MB
  • mp43. Malware Behavior/2. Malware Identification.mp4 63.2 MB
  • mp43. Malware Behavior/3. Presistence.mp4 47.9 MB
  • mp41. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.mp4 41.7 MB
  • mp43. Malware Behavior/1. Analysis Tools.mp4 36.4 MB
  • mp42. Operating System Components/4. Volatile Memory.mp4 36.0 MB
  • mp42. Operating System Components/2. Non-Volatile Memory.mp4 33.6 MB
  • mp42. Operating System Components/3. The Windows Registry.mp4 28.8 MB
【影视】 [ CourseBoat.com ] Ethical Hacking - Malware Threats (Updated 1 - 2022)
收录时间:2022-01-30 文档个数:73 文档大小:601.6 MB 最近下载:2025-05-15 人气:2391 磁力链接
  • mp4~Get Your Files Here !/09. Detecting Malware/52. Demo-TCPView and DriverView.mp4 35.8 MB
  • mp4~Get Your Files Here !/02. Explaining Malware Threats/07. Demo-Task Manager.mp4 23.8 MB
  • mp4~Get Your Files Here !/07. Explaining Worms and Viruses/34. Demo-File Extension Hack .mp4 20.1 MB
  • mp4~Get Your Files Here !/09. Detecting Malware/49. Demo-Autoruns and VirusTotal.mp4 20.0 MB
  • mp4~Get Your Files Here !/07. Explaining Worms and Viruses/32. Explaining Worms and Virus.mp4 19.2 MB
  • mp4~Get Your Files Here !/05. Diving Deeper into Trojans/21. Demo-Using SET to Create a Trojan.mp4 17.6 MB
  • mp4~Get Your Files Here !/06. Describing the Types of Trojans/28. More Trojans.mp4 17.3 MB
  • mp4~Get Your Files Here !/02. Explaining Malware Threats/06. Deployment Techniques.mp4 17.1 MB
  • mp4~Get Your Files Here !/07. Explaining Worms and Viruses/33. Types of Viruses and Worms.mp4 16.6 MB
  • mp4~Get Your Files Here !/03. Discussing Advanced Persistent Threats APT/10. Whats an APT.mp4 14.9 MB
  • mp4~Get Your Files Here !/09. Detecting Malware/46. Detecting Malware.mp4 14.7 MB
  • mp4~Get Your Files Here !/06. Describing the Types of Trojans/27. Continuing Dales Top 10.mp4 14.3 MB
  • mp4~Get Your Files Here !/06. Describing the Types of Trojans/26. Types of Trojans.mp4 13.6 MB
  • mp4~Get Your Files Here !/02. Explaining Malware Threats/08. The Numbers Behind Malware.mp4 13.4 MB
  • mp4~Get Your Files Here !/10. Deploying Countermeasure for Malware/56. Countermeasures.mp4 12.5 MB
  • mp4~Get Your Files Here !/04. Explaining Trojans/18. Indicators You Have a Trojan.mp4 12.4 MB
  • mp4~Get Your Files Here !/09. Detecting Malware/47. Types of Malware Analysis.mp4 12.3 MB
  • mp4~Get Your Files Here !/04. Explaining Trojans/14. Explaining Trojans.mp4 12.1 MB
  • mp4~Get Your Files Here !/06. Describing the Types of Trojans/30. Demo-Creating a Trojan with TheFatRAT.mp4 11.7 MB
  • mp4~Get Your Files Here !/02. Explaining Malware Threats/05. How Malware Gets in a System.mp4 11.0 MB
【影视】 [UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
收录时间:2022-05-07 文档个数:38 文档大小:285.9 MB 最近下载:2025-05-15 人气:1880 磁力链接
  • mp405. Identifying Malware Use of Cryptography/01. Purpose of Cryptography in Malware.mp4 20.7 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/03. Demo - Dynamic API Resolution.mp4 20.7 MB
