磁力搜索 BT种子搜索利器 免费下载BT种子,超4000万条种子数据
为您找到约 315 个磁力链接/BT种子,耗时 0 毫秒。
排序: 相关程度 热度 文件大小 添加时间 最近访问

Cisco Firepower and Advanced Malware Protection

  • Cisco Firepower and Advanced Malware Protection LiveLessons.tgz 2.1 GB
  • Torrent downloaded from demonoid.pw.txt 46 Bytes
  • Torrent Downloaded From ExtraTorrent.cc.txt 352 Bytes
[磁力链接] 添加时间:2017-02-23 大小:2.1 GB 最近下载:2025-12-25 热度:2428

[CourseClub.NET] Skillshare - Malware Analysis Course for IT security

  • 1. Introduction to Malware Analysis.mp4 7.1 MB
  • 2. Malware Analysis Course Outline.mp4 9.9 MB
  • 3. Malware Analysis Lab Setup.mp4 25.4 MB
  • 4. Malware Analysis Taking and Restoring.mp4 26.9 MB
  • 5. Part 1 Using Monitoring Tools.mp4 71.3 MB
  • 6. Network Analysis.mp4 65.4 MB
  • 7. Analyzing Inner Encryption.mp4 94.9 MB
  • 8. Olly Essentials.mp4 85.6 MB
  • 9. Analyzing and Decrypting Mysterious File.mp4 102.9 MB
  • Day 1.rar 583.0 MB
  • Day 2.rar 52.7 MB
  • [CourseClub.NET].url 123 Bytes
  • [DesireCourse.Com].url 51 Bytes
[磁力链接] 添加时间:2018-11-14 大小:1.1 GB 最近下载:2025-12-25 热度:2399

Reverse Engineering, Debugging and Malware Analysis - 2021

  • 06 Software Exploitation/006 Stack Guards Bypass - Part 2.mp4 664.4 MB
  • 06 Software Exploitation/004 Methods Exploitation.mp4 537.6 MB
  • 06 Software Exploitation/007 Evil Server.mp4 523.5 MB
  • 06 Software Exploitation/005 Stack Guards Bypass.mp4 405.3 MB
  • 05 Debugging/001 Low Level (Assembly) Debugging With Immunity Debugger.mp4 273.9 MB
  • 06 Software Exploitation/003 Stack Reliability and GCC Example.mp4 190.3 MB
  • 06 Software Exploitation/002 Low-Level View and Managing Stacks.mp4 184.7 MB
  • 06 Software Exploitation/001 Software Exploitation Intro and Stack Frames in Memory.mp4 166.4 MB
  • 04 Malware and Memory Analysis/001 Volatility Cridex.mp4 161.0 MB
  • 04 Malware and Memory Analysis/003 Cridex Malware Analysis.mp4 161.0 MB
  • 01 Reverse Engineering Fundamentals/001 Reverse Engineering Fundamentals.mp4 122.9 MB
  • 04 Malware and Memory Analysis/002 Volatility R2D2.mp4 95.0 MB
  • 01 Reverse Engineering Fundamentals/002 Reverse Engineering Tools.mp4 73.4 MB
  • 03 Malware Behavior/002 Malware Identification.mp4 63.2 MB
  • 03 Malware Behavior/003 Presistence.mp4 47.9 MB
  • 01 Reverse Engineering Fundamentals/003 Analysis Types and Reporting.mp4 41.7 MB
  • 03 Malware Behavior/001 Analysis Tools.mp4 36.4 MB
  • 02 Operating System Components/004 Volatile Memory.mp4 36.0 MB
  • 02 Operating System Components/002 Non-Volatile Memory.mp4 33.6 MB
  • 02 Operating System Components/003 The Windows Registry.mp4 28.8 MB
[磁力链接] 添加时间:2022-01-12 大小:3.9 GB 最近下载:2025-11-21 热度:2284

