Reverse Engineering Malware with Ghidra
- 收录时间:2021-10-29 18:56:05
- 文件大小:295MB
- 下载次数:1
- 最近下载:2021-10-29 18:56:05
- 磁力链接:
-
文件列表
- 03. Enhancing Your Reversing Workflow/03. Demo- Function Analysis.mp4 63MB
- 02. Working with Ghidra’s Core Components/05. Demo- Analyzing a Trojan.mp4 39MB
- 04. Harnessing Ghidra’s Superpowers/01. Working with the Decompiler.mp4 30MB
- 04. Harnessing Ghidra’s Superpowers/05. Demo- Scripting Example.mp4 25MB
- 01. Software Reverse Engineering with Ghidra/04. Demo- Getting Started with Ghidra.mp4 22MB
- 04. Harnessing Ghidra’s Superpowers/03. Demo- Headless Analyzer.mp4 17MB
- 03. Enhancing Your Reversing Workflow/01. Enhancing the CodeBrowser.mp4 14MB
- 03. Enhancing Your Reversing Workflow/02. Function Analysis Tools and Techniques.mp4 12MB
- 02. Working with Ghidra’s Core Components/03. Exploring the Main User Interface.mp4 11MB
- 02. Working with Ghidra’s Core Components/04. Ghidra’s Decompiler.mp4 10MB
- 01. Software Reverse Engineering with Ghidra/01. Reverse Engineering and the Ghidra Software Reverse Engineering (SRE) Tools.mp4 9MB
- 01. Software Reverse Engineering with Ghidra/03. What You Should Know.mp4 6MB
- 02. Working with Ghidra’s Core Components/02. Projects and Auto-analysis.mp4 6MB
- 04. Harnessing Ghidra’s Superpowers/04. Ghidra Scripts.mp4 4MB
- 02. Working with Ghidra’s Core Components/01. Exploring Ghidra’s Main Components and Features.mp4 4MB
- 04. Harnessing Ghidra’s Superpowers/06. Conclusion and Course Wrap-up.mp4 4MB
- 04. Harnessing Ghidra’s Superpowers/02. Headless Analyzer.mp4 4MB
- 01. Software Reverse Engineering with Ghidra/02. Malware Packing, Obfuscation, and Other Mayhem.mp4 4MB
- 00. Course Overview/00. Course Overview.mp4 4MB
- 01. Software Reverse Engineering with Ghidra/00. Module Introduction.mp4 1MB
- 04. Harnessing Ghidra’s Superpowers/00. Module Introduction.mp4 1MB
- 02. Working with Ghidra’s Core Components/00. Module Introduction.mp4 1MB
- 01. Software Reverse Engineering with Ghidra/05. Conclusion.mp4 1MB
- 02. Working with Ghidra’s Core Components/06. Conclusion.mp4 819KB
- 03. Enhancing Your Reversing Workflow/00. Module Introduction.mp4 721KB
- 03. Enhancing Your Reversing Workflow/04. Conclusion.mp4 664KB
- 03. Enhancing Your Reversing Workflow/03. Demo- Function Analysis.srt 21KB
- 02. Working with Ghidra’s Core Components/05. Demo- Analyzing a Trojan.srt 17KB
- 01. Software Reverse Engineering with Ghidra/04. Demo- Getting Started with Ghidra.srt 14KB
- 04. Harnessing Ghidra’s Superpowers/01. Working with the Decompiler.srt 13KB
- 03. Enhancing Your Reversing Workflow/01. Enhancing the CodeBrowser.srt 13KB
- 04. Harnessing Ghidra’s Superpowers/05. Demo- Scripting Example.srt 11KB
- 04. Harnessing Ghidra’s Superpowers/03. Demo- Headless Analyzer.srt 9KB
- 03. Enhancing Your Reversing Workflow/02. Function Analysis Tools and Techniques.srt 9KB
- 01. Software Reverse Engineering with Ghidra/01. Reverse Engineering and the Ghidra Software Reverse Engineering (SRE) Tools.srt 9KB
- 02. Working with Ghidra’s Core Components/03. Exploring the Main User Interface.srt 8KB
- 02. Working with Ghidra’s Core Components/04. Ghidra’s Decompiler.srt 7KB
- 02. Working with Ghidra’s Core Components/02. Projects and Auto-analysis.srt 6KB
- 01. Software Reverse Engineering with Ghidra/03. What You Should Know.srt 5KB
- 02. Working with Ghidra’s Core Components/01. Exploring Ghidra’s Main Components and Features.srt 4KB
- 04. Harnessing Ghidra’s Superpowers/06. Conclusion and Course Wrap-up.srt 4KB
- 01. Software Reverse Engineering with Ghidra/02. Malware Packing, Obfuscation, and Other Mayhem.srt 3KB
- 00. Course Overview/00. Course Overview.srt 3KB
- 04. Harnessing Ghidra’s Superpowers/02. Headless Analyzer.srt 2KB
- 04. Harnessing Ghidra’s Superpowers/04. Ghidra Scripts.srt 2KB
- 01. Software Reverse Engineering with Ghidra/00. Module Introduction.srt 2KB
- 04. Harnessing Ghidra’s Superpowers/00. Module Introduction.srt 1KB
- 01. Software Reverse Engineering with Ghidra/05. Conclusion.srt 1KB
- 02. Working with Ghidra’s Core Components/00. Module Introduction.srt 1KB
- 02. Working with Ghidra’s Core Components/06. Conclusion.srt 991B
- 03. Enhancing Your Reversing Workflow/04. Conclusion.srt 838B
- 03. Enhancing Your Reversing Workflow/00. Module Introduction.srt 786B
- 00. Course Overview/6 Simple Memory Techniques - All hacker use it.html 98B
- 02. Working with Ghidra’s Core Components/Linux Tails Operating System.html 84B
- 02. Working with Ghidra’s Core Components/USB Rubber Ducky Deluxe.html 84B
- 02. Working with Ghidra’s Core Components/Yubico - YubiKey 5 NFC.html 84B
- 04. Harnessing Ghidra’s Superpowers/Echo Dot (3rd Gen) - Smart speaker with Alexa - Charcoal.html 84B
- 04. Harnessing Ghidra’s Superpowers/Raspberry Pi 4.html 84B
- 04. Harnessing Ghidra’s Superpowers/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html 84B