  • mp405. Identifying Malware Use of Cryptography/03. Demo - Finding Cryptography.mp4 19.9 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/04. Lab - Tracing Import Table Construction.mp4 19.5 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/02. Walking the PEB, Parsing a PE.mp4 19.1 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Obfuscation in Visual Basic for Applications (VBA).mp4 19.0 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/04. Lab - Defeating String Obfuscation.mp4 17.8 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Demo - Defeating VBA Obfuscation.mp4 17.5 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/03. Demo - Identifying String Obfuscation.mp4 15.5 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Demo - Defeating PowerShell Obfuscation.mp4 15.5 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Lab - Performing Comprehensive Analysis.mp4 14.5 MB
  • mp401. How Obfuscation Affects Your Analysis/02. How Obfuscation Impacts Analysis.mp4 12.3 MB
  • mp405. Identifying Malware Use of Cryptography/04. Lab - Analyzing Malware That Uses Cryptography.mp4 10.7 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/02. String Obfuscation.mp4 8.9 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Prevalent Obfuscation Techniques.mp4 6.8 MB
  • mp405. Identifying Malware Use of Cryptography/02. Tools to Help Identify Use of Cryptography .mp4 6.0 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/01. Differences from Interpreted Code.mp4 5.3 MB
  • mp401. How Obfuscation Affects Your Analysis/03. What You Should Know.mp4 5.3 MB
  • mp401. How Obfuscation Affects Your Analysis/01. Understanding Code Obfuscation.mp4 4.3 MB
  • mp400. Course Overview/00. Course Overview.mp4 3.6 MB
【影视】 Malware Hunter Pro
收录时间:2025-05-12 文档个数:6 文档大小:327.2 MB 最近下载:2025-05-15 人气:54 磁力链接
  • mp4Video instaLL.mp4 158.3 MB
  • exeMalware Hunter portable.exe 113.8 MB
  • exeOfficial License 1-year/Malware Hunter Pro.exe 55.0 MB
  • txtINFO.txt 2.7 kB
  • nfoinfo.nfo 2.6 kB
  • urlOfficial License 1-year/Get My Key Now.url 139 Bytes
【影视】 [FreeCoursesOnline.Me] [Packt] Advanced Malware Analysis - [FCO]
收录时间:2021-05-18 文档个数:40 文档大小:691.2 MB 最近下载:2025-05-15 人气:1123 磁力链接
  • mp43.Advanced Dynamic Malware Analysis/14.Malware Analysis Using OllyDbg.mp4 64.6 MB
  • mp45.How to Detect and Defend against Malware in a Network/29.How to Setup Snort.mp4 49.8 MB
  • mp46.How to Deal with Evasive Malware/33.Examples of Unpacking a Malware Program.mp4 49.1 MB
  • mp43.Advanced Dynamic Malware Analysis/15.Features of OllyDbg.mp4 44.1 MB
  • mp44.Advanced Static Malware Analysis/21.Loading and Navigating Using IDA Pro.mp4 39.1 MB
  • mp44.Advanced Static Malware Analysis/24.Analysing Malware Using IDA Pro.mp4 35.7 MB
  • mp43.Advanced Dynamic Malware Analysis/17.Malware Analysis Using WINDBG.mp4 34.0 MB
  • mp44.Advanced Static Malware Analysis/22.Functions in IDA.mp4 31.6 MB
  • mp44.Advanced Static Malware Analysis/23.IDA Pro Graphic Features.mp4 31.2 MB
  • mp43.Advanced Dynamic Malware Analysis/18.Features of WINDBG.mp4 23.9 MB
  • mp46.How to Deal with Evasive Malware/31.How to Detect Packed Malware.mp4 21.7 MB
  • mp41.Exploring Malware Functionalities/02.Backdoors.mp4 21.0 MB
  • mp41.Exploring Malware Functionalities/06.Rootkits.mp4 19.0 MB
  • mp42.Malware Advanced Techniques/09.Data Encoding.mp4 17.7 MB
  • mp41.Exploring Malware Functionalities/05.Ransomware.mp4 16.9 MB
  • mp44.Advanced Static Malware Analysis/19.Advanced Notes on the x86 Architecture.mp4 16.9 MB
  • mp41.Exploring Malware Functionalities/01.The Course Overview.mp4 16.8 MB
  • mp43.Advanced Dynamic Malware Analysis/12.An Overview of the Windows Environment.mp4 15.4 MB
  • mp42.Malware Advanced Techniques/07.Privilege Escalation.mp4 14.3 MB