[FreeCourseSite.com] Udemy - How Hackers Create Undetectable Malware and Viruses

  • 1. We Begin Here/1. Welcome and Introduction.mp4 3.3 MB
  • 1. We Begin Here/1. Welcome and Introduction.vtt 2.2 kB
  • 1. We Begin Here/2. Introduction to Undetectable Malware.mp4 36.7 MB
  • 1. We Begin Here/2. Introduction to Undetectable Malware.vtt 10.3 kB
  • 2. Understanding Malware and Creating the Hacking Environment/1. Installing Python and Pip.mp4 14.2 MB
  • 2. Understanding Malware and Creating the Hacking Environment/1. Installing Python and Pip.vtt 4.6 kB
  • 2. Understanding Malware and Creating the Hacking Environment/2. Installing Veil-Framework.mp4 11.6 MB
  • 2. Understanding Malware and Creating the Hacking Environment/2. Installing Veil-Framework.vtt 4.1 kB
  • 2. Understanding Malware and Creating the Hacking Environment/3. Setting Up The Veil Framework.mp4 48.6 MB
  • 2. Understanding Malware and Creating the Hacking Environment/3. Setting Up The Veil Framework.vtt 8.4 kB
  • 2. Understanding Malware and Creating the Hacking Environment/4. Installing Gnome Desktop.mp4 45.1 MB
  • 2. Understanding Malware and Creating the Hacking Environment/4. Installing Gnome Desktop.vtt 6.3 kB
  • 3. Veil and Metasploit/1. Wine Mono and Veil-Evasion Installation.mp4 6.6 MB
  • 3. Veil and Metasploit/1. Wine Mono and Veil-Evasion Installation.vtt 2.6 kB
  • 3. Veil and Metasploit/2. Installing Metasploit.mp4 30.1 MB
  • 3. Veil and Metasploit/2. Installing Metasploit.vtt 10.4 kB
  • 3. Veil and Metasploit/3. Metasploit Installation Complete.mp4 1.1 MB
  • 3. Veil and Metasploit/3. Metasploit Installation Complete.vtt 629 Bytes
  • 3. Veil and Metasploit/4. Testing MSF Console.mp4 1.8 MB
  • 3. Veil and Metasploit/4. Testing MSF Console.vtt 980 Bytes
[磁力链接] 添加时间:2018-09-03 大小:291.2 MB 最近下载:2025-12-26 热度:2278

Malwarebytes Anti-Malware Premium

  • Malwarebytes Premium/Setup/malwarebytes_setup_offline 278.7 MB
  • Malwarebytes Premium/Premium.exe 66.0 MB
  • Video instaLL.wmv 54.5 MB
  • Malwarebytes Premium/Utilities/mb-support.exe 14.2 MB
  • Malwarebytes Premium/UPDATE.exe 103.9 kB
  • Malwarebytes Premium/Malwarebytes Anti-Malware.exe 98.3 kB
  • Malwarebytes Premium/Uninstall.exe 86.0 kB
  • INFO.txt 4.9 kB
  • info.nfo 3.1 kB
  • Malwarebytes Premium/Setup/malwarebytes_setup_offline.md5 164 Bytes
[磁力链接] 添加时间:2024-07-09 大小:413.6 MB 最近下载:2025-12-27 热度:2221

[FreeCourseSite.com] Udemy - Reverse Engineering, Debugging and Malware Analysis - 2021

