Defeating Anti-reverse Engineering and Anti-debugging Techniques
- 收录时间:2021-07-21 20:21:49
- 文件大小:262MB
- 下载次数:1
- 最近下载:2021-07-21 20:21:49
- 磁力链接:
-
文件列表
- 03. Stopping Anti-debugging Techniques/04. Demo- Tracing Process Hollowing.mp4 36MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/06. Identifying Control-flow Obfuscation.mp4 34MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/04. Demo- Tracing Difficult Function Calls and Returns.mp4 26MB
- 04. Adding Stealth to Your Malware Sandbox/01. Using Virtualization for Your Sandboxing.mp4 17MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/03. Messing with Function Calls and Returns.mp4 15MB
- 03. Stopping Anti-debugging Techniques/05. Abusing Exceptions.mp4 13MB
- 03. Stopping Anti-debugging Techniques/02. Detecting a Debugger.mp4 13MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/05. Obfuscating Control Flow.mp4 12MB
- 04. Adding Stealth to Your Malware Sandbox/02. Processes, Shares, and Other Artifacts.mp4 12MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/01. Tricking the Disassembler.mp4 11MB
- 04. Adding Stealth to Your Malware Sandbox/03. Other Evidence of a Virtual Environment.mp4 10MB
- 03. Stopping Anti-debugging Techniques/06. Switching Architectures.mp4 9MB
- 03. Stopping Anti-debugging Techniques/03. Process Hollowing and Shellcode.mp4 8MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/02. Hiding Strings and API Calls.mp4 8MB
- 01. How Anti-analysis Affects Your Analysis/01. Goals and Motivations.mp4 6MB
- 03. Stopping Anti-debugging Techniques/01. Tricking a Debugger.mp4 6MB
- 04. Adding Stealth to Your Malware Sandbox/04. Conclusion and Course Wrap-up.mp4 5MB
- 01. How Anti-analysis Affects Your Analysis/03. What You Should Know.mp4 5MB
- 00. Course Overview/00. Course Overview.mp4 4MB
- 01. How Anti-analysis Affects Your Analysis/02. Where You Will Encounter These Tricks.mp4 4MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/00. Module Introduction.mp4 1MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/07. Conclusion.mp4 1MB
- 04. Adding Stealth to Your Malware Sandbox/00. Module Introduction.mp4 1MB
- 03. Stopping Anti-debugging Techniques/00. Module Introduction.mp4 1000KB
- 01. How Anti-analysis Affects Your Analysis/00. Module Introduction.mp4 870KB
- 03. Stopping Anti-debugging Techniques/07. Conclusion.mp4 741KB
- 01. How Anti-analysis Affects Your Analysis/04. Conclusion.mp4 592KB
- 03. Stopping Anti-debugging Techniques/04. Demo- Tracing Process Hollowing.srt 18KB
- 04. Adding Stealth to Your Malware Sandbox/01. Using Virtualization for Your Sandboxing.srt 16KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/06. Identifying Control-flow Obfuscation.srt 15KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/03. Messing with Function Calls and Returns.srt 15KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/04. Demo- Tracing Difficult Function Calls and Returns.srt 14KB
- 03. Stopping Anti-debugging Techniques/02. Detecting a Debugger.srt 12KB
- 04. Adding Stealth to Your Malware Sandbox/02. Processes, Shares, and Other Artifacts.srt 11KB
- 04. Adding Stealth to Your Malware Sandbox/03. Other Evidence of a Virtual Environment.srt 10KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/05. Obfuscating Control Flow.srt 9KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/01. Tricking the Disassembler.srt 9KB
- 03. Stopping Anti-debugging Techniques/05. Abusing Exceptions.srt 9KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/02. Hiding Strings and API Calls.srt 7KB
- 03. Stopping Anti-debugging Techniques/03. Process Hollowing and Shellcode.srt 7KB
- 03. Stopping Anti-debugging Techniques/01. Tricking a Debugger.srt 6KB
- 01. How Anti-analysis Affects Your Analysis/01. Goals and Motivations.srt 6KB
- 04. Adding Stealth to Your Malware Sandbox/04. Conclusion and Course Wrap-up.srt 6KB
- 03. Stopping Anti-debugging Techniques/06. Switching Architectures.srt 5KB
- 01. How Anti-analysis Affects Your Analysis/02. Where You Will Encounter These Tricks.srt 4KB
- 01. How Anti-analysis Affects Your Analysis/03. What You Should Know.srt 4KB
- 00. Course Overview/00. Course Overview.srt 3KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/00. Module Introduction.srt 2KB
- 04. Adding Stealth to Your Malware Sandbox/00. Module Introduction.srt 1KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/07. Conclusion.srt 1KB
- 03. Stopping Anti-debugging Techniques/00. Module Introduction.srt 1KB
- 01. How Anti-analysis Affects Your Analysis/00. Module Introduction.srt 1KB
- 03. Stopping Anti-debugging Techniques/07. Conclusion.srt 839B
- 01. How Anti-analysis Affects Your Analysis/04. Conclusion.srt 780B
- 00. Course Overview/6 Simple Memory Techniques - All hacker use.html 98B
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/Linux Tails Operating System.html 84B
- 04. Adding Stealth to Your Malware Sandbox/Defense against the Black Arts.html 84B
- 04. Adding Stealth to Your Malware Sandbox/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html 84B