  • mp42.Malware Advanced Techniques/10.Covert Launching Techniques.mp4 14.2 MB
【影视】 Advanced Malware Analysis Ransomware
收录时间:2022-02-01 文档个数:51 文档大小:191.2 MB 最近下载:2025-05-15 人气:676 磁力链接
  • mp43 - Performing_Static_Analysis_on_Compromised_Machines/16. DEMO_-_Analyzing_a_Wannacry_Infected_Machine.mp4 21.9 MB
  • mp46 - Protecting_against_Ransomware/33. Finding_Patient_0.mp4 16.9 MB
  • mp45 - Analyzing_Propagation_and_Replication_Techniques/29. Demo_-_Improving_Ransomware_Analysis_Techniques.mp4 11.4 MB
  • mp42 - Learning_How_Ransomware_Works/07. Analyzing_Open_Source_Ransomware.mp4 10.4 MB
  • mp44 - Analyzing_Early_Infection_Stages/22. Stopping_Bad_Rabbit_Ransomware.mp4 10.3 MB
  • mp44 - Analyzing_Early_Infection_Stages/21. Analyzing_Kill_Switches.mp4 8.6 MB
  • mp42 - Learning_How_Ransomware_Works/04. Building_a_Ransomware_Analysis_Lab.mp4 7.8 MB
  • mp46 - Protecting_against_Ransomware/34. Preventing_Future_Attacks.mp4 5.7 MB
  • mp43 - Performing_Static_Analysis_on_Compromised_Machines/14. Leveraging_OSINT.mp4 5.1 MB
  • mp41 - Course_Overview/01. Course_Overview.mp4 4.6 MB
  • mp42 - Learning_How_Ransomware_Works/06. Understanding_the_Crypto_Behind_Ransomware.mp4 4.6 MB
  • pdfadvanced-malware-analysis-ransomware/06/protecting-against-ransomware-slides.pdf 4.5 MB
  • mp44 - Analyzing_Early_Infection_Stages/20. Ransomware_and_the_Volume_Shadow_Copy_Service.mp4 4.4 MB
  • mp43 - Performing_Static_Analysis_on_Compromised_Machines/11. Analyzing_Compromised_Machines.mp4 4.1 MB
  • mp42 - Learning_How_Ransomware_Works/03. What_You_Already_Know_About_Ransomware.mp4 4.0 MB
  • mp43 - Performing_Static_Analysis_on_Compromised_Machines/15. Hunting_with_Yara.mp4 3.9 MB
  • mp46 - Protecting_against_Ransomware/32. Avoiding_Common_Pitfalls.mp4 3.9 MB
  • pdfadvanced-malware-analysis-ransomware/02/learning-how-ransomware-works-slides.pdf 3.7 MB
  • mp43 - Performing_Static_Analysis_on_Compromised_Machines/10. Acquiring_Digital_Evidence.mp4 3.7 MB
  • mp46 - Protecting_against_Ransomware/35. Putting_Your_Skills_into_Practice.mp4 3.6 MB
【影视】 [FreeCoursesOnline.Me] Skillshare - Malware Analysis Course for IT security - [FCO]
收录时间:2018-11-22 文档个数:15 文档大小:489.7 MB 最近下载:2025-05-15 人气:1262 磁力链接
  • mp41. Introduction to Malware Analysis.mp4 7.1 MB
  • mp42. Malware Analysis Course Outline.mp4 9.9 MB
  • mp43. Malware Analysis Lab Setup.mp4 25.4 MB
  • mp44. Malware Analysis Taking and Restoring.mp4 26.9 MB
  • mp45. Part 1 Using Monitoring Tools.mp4 71.3 MB
  • mp46. Network Analysis.mp4 65.4 MB
  • mp47. Analyzing Inner Encryption.mp4 94.9 MB
  • mp48. Olly Essentials.mp4 85.6 MB
  • mp49. Analyzing and Decrypting Mysterious File.mp4 102.9 MB
  • htmlDiscuss.FreeTutorials.Us.html 169.7 kB
  • htmlFreeCoursesOnline.Me.html 110.9 kB
  • htmlFreeTutorials.Eu.html 104.7 kB
  • txtPresented By SaM.txt 33 Bytes
  • txt[TGx]Downloaded from torrentgalaxy.org.txt 524 Bytes
  • txtTorrent Downloaded From GloDls.to.txt 84 Bytes
【影视】 Futanari.24.10.18.Fanta.Sie.And.Matty.Mila.Malware.XXX.1080p.HEVC.x265.PRT
收录时间:2024-11-29 文档个数:2 文档大小:499.8 MB 最近下载:2025-05-15 人气:1037 磁力链接
  • mp4Futanari.24.10.18.Fanta.Sie.And.Matty.Mila.Malware.XXX.1080p.HEVC.x265.PRT.mp4 499.8 MB
  • nfoProvided by PornRips.to.nfo 47 Bytes
【影视】 [ DevCourseWeb.com ] Udemy - A-Z Malware Design and Analysis
收录时间:2022-02-09 文档个数:28 文档大小:1.6 GB 最近下载:2025-05-15 人气:1522 磁力链接