  • 6. Software Exploitation/6. Stack Guards Bypass - Part 2.mp4 664.4 MB
  • 6. Software Exploitation/4. Methods Exploitation.mp4 537.6 MB
  • 6. Software Exploitation/7. Evil Server.mp4 523.5 MB
  • 6. Software Exploitation/5. Stack Guards Bypass.mp4 405.3 MB
  • 5. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.mp4 273.9 MB
  • 6. Software Exploitation/3. Stack Reliability and GCC Example.mp4 190.3 MB
  • 6. Software Exploitation/2. Low-Level View and Managing Stacks.mp4 184.7 MB
  • 6. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.mp4 166.4 MB
  • 4. Malware and Memory Analysis/1. Volatility Cridex.mp4 161.0 MB
  • 4. Malware and Memory Analysis/3. Cridex Malware Analysis.mp4 161.0 MB
  • 1. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.mp4 122.9 MB
  • 4. Malware and Memory Analysis/2. Volatility R2D2.mp4 95.0 MB
  • 1. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.mp4 73.4 MB
  • 3. Malware Behavior/2. Malware Identification.mp4 63.2 MB
  • 3. Malware Behavior/3. Presistence.mp4 47.9 MB
  • 1. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.mp4 41.7 MB
  • 3. Malware Behavior/1. Analysis Tools.mp4 36.4 MB
  • 2. Operating System Components/4. Volatile Memory.mp4 36.0 MB
  • 2. Operating System Components/2. Non-Volatile Memory.mp4 33.6 MB
  • 2. Operating System Components/3. The Windows Registry.mp4 28.8 MB
[磁力链接] 添加时间:2021-06-21 大小:3.9 GB 最近下载:2025-12-27 热度:2168

[DesireCourse.Com] Udemy - How Hackers Create Undetectable Malware and Viruses

  • 01-we-begin-here/001-welcome-and-introduction.mp4 3.3 MB
  • 01-we-begin-here/002-introduction-to-undetectable-malware.mp4 36.7 MB
  • 02-understanding-malware-and-creating-the-hacking-environment/003-installing-python-and-pip.mp4 14.2 MB
  • 02-understanding-malware-and-creating-the-hacking-environment/004-installing-veilframework.mp4 11.6 MB
  • 02-understanding-malware-and-creating-the-hacking-environment/005-setting-up-the-veil-framework.mp4 48.6 MB
  • 02-understanding-malware-and-creating-the-hacking-environment/006-installing-gnome-desktop.mp4 45.1 MB
  • 03-veil-and-metasploit/007-wine-mono-and-veilevasion-installation.mp4 6.6 MB
  • 03-veil-and-metasploit/008-installing-metasploit.mp4 30.1 MB
  • 03-veil-and-metasploit/009-metasploit-installation-complete.mp4 1.1 MB
  • 03-veil-and-metasploit/010-testing-msf-console.mp4 1.8 MB
  • 03-veil-and-metasploit/011-veil-evasion-final-installation.mp4 16.4 MB
  • 03-veil-and-metasploit/012-adding-the-metasploit-folder-to-veil-installation.mp4 1.5 MB
  • 03-veil-and-metasploit/013-introduction-to-veil-and-the-importance-in-ethical-hacking.mp4 10.7 MB
  • 04-how-hackers-create-undetectable-malware/014-creating-an-exploit.mp4 26.5 MB
  • 04-how-hackers-create-undetectable-malware/015-testing-exploit-on-windows-10-machine.mp4 32.2 MB
  • 04-how-hackers-create-undetectable-malware/016-encrypting-payload.mp4 4.7 MB
  • [DesireCourse.Com].url 51 Bytes
[磁力链接] 添加时间:2018-08-05 大小:291.0 MB 最近下载:2025-12-07 热度:2105

[UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation

  • 05. Identifying Malware Use of Cryptography/01. Purpose of Cryptography in Malware.mp4 20.7 MB
  • 04. Detecting and Defeating Function Obfuscation in Native Code/03. Demo - Dynamic API Resolution.mp4 20.7 MB
  • 05. Identifying Malware Use of Cryptography/03. Demo - Finding Cryptography.mp4 19.9 MB
  • 04. Detecting and Defeating Function Obfuscation in Native Code/04. Lab - Tracing Import Table Construction.mp4 19.5 MB
  • 04. Detecting and Defeating Function Obfuscation in Native Code/02. Walking the PEB, Parsing a PE.mp4 19.1 MB
  • 02. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Obfuscation in Visual Basic for Applications (VBA).mp4 19.0 MB
  • 03. Detecting and Defeating String Obfuscation in Native Code/04. Lab - Defeating String Obfuscation.mp4 17.8 MB
  • 02. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Demo - Defeating VBA Obfuscation.mp4 17.5 MB
  • 03. Detecting and Defeating String Obfuscation in Native Code/03. Demo - Identifying String Obfuscation.mp4 15.5 MB
  • 02. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Demo - Defeating PowerShell Obfuscation.mp4 15.5 MB
  • 02. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Lab - Performing Comprehensive Analysis.mp4 14.5 MB
  • 01. How Obfuscation Affects Your Analysis/02. How Obfuscation Impacts Analysis.mp4 12.3 MB
  • 05. Identifying Malware Use of Cryptography/04. Lab - Analyzing Malware That Uses Cryptography.mp4 10.7 MB
  • 03. Detecting and Defeating String Obfuscation in Native Code/02. String Obfuscation.mp4 8.9 MB
  • 02. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Prevalent Obfuscation Techniques.mp4 6.8 MB
  • 05. Identifying Malware Use of Cryptography/02. Tools to Help Identify Use of Cryptography .mp4 6.0 MB
  • 03. Detecting and Defeating String Obfuscation in Native Code/01. Differences from Interpreted Code.mp4 5.3 MB
  • 01. How Obfuscation Affects Your Analysis/03. What You Should Know.mp4 5.3 MB
  • 01. How Obfuscation Affects Your Analysis/01. Understanding Code Obfuscation.mp4 4.3 MB
  • 00. Course Overview/00. Course Overview.mp4 3.6 MB
[磁力链接] 添加时间:2022-05-07 大小:285.9 MB 最近下载:2025-12-25 热度:2044

[ CourseMega.com ] Udemy - Reverse Engineering & Malware Analysis of .NET & Java.zip

  • [ CourseMega.com ] Udemy - Reverse Engineering & Malware Analysis of .NET & Java.zip 1.5 GB
[磁力链接] 添加时间:2022-01-16 大小:1.5 GB 最近下载:2025-12-25 热度:2005

Malware Hunting with Mark Russinovich and Sysinternals Tools

  • Malware Hunting with Mark Russinovich and the Sysinternals Tools.mp4 324.0 MB
  • Readme.txt 3.0 kB
  • Sysinternals Suite May 26 2015 RELEASE/Readme.txt 2.8 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/accesschk.exe 683.2 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AccessEnum.exe 175.0 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AdExplorer.chm 50.4 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADExplorer.exe 479.8 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.chm 401.6 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.exe 1.0 MB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/adrestore.exe 150.3 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autologon.exe 148.9 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autoruns.chm 50.5 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autoruns.exe 680.6 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autorunsc.exe 593.0 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Bginfo.exe 847.0 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Cacheset.exe 154.4 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Clockres.exe 151.9 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Contig.exe 208.0 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Coreinfo.exe 892.1 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ctrl2cap.amd.sys 10.1 kB
[磁力链接] 添加时间:2017-03-15 大小:359.7 MB 最近下载:2025-12-25 热度:1942

[FreeCourseLab.com] Udemy - How Hackers Create Malware and Infiltrate Victim Machines

  • 1. Introduction/1. Introduction and Welcome.mp4 13.9 MB
  • 1. Introduction/1. Introduction and Welcome.vtt 8.4 kB
  • 2. Initial Building Blocks/1. Introduction to Malware and Trojans.mp4 8.1 MB
  • 2. Initial Building Blocks/1. Introduction to Malware and Trojans.vtt 5.3 kB
  • 2. Initial Building Blocks/2. Installing C C++ Compiler.mp4 14.9 MB
  • 2. Initial Building Blocks/2. Installing C C++ Compiler.vtt 5.7 kB
  • 2. Initial Building Blocks/3. Downloading Additional Applications.mp4 15.1 MB
  • 2. Initial Building Blocks/3. Downloading Additional Applications.vtt 5.7 kB
  • 3. Lets Create Malware!/1. Creating a Malware Program with Codeblocks.mp4 23.3 MB
  • 3. Lets Create