zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
magnet:?xt=urn:btih:d32916d2a7e136799e911bfd33761e51aa71f53c&dn=[UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
磁力链接详情
文件列表详情
d32916d2a7e136799e911bfd33761e51aa71f53c
infohash:
36
文件数量
272.67 MB
文件大小
2021-7-14 22:20
创建日期
2024-11-7 06:54
最后访问
相关分词
UdemyCourseDownloader
Malware
Analysis
Identifying
and
Defeating
Code
Obfuscation
05. Identifying Malware Use of Cryptography/01. Purpose of Cryptography in Malware.mp4 19.74 MB
00. Course Overview/00. Course Overview.mp4 3.44 MB
01. How Obfuscation Affects Your Analysis/00. Module Introduction.mp4 1.03 MB
01. How Obfuscation Affects Your Analysis/01. Understanding Code Obfuscation.mp4 4.11 MB
01. How Obfuscation Affects Your Analysis/02. How Obfuscation Impacts Analysis.mp4 11.72 MB
01. How Obfuscation Affects Your Analysis/03. What You Should Know.mp4 5.06 MB
01. How Obfuscation Affects Your Analysis/04. Conclusion.mp4 928.01 KB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/00. Module Introduction.mp4 1.13 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Prevalent Obfuscation Techniques.mp4 6.53 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Obfuscation in Visual Basic for Applications (VBA).mp4 18.11 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Demo - Defeating VBA Obfuscation.mp4 16.67 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Obfuscation in PowerShell.mp4 3.43 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Demo - Defeating PowerShell Obfuscation.mp4 14.78 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Lab - Performing Comprehensive Analysis.mp4 13.86 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Conclusion.mp4 1.74 MB
03. Detecting and Defeating String Obfuscation in Native Code/00. Module Introduction.mp4 841.14 KB
03. Detecting and Defeating String Obfuscation in Native Code/01. Differences from Interpreted Code.mp4 5.06 MB
03. Detecting and Defeating String Obfuscation in Native Code/02. String Obfuscation.mp4 8.46 MB
03. Detecting and Defeating String Obfuscation in Native Code/03. Demo - Identifying String Obfuscation.mp4 14.81 MB
03. Detecting and Defeating String Obfuscation in Native Code/04. Lab - Defeating String Obfuscation.mp4 17.01 MB
03. Detecting and Defeating String Obfuscation in Native Code/05. Conclusion.mp4 1001.91 KB
04. Detecting and Defeating Function Obfuscation in Native Code/00. Module Introduction.mp4 1.24 MB
04. Detecting and Defeating Function Obfuscation in Native Code/01. Constructing an Import Table.mp4 2.45 MB
04. Detecting and Defeating Function Obfuscation in Native Code/02. Walking the PEB, Parsing a PE.mp4 18.17 MB
04. Detecting and Defeating Function Obfuscation in Native Code/03. Demo - Dynamic API Resolution.mp4 19.72 MB
04. Detecting and Defeating Function Obfuscation in Native Code/04. Lab - Tracing Import Table Construction.mp4 18.61 MB
04. Detecting and Defeating Function Obfuscation in Native Code/05. Conclusion.mp4 924.11 KB
05. Identifying Malware Use of Cryptography/00. Module Introduction.mp4 835.06 KB
05. Identifying Malware Use of Cryptography/02. Tools to Help Identify Use of Cryptography .mp4 5.72 MB
05. Identifying Malware Use of Cryptography/03. Demo - Finding Cryptography.mp4 18.96 MB
05. Identifying Malware Use of Cryptography/04. Lab - Analyzing Malware That Uses Cryptography.mp4 10.19 MB
05. Identifying Malware Use of Cryptography/05. Conclusion.mp4 930.4 KB
06. Leveling up Your Skills/00. Module Introduction.mp4 459.59 KB
06. Leveling up Your Skills/01. What You Learned.mp4 2.9 MB
06. Leveling up Your Skills/02. Leveling up Your Skills.mp4 1.85 MB
06. Leveling up Your Skills/03. Conclusion.mp4 370.77 KB
其他位置