  • mp4~Get Your Files Here !/01 - Part 1 - Essential Theories/004 Binary Analysis Fundementals.mp4 484.4 MB
  • mp4~Get Your Files Here !/01 - Part 1 - Essential Theories/002 Lecture 2_ Malware Introdcution.mp4 210.2 MB
  • mp4~Get Your Files Here !/02 - Practical Part/005 Learning how to setup and use IDA-Pro.mp4 193.7 MB
  • mp4~Get Your Files Here !/03 - Write your own malware_/001 Create your own real-world malware for learning and analysis - part 1.mp4 170.0 MB
  • mp4~Get Your Files Here !/01 - Part 1 - Essential Theories/003 Lecture 3_ Software Exploitations in Malware Design.mp4 123.0 MB
  • mp4~Get Your Files Here !/03 - Write your own malware_/004 Create your own real-world malware for learning and analysis - Last part.mp4 92.4 MB
  • mp4~Get Your Files Here !/02 - Practical Part/003 How to pack and unpack executable files.mp4 88.1 MB
  • mp4~Get Your Files Here !/03 - Write your own malware_/002 Create your own real-world malware for learning and analysis - part 2.mp4 86.3 MB
  • mp4~Get Your Files Here !/02 - Practical Part/001 Understanding the PE analysis of an executable file { part 1 }.mp4 82.0 MB
  • mp4~Get Your Files Here !/02 - Practical Part/002 Analying the PE structure of your executable file.mp4 45.0 MB
  • mp4~Get Your Files Here !/03 - Write your own malware_/003 Create your own real-world malware for learning and analysis - part 3.mp4 18.7 MB
  • mp4~Get Your Files Here !/02 - Practical Part/004 Identidying the packing algorithm used in a given file.mp4 14.4 MB
  • mp4~Get Your Files Here !/01 - Part 1 - Essential Theories/001 Introduction.mp4 13.3 MB
  • srt~Get Your Files Here !/01 - Part 1 - Essential Theories/004 Binary Analysis Fundementals_en.srt 102.8 kB
  • srt~Get Your Files Here !/03 - Write your own malware_/001 Create your own real-world malware for learning and analysis - part 1_en.srt 46.0 kB
  • srt~Get Your Files Here !/01 - Part 1 - Essential Theories/003 Lecture 3_ Software Exploitations in Malware Design_en.srt 33.0 kB
  • srt~Get Your Files Here !/02 - Practical Part/005 Learning how to setup and use IDA-Pro_en.srt 22.0 kB
  • srt~Get Your Files Here !/02 - Practical Part/001 Understanding the PE analysis of an executable file { part 1 }_en.srt 19.4 kB
  • srt~Get Your Files Here !/02 - Practical Part/003 How to pack and unpack executable files_en.srt 12.4 kB
  • srt~Get Your Files Here !/03 - Write your own malware_/002 Create your own real-world malware for learning and analysis - part 2_en.srt 12.2 kB
【影视】 (Absolute Basic Concepts) ABCs of Malware Analysis
收录时间:2021-03-10 文档个数:64 文档大小:640.5 MB 最近下载:2025-05-15 人气:2814 磁力链接
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/04 Malware Analysis/016 Demo - Static Malware Analysis.mp4 175.9 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/03 Essential Knowledge/012 Demo - Building Malware Analysis Lab.mp4 83.2 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/04 Malware Analysis/018 Demo - Automatic Dynamic Malware Analysis.mp4 67.1 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/04 Malware Analysis/015 Static Malware Analysis.mp4 64.9 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/02 Absolute Basics/003 What is a Malware_.mp4 53.4 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/03 Essential Knowledge/009 PE File Structure.mp4 36.6 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/02 Absolute Basics/004 Types of Malwares.mp4 30.0 