Malware Analysis- Identifying and Defeating Code Obfuscation

磁链地址复制复制磁链成功
磁链详情
文件数目:73个文件
文件大小:357.74 MB
收录时间:2026-01-19
访问次数:1
相关内容:MalwareAnalysis-IdentifyingDefeatingCodeObfuscation
文件meta
  • 05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.mp4
    28.32 MB
  • 06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.mp4
    25.98 MB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.mp4
    25.92 MB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.mp4
    25.07 MB
  • 06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.mp4
    24.89 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).mp4
    23.77 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.mp4
    22.14 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.mp4
    20.81 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.mp4
    19.38 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.mp4
    19.34 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.mp4
    18.95 MB
  • 06. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.mp4
    14.82 MB
  • 02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.mp4
    14.26 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.mp4
    10.78 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.mp4
    7.98 MB
  • 06. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.mp4
    6.91 MB
  • 02. How Obfuscation Affects Your Analysis/04. What You Should Know.mp4
    6.43 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.mp4
    6.04 MB
  • 02. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.mp4
    5.05 MB
  • 01. Course Overview/01. Course Overview.mp4
    4.18 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Obfuscation in PowerShell.mp4
    4.13 MB
  • 07. Leveling up Your Skills/02. What You Learned.mp4
    3.44 MB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/02. Constructing an Import Table.mp4
    2.85 MB
  • 07. Leveling up Your Skills/03. Leveling up Your Skills.mp4
    2.13 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/08. Conclusion.mp4
    1.99 MB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/01. Module Introduction.mp4
    1.5 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Module Introduction.mp4
    1.37 MB
  • 02. How Obfuscation Affects Your Analysis/01. Module Introduction.mp4
    1.28 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/06. Conclusion.mp4
    1.09 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/01. Module Introduction.mp4
    1.03 MB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/06. Conclusion.mp4
    1.03 MB
  • 06. Identifying Malware Use of Cryptography/06. Conclusion.mp4
    1.02 MB
  • 02. How Obfuscation Affects Your Analysis/05. Conclusion.mp4
    1.02 MB
  • 06. Identifying Malware Use of Cryptography/01. Module Introduction.mp4
    1.01 MB
  • malware-analysis-identifying-defeating-obfuscation.zip
    680.35 KB
  • 07. Leveling up Your Skills/01. Module Introduction.mp4
    546.91 KB
  • 07. Leveling up Your Skills/04. Conclusion.mp4
    408.64 KB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.srt
    14.94 KB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).srt
    14.71 KB
  • 04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.srt
    14.63 KB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.srt
    14.58 KB
  • 06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.srt
    14.33 KB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.srt
    14.22 KB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.srt
    12.88 KB
  • 06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.srt
    12.64 KB
  • 04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.srt
    12.36 KB
  • 02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.srt
    12.32 KB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.srt
    11.62 KB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.srt
    11.31 KB
  • 04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.srt
    9.48 KB
©2018 cilimao.app 磁力猫 v3.0
使用必读|联系我们|地址发布|种子提交