Malware Analysis- Identifying and Defeating Code Obfuscation


File Information

File Size:   366.33 MB
Creat Time:   2024-09-04
Active Degree:   36
Last Active:   2024-11-12
Magnet Link:    Magnet LinkMagnet Link
Statement:   This site does not provide download links, only text displays, and does not contain any infringement.

File List

  1. 05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.mp4 29.00 MB
  2. 06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.mp4 26.60 MB
  3. 05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.mp4 26.55 MB
  4. 05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.mp4 25.67 MB
  5. 06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.mp4 25.48 MB
  6. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).mp4 24.34 MB
  7. 04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.mp4 22.67 MB
  8. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.mp4 21.31 MB
  9. 04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.mp4 19.85 MB
  10. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.mp4 19.81 MB
  11. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.mp4 19.40 MB
  12. 06. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.mp4 15.17 MB
  13. 02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.mp4 14.60 MB
  14. 04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.mp4 11.03 MB
  15. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.mp4 8.17 MB
  16. 06. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.mp4 7.07 MB
  17. 02. How Obfuscation Affects Your Analysis/04. What You Should Know.mp4 6.58 MB
  18. 04. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.mp4 6.18 MB
  19. 02. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.mp4 5.18 MB
  20. 01. Course Overview/01. Course Overview.mp4 4.28 MB
  21. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Obfuscation in PowerShell.mp4 4.23 MB
  22. 07. Leveling up Your Skills/02. What You Learned.mp4 3.52 MB
  23. 05. Detecting and Defeating Function Obfuscation in Native Code/02. Constructing an Import Table.mp4 2.92 MB
  24. 07. Leveling up Your Skills/03. Leveling up Your Skills.mp4 2.18 MB
  25. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/08. Conclusion.mp4 2.04 MB
  26. 05. Detecting and Defeating Function Obfuscation in Native Code/01. Module Introduction.mp4 1.54 MB
  27. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Module Introduction.mp4 1.41 MB
  28. 02. How Obfuscation Affects Your Analysis/01. Module Introduction.mp4 1.31 MB
  29. 04. Detecting and Defeating String Obfuscation in Native Code/06. Conclusion.mp4 1.12 MB
  30. 04. Detecting and Defeating String Obfuscation in Native Code/01. Module Introduction.mp4 1.05 MB
  31. 05. Detecting and Defeating Function Obfuscation in Native Code/06. Conclusion.mp4 1.05 MB
  32. 06. Identifying Malware Use of Cryptography/06. Conclusion.mp4 1.04 MB
  33. 02. How Obfuscation Affects Your Analysis/05. Conclusion.mp4 1.04 MB
  34. 06. Identifying Malware Use of Cryptography/01. Module Introduction.mp4 1.04 MB
  35. malware-analysis-identifying-defeating-obfuscation.zip 696 KB
  36. 07. Leveling up Your Skills/01. Module Introduction.mp4 560 KB
  37. 07. Leveling up Your Skills/04. Conclusion.mp4 418 KB
  38. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.srt 15 KB
  39. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).srt 15 KB
  40. 04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.srt 14 KB
  41. 05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.srt 14 KB
  42. 06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.srt 14 KB
  43. 05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.srt 14 KB
  44. 05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.srt 13 KB
  45. 06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.srt 12 KB
  46. 04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.srt 12 KB
  47. 02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.srt 12 KB
  48. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.srt 11 KB
  49. 03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.srt 11 KB
  50. 04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.srt 9 KB