Name Defeating Anti-reverse Engineering and Anti-debugging Techniques
File Type video
Size 262.21MB
UpdateDate 2024-11-28
hash *****8A14048497AB17E1AB6D0E919F340CB40E
Hot 1
Files 03. Stopping Anti-debugging Techniques/04. Demo- Tracing Process Hollowing.mp4 | 36.36MB 00. Course Overview/00. Course Overview.mp4 | 4.36MB 00. Course Overview/00. Course Overview.srt | 3.50KB 01. How Anti-analysis Affects Your Analysis/00. Module Introduction.mp4 | 869.91KB 01. How Anti-analysis Affects Your Analysis/00. Module Introduction.srt | 1.02KB 01. How Anti-analysis Affects Your Analysis/01. Goals and Motivations.mp4 | 6.46MB 01. How Anti-analysis Affects Your Analysis/01. Goals and Motivations.srt | 6.03KB 01. How Anti-analysis Affects Your Analysis/02. Where You Will Encounter These Tricks.mp4 | 3.76MB 01. How Anti-analysis Affects Your Analysis/02. Where You Will Encounter These Tricks.srt | 4.38KB 01. How Anti-analysis Affects Your Analysis/03. What You Should Know.mp4 | 5.01MB 01. How Anti-analysis Affects Your Analysis/03. What You Should Know.srt | 4.37KB 01. How Anti-analysis Affects Your Analysis/04. Conclusion.mp4 | 592.48KB 01. How Anti-analysis Affects Your Analysis/04. Conclusion.srt | 780B 02. Detecting and Defeating Anti-reverse Engineering Techniques/00. Module Introduction.mp4 | 1.40MB 02. Detecting and Defeating Anti-reverse Engineering Techniques/00. Module Introduction.srt | 1.74KB 02. Detecting and Defeating Anti-reverse Engineering Techniques/01. Tricking the Disassembler.mp4 | 10.51MB 02. Detecting and Defeating Anti-reverse Engineering Techniques/01. Tricking the Disassembler.srt | 9.23KB 02. Detecting and Defeating Anti-reverse Engineering Techniques/02. Hiding Strings and API Calls.mp4 | 7.94MB 02. Detecting and Defeating Anti-reverse Engineering Techniques/02. Hiding Strings and API Calls.srt | 7.40KB 02. Detecting and Defeating Anti-reverse Engineering Techniques/03. Messing with Function Calls and Returns.mp4 | 15.17MB 02. Detecting and Defeating Anti-reverse Engineering Techniques/03. Messing with Function Calls and Returns.srt | 14.75KB 02. Detecting and Defeating Anti-reverse Engineering Techniques/04. Demo- Tracing Difficult Function Calls and Returns.mp4 | 26.10MB 02. Detecting and Defeating Anti-reverse Engineering Techniques/04. Demo- Tracing Difficult Function Calls and Returns.srt | 14.29KB 02. Detecting and Defeating Anti-reverse Engineering Techniques/05. Obfuscating Control Flow.mp4 | 12.47MB 02. Detecting and Defeating Anti-reverse Engineering Techniques/05. Obfuscating Control Flow.srt | 9.25KB 02. Detecting and Defeating Anti-reverse Engineering Techniques/06. Identifying Control-flow Obfuscation.mp4 | 34.36MB 02. Detecting and Defeating Anti-reverse Engineering Techniques/06. Identifying Control-flow Obfuscation.srt | 14.85KB 02. Detecting and Defeating Anti-reverse Engineering Techniques/07. Conclusion.mp4 | 1.18MB 02. Detecting and Defeating Anti-reverse Engineering Techniques/07. Conclusion.srt | 1.29KB 02. Detecting and Defeating Anti-reverse Engineering Techniques/Linux Tails Operating System.html | 84B 03. Stopping Anti-debugging Techniques/00. Module Introduction.mp4 | 999.71KB 03. Stopping Anti-debugging Techniques/00. Module Introduction.srt | 1.16KB 03. Stopping Anti-debugging Techniques/01. Tricking a Debugger.mp4 | 6.26MB 03. Stopping Anti-debugging Techniques/01. Tricking a Debugger.srt | 6.35KB 03. Stopping Anti-debugging Techniques/02. Detecting a Debugger.mp4 | 12.60MB 03. Stopping Anti-debugging Techniques/02. Detecting a Debugger.srt | 11.98KB 03. Stopping Anti-debugging Techniques/03. Process Hollowing and Shellcode.mp4 | 8.32MB 03. Stopping Anti-debugging Techniques/03. Process Hollowing and Shellcode.srt | 6.93KB 00. Course Overview/6 Simple Memory Techniques - All hacker use.html | 98B 03. Stopping Anti-debugging Techniques/04. Demo- Tracing Process Hollowing.srt | 18.20KB 03. Stopping Anti-debugging Techniques/05. Abusing Exceptions.mp4 | 12.64MB 03. Stopping Anti-debugging Techniques/05. Abusing Exceptions.srt | 9.15KB 03. Stopping Anti-debugging Techniques/06. Switching Architectures.mp4 | 8.81MB 03. Stopping Anti-debugging Techniques/06. Switching Architectures.srt | 5.04KB 03. Stopping Anti-debugging Techniques/07. Conclusion.mp4 | 740.69KB 03. Stopping Anti-debugging Techniques/07. Conclusion.srt | 839B 04. Adding Stealth to Your Malware Sandbox/00. Module Introduction.mp4 | 1.18MB 04. Adding Stealth to Your Malware Sandbox/00. Module Introduction.srt | 1.37KB 04. Adding Stealth to Your Malware Sandbox/01. Using Virtualization for Your Sandboxing.mp4 | 17.31MB 04. Adding Stealth to Your Malware Sandbox/01. Using Virtualization for Your Sandboxing.srt | 15.64KB 04. Adding Stealth to Your Malware Sandbox/02. Processes, Shares, and Other Artifacts.mp4 | 11.53MB 04. Adding Stealth to Your Malware Sandbox/02. Processes, Shares, and Other Artifacts.srt | 11.40KB 04. Adding Stealth to Your Malware Sandbox/03. Other Evidence of a Virtual Environment.mp4 | 9.77MB 04. Adding Stealth to Your Malware Sandbox/03. Other Evidence of a Virtual Environment.srt | 9.55KB 04. Adding Stealth to Your Malware Sandbox/04. Conclusion and Course Wrap-up.mp4 | 5.38MB 04. Adding Stealth to Your Malware Sandbox/04. Conclusion and Course Wrap-up.srt | 5.85KB 04. Adding Stealth to Your Malware Sandbox/Defense against the Black Arts.html | 84B 04. Adding Stealth to Your Malware Sandbox/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html | 84B