589689.xyz

[] Udemy - Reverse Engineering, Debugging and Malware Analysis - 2021

  • 收录时间:2021-09-12 19:11:28
  • 文件大小:4GB
  • 下载次数:1
  • 最近下载:2021-09-12 19:11:28
  • 磁力链接:

文件列表

  1. 6. Software Exploitation/6. Stack Guards Bypass - Part 2.mp4 634MB
  2. 6. Software Exploitation/4. Methods Exploitation.mp4 513MB
  3. 6. Software Exploitation/7. Evil Server.mp4 499MB
  4. 6. Software Exploitation/5. Stack Guards Bypass.mp4 386MB
  5. 5. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.mp4 261MB
  6. 6. Software Exploitation/3. Stack Reliability and GCC Example.mp4 181MB
  7. 6. Software Exploitation/2. Low-Level View and Managing Stacks.mp4 176MB
  8. 6. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.mp4 159MB
  9. 4. Malware and Memory Analysis/1. Volatility Cridex.mp4 154MB
  10. 4. Malware and Memory Analysis/3. Cridex Malware Analysis.mp4 153MB
  11. 1. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.mp4 117MB
  12. 4. Malware and Memory Analysis/2. Volatility R2D2.mp4 91MB
  13. 1. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.mp4 70MB
  14. 3. Malware Behavior/2. Malware Identification.mp4 60MB
  15. 3. Malware Behavior/3. Presistence.mp4 46MB
  16. 1. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.mp4 40MB
  17. 3. Malware Behavior/1. Analysis Tools.mp4 35MB
  18. 2. Operating System Components/4. Volatile Memory.mp4 34MB
  19. 2. Operating System Components/2. Non-Volatile Memory.mp4 32MB
  20. 2. Operating System Components/3. The Windows Registry.mp4 27MB
  21. 2. Operating System Components/1. Filesystem.mp4 23MB
  22. 6. Software Exploitation/7. Evil Server.srt 73KB
  23. 6. Software Exploitation/4. Methods Exploitation.srt 59KB
  24. 6. Software Exploitation/6. Stack Guards Bypass - Part 2.srt 47KB
  25. 6. Software Exploitation/2. Low-Level View and Managing Stacks.srt 41KB
  26. 6. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.srt 38KB
  27. 6. Software Exploitation/5. Stack Guards Bypass.srt 35KB
  28. 6. Software Exploitation/3. Stack Reliability and GCC Example.srt 30KB
  29. 5. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.srt 26KB
  30. 1. Reverse Engineering Fundamentals/2.1 patrick.gif 16KB
  31. 1. Reverse Engineering Fundamentals/3.1 patrick.gif 16KB
  32. 2. Operating System Components/1.1 malware.png 15KB
  33. 4. Malware and Memory Analysis/1. Volatility Cridex.srt 10KB
  34. 4. Malware and Memory Analysis/3. Cridex Malware Analysis.srt 10KB
  35. 1. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.srt 8KB
  36. 4. Malware and Memory Analysis/2. Volatility R2D2.srt 6KB
  37. 1. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.srt 5KB
  38. 3. Malware Behavior/1. Analysis Tools.srt 5KB
  39. 3. Malware Behavior/2. Malware Identification.srt 4KB
  40. 3. Malware Behavior/4. Malware Presistence.html 4KB
  41. 1. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.srt 3KB
  42. 2. Operating System Components/2. Non-Volatile Memory.srt 3KB
  43. 3. Malware Behavior/3. Presistence.srt 3KB
  44. 2. Operating System Components/1. Filesystem.srt 3KB
  45. 2. Operating System Components/3. The Windows Registry.srt 2KB
  46. 2. Operating System Components/4. Volatile Memory.srt 2KB
  47. 2. Operating System Components/5. Operating System Components.html 166B
  48. 6. Software Exploitation/8. Test 1.html 166B
  49. 0. Websites you may like/[FCS Forum].url 133B
  50. 0. Websites you may like/[FreeCourseSite.com].url 127B
  51. 0. Websites you may like/[CourseClub.ME].url 122B