Search
Malware Analysis- Identifying and Defeating Code Obfuscation
File Information
File Size:
366.33 MB
Creat Time:
2024-09-04
Active Degree:
36
Last Active:
2024-11-12
Magnet Link:
Magnet Link
Tags:
Malware
Analysis-
Identifying
and
Defeating
Code
Obfuscation
Statement:
This site does not provide download links, only text displays, and does not contain any infringement.
File List
05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.mp4
29.00 MB
06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.mp4
26.60 MB
05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.mp4
26.55 MB
05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.mp4
25.67 MB
06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.mp4
25.48 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).mp4
24.34 MB
04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.mp4
22.67 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.mp4
21.31 MB
04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.mp4
19.85 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.mp4
19.81 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.mp4
19.40 MB
06. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.mp4
15.17 MB
02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.mp4
14.60 MB
04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.mp4
11.03 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.mp4
8.17 MB
06. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.mp4
7.07 MB
02. How Obfuscation Affects Your Analysis/04. What You Should Know.mp4
6.58 MB
04. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.mp4
6.18 MB
02. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.mp4
5.18 MB
01. Course Overview/01. Course Overview.mp4
4.28 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Obfuscation in PowerShell.mp4
4.23 MB
07. Leveling up Your Skills/02. What You Learned.mp4
3.52 MB
05. Detecting and Defeating Function Obfuscation in Native Code/02. Constructing an Import Table.mp4
2.92 MB
07. Leveling up Your Skills/03. Leveling up Your Skills.mp4
2.18 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/08. Conclusion.mp4
2.04 MB
05. Detecting and Defeating Function Obfuscation in Native Code/01. Module Introduction.mp4
1.54 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Module Introduction.mp4
1.41 MB
02. How Obfuscation Affects Your Analysis/01. Module Introduction.mp4
1.31 MB
04. Detecting and Defeating String Obfuscation in Native Code/06. Conclusion.mp4
1.12 MB
04. Detecting and Defeating String Obfuscation in Native Code/01. Module Introduction.mp4
1.05 MB
05. Detecting and Defeating Function Obfuscation in Native Code/06. Conclusion.mp4
1.05 MB
06. Identifying Malware Use of Cryptography/06. Conclusion.mp4
1.04 MB
02. How Obfuscation Affects Your Analysis/05. Conclusion.mp4
1.04 MB
06. Identifying Malware Use of Cryptography/01. Module Introduction.mp4
1.04 MB
malware-analysis-identifying-defeating-obfuscation.zip
696 KB
07. Leveling up Your Skills/01. Module Introduction.mp4
560 KB
07. Leveling up Your Skills/04. Conclusion.mp4
418 KB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.srt
15 KB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).srt
15 KB
04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.srt
14 KB
05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.srt
14 KB
06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.srt
14 KB
05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.srt
14 KB
05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.srt
13 KB
06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.srt
12 KB
04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.srt
12 KB
02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.srt
12 KB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.srt
11 KB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.srt
11 KB
04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.srt
9 KB
Hot Tags
婊子开车
内裤剪洞
海角手段
干之前来段骚舞挑逗
Mutiny
MOODYZファン感謝祭 バコバコバスツアー2024
车展车模
性感身材小女友干之前来段骚舞挑逗
一中两青三对男女
一中两青三对男女激情造爱各有特色巨乳肥臀欲望淑女性感身
镜盒
国有铁道公安队
雨乃
Cherry Peach Meow
会销流程
王牌霸王花
adn—426
东北老女人性爱高潮
38694672
腿细
学姐情趣女仆
밤토끼 시즌 2 바로 하기
真崎宁202
韵韵蕾姆
王牌霸王花第一部
丈夫 当面
妻中蜜 3 android
渣女來
vandr-114
辽宁女大学生
mdyd-007
文轩探花11
드라마 다시보기누누
渣 女 來 襲
爆乳 中文
台湾清华大学外文系臀后健身教练「Ellie」
主播传媒
VRPD-003
精品手持
欧美 爆乳
溶化
jia.lisa
JUQ-997
redrain 3d
ibw-870z
麻豆剧本杀
古巴比伦战争
wanz—940
亨利•冢本
探险活宝阿里云