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/03 Essential Knowledge/010 Obfuscation Techniques.mp4 25.4 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/04 Malware Analysis/017 Automatic Dynamic Malware Analysis.mp4 18.5 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/04 Malware Analysis/013 What is Malware Analysis_.mp4 14.5 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/03 Essential Knowledge/006 Application Development.mp4 12.7 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/03 Essential Knowledge/007 Libraries and Functions.mp4 12.5 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/03 Essential Knowledge/008 Challenges with Binary Files.mp4 10.1 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/03 Essential Knowledge/011 Building Malware Analysis Lab.mp4 9.1 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/01 Course Introduction/001 Introduction.mp4 7.8 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/04 Malware Analysis/014 Types of Malware Analysis.mp4 4.9 MB
  • pdf[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/03 Essential Knowledge/012 Windows-7-on-VirtualBox-Install-Guide.pdf 4.9 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/03 Essential Knowledge/005 Module Introduction.mp4 2.8 MB
  • mp4[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/02 Absolute Basics/002 Module Introduction.mp4 1.9 MB
  • pdf[TutsNode.com] - (Absolute Basic Concepts) ABCs of Malware Analysis/03 Essential Knowledge/007 Libraries-and-Functions-List.pdf 1.9 MB
【影视】 Futanari.24.10.18.Fanta.Sie.And.Matty.Mila.Malware.XXX.720p.HEVC.x265.PRT
收录时间:2024-11-21 文档个数:2 文档大小:342.5 MB 最近下载:2025-05-15 人气:480 磁力链接
  • mp4Futanari.24.10.18.Fanta.Sie.And.Matty.Mila.Malware.XXX.720p.HEVC.x265.PRT.mp4 342.5 MB
  • nfoProvided by PornRips.to.nfo 47 Bytes
【影视】 [DesireCourse.Com] Udemy - How Hackers Create Undetectable Malware and Viruses
收录时间:2018-08-05 文档个数:17 文档大小:291.0 MB 最近下载:2025-05-15 人气:1991 磁力链接
  • mp401-we-begin-here/001-welcome-and-introduction.mp4 3.3 MB
  • mp401-we-begin-here/002-introduction-to-undetectable-malware.mp4 36.7 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/003-installing-python-and-pip.mp4 14.2 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/004-installing-veilframework.mp4 11.6 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/005-setting-up-the-veil-framework.mp4 48.6 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/006-installing-gnome-desktop.mp4 45.1 MB
  • mp403-veil-and-metasploit/007-wine-mono-and-veilevasion-installation.mp4 6.6 MB
  • mp403-veil-and-metasploit/008-installing-metasploit.mp4 30.1 MB
  • mp403-veil-and-metasploit/009-metasploit-installation-complete.mp4 1.1 MB
  • mp403-veil-and-metasploit/010-testing-msf-console.mp4 1.8 MB
  • mp403-veil-and-metasploit/011-veil-evasion-final-installation.mp4 16.4 MB
  • mp403-veil-and-metasploit/012-adding-the-metasploit-folder-to-veil-installation.mp4 1.5 MB
  • mp403-veil-and-metasploit/013-introduction-to-veil-and-the-importance-in-ethical-hacking.mp4 10.7 MB
  • mp404-how-hackers-create-undetectable-malware/014-creating-an-exploit.mp4 26.5 MB
  • mp404-how-hackers-create-undetectable-malware/015-testing-exploit-on-windows-10-machine.mp4 32.2 MB
  • mp404-how-hackers-create-undetectable-malware/016-encrypting-payload.mp4 4.7 MB
  • url[DesireCourse.Com].url 51 Bytes
共5页 上一页 1 2 3 4 5 下一页