Malware Analysis- Identifying and Defeating Code Obfuscation
磁链地址
复制
复制磁链成功
magnet:?xt=urn:btih:455E6292C8C27CF10796C039613CC10A18658F6B
如发现链接(DMCA)违规请
在线举报
在线播放
复制链接
磁链详情
文件数目:
73个文件
文件大小:
357.74 MB
收录时间:
2026-01-19
访问次数:
1
相关内容:
Malware
Analysis-
Identifying
Defeating
Code
Obfuscation
文件meta
05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.mp4
28.32 MB
06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.mp4
25.98 MB
05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.mp4
25.92 MB
05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.mp4
25.07 MB
06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.mp4
24.89 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).mp4
23.77 MB
04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.mp4
22.14 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.mp4
20.81 MB
04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.mp4
19.38 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.mp4
19.34 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.mp4
18.95 MB
06. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.mp4
14.82 MB
02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.mp4
14.26 MB
04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.mp4
10.78 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.mp4
7.98 MB
06. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.mp4
6.91 MB
02. How Obfuscation Affects Your Analysis/04. What You Should Know.mp4
6.43 MB
04. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.mp4
6.04 MB
02. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.mp4
5.05 MB
01. Course Overview/01. Course Overview.mp4
4.18 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Obfuscation in PowerShell.mp4
4.13 MB
07. Leveling up Your Skills/02. What You Learned.mp4
3.44 MB
05. Detecting and Defeating Function Obfuscation in Native Code/02. Constructing an Import Table.mp4
2.85 MB
07. Leveling up Your Skills/03. Leveling up Your Skills.mp4
2.13 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/08. Conclusion.mp4
1.99 MB
05. Detecting and Defeating Function Obfuscation in Native Code/01. Module Introduction.mp4
1.5 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Module Introduction.mp4
1.37 MB
02. How Obfuscation Affects Your Analysis/01. Module Introduction.mp4
1.28 MB
04. Detecting and Defeating String Obfuscation in Native Code/06. Conclusion.mp4
1.09 MB
04. Detecting and Defeating String Obfuscation in Native Code/01. Module Introduction.mp4
1.03 MB
05. Detecting and Defeating Function Obfuscation in Native Code/06. Conclusion.mp4
1.03 MB
06. Identifying Malware Use of Cryptography/06. Conclusion.mp4
1.02 MB
02. How Obfuscation Affects Your Analysis/05. Conclusion.mp4
1.02 MB
06. Identifying Malware Use of Cryptography/01. Module Introduction.mp4
1.01 MB
malware-analysis-identifying-defeating-obfuscation.zip
680.35 KB
07. Leveling up Your Skills/01. Module Introduction.mp4
546.91 KB
07. Leveling up Your Skills/04. Conclusion.mp4
408.64 KB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.srt
14.94 KB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).srt
14.71 KB
04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.srt
14.63 KB
05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.srt
14.58 KB
06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.srt
14.33 KB
05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.srt
14.22 KB
05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.srt
12.88 KB
06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.srt
12.64 KB
04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.srt
12.36 KB
02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.srt
12.32 KB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.srt
11.62 KB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.srt
11.31 KB
04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.srt
9.48 KB
©2018 cilimao.app 磁力猫 v3.0
使用必读
|
联系我们
|
地址发布
|
种子提交