Mastering Reverse Engineering & Malware Analysis REMASM+


File Information

File Size:   4.83 GB
Creat Time:   2024-08-11
Active Degree:   101
Last Active:   2025-04-13
Magnet Link:    Magnet LinkMagnet Link
Statement:   This site does not provide download links, only text displays, and does not contain any infringement.

File List

  1. 15. Memory Manipulation/2. Testing and Analyzing Project with Readelf and GDB.mp4 227.21 MB
  2. 15. Memory Manipulation/1. Project EXABYTE.mp4 206.46 MB
  3. 4. Windows - PE Format/1. Fundamentals of Windows PE Format.mp4 201.88 MB
  4. 5. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4 160.46 MB
  5. 3. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4 159.21 MB
  6. 3. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 150.67 MB
  7. 9. Debugging x86-64/2. Debugging and Finding Variables in Memory addresses.mp4 146.22 MB
  8. 10. Writing our second 64Bit Assembly Program/2. Analyzing Output with GDB and creating makefile.mp4 134.59 MB
  9. 3. Linux - ELF Format/2. Learning ELF Fields.mp4 131.90 MB
  10. 18. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4 124.46 MB
  11. 18. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4 119.49 MB
  12. 13. Jump and Loop/1. Using Conditions and Jumping.mp4 118.88 MB
  13. 9. Debugging x86-64/3. Learning more with GDB.mp4 112.56 MB
  14. 5. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4 109.12 MB
  15. 5. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4 106.37 MB
  16. 18. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4 105.70 MB
  17. 9. Debugging x86-64/1. Starting gdb and setting flavors.mp4 99.97 MB
  18. 12. Data Display Debugger - DDD/3. Using DDD and Analyzing RAX Values.mp4 98.61 MB
  19. 2. Binary Analysis/5. Linking Phase.mp4 96.20 MB
  20. 7. Writing our first 64Bit Assembly Program/1. Hello world with makefile.mp4 89.87 MB
  21. 12. Data Display Debugger - DDD/1. Developing another Assembly Program to Analyze with DDD.mp4 89.06 MB
  22. 17. Starting with Ghidra/1. Opening project in Ghidra.mp4 86.66 MB
  23. 16. Calculator with Assembly/3. Last Decorations.mp4 86.10 MB
  24. 6. Reverse Engineering and Malware Analysis - Installing Ghidra/4. Installing SASM.mp4 84.10 MB
  25. 16. Calculator with Assembly/4. Explaining Registers in Practice.mp4 83.87 MB
  26. 6. Reverse Engineering and Malware Analysis - Installing Ghidra/1. Downloading Ghidra and File Structure.mp4 81.91 MB
  27. 16. Calculator with Assembly/5. Completing Section.mp4 78.21 MB
  28. 1. Disassembly and Disassembler/2. Disassembly - What.mp4 71.39 MB
  29. 19. IDA Pro IDA Freeware/1. Downloading and Installing IDA Pro _ IDA Freeware.mp4 68.54 MB
  30. 10. Writing our second 64Bit Assembly Program/1. Coding ASM file.mp4 67.61 MB
  31. 14. Assembly Project using Jump and Loop/2. Testing our Project.mp4 66.90 MB
  32. 7. Writing our first 64Bit Assembly Program/3. Sticking to traditions - Hello world program without makefile.mp4 66.27 MB
  33. 5. Symbols, Stripped and Not Stripped Binaries/4. How binary loads and executes in theory.mp4 66.02 MB
  34. 16. Calculator with Assembly/1. Defining variables.mp4 65.01 MB
  35. 19. IDA Pro IDA Freeware/3. Useful Tabs in IDA.mp4 64.54 MB
  36. 17. Starting with Ghidra/2. Discovering Ghidra.mp4 62.67 MB
  37. 12. Data Display Debugger - DDD/2. Analyzing Previously Written Code.mp4 62.53 MB
  38. 2. Binary Analysis/2. Preprocessing.mp4 60.88 MB
  39. 16. Calculator with Assembly/2. Addition and Subtraction.mp4 59.04 MB
  40. 19. IDA Pro IDA Freeware/2. Being friends with IDA.mp4 56.81 MB
  41. 18. Malware Analysis and Reverse Engineering with Ghidra/3. OSINT for Reverse Engineering.mp4 53.87 MB
  42. 6. Reverse Engineering and Malware Analysis - Installing Ghidra/2. Installing JDK in Linux.mp4 49.67 MB
  43. 18. Malware Analysis and Reverse Engineering with Ghidra/6. Finding Entry Points and Changing Undefined Function Names.mp4 47.49 MB
  44. 13. Jump and Loop/8. Jump if Above.mp4 42.16 MB
  45. 2. Binary Analysis/3. Compilation Phase.mp4 39.63 MB
  46. 2. Binary Analysis/4. Assembly Phase.mp4 39.10 MB
  47. 13. Jump and Loop/2. Jump if equal.mp4 37.19 MB
  48. 13. Jump and Loop/7. Jump if less or equal.mp4 36.24 MB
  49. 1. Disassembly and Disassembler/1. The Disassembly Theory.mp4 36.19 MB
  50. 2. Binary Analysis/1. Analysis of Binary and 4 Stages of Compilation.mp4 34.32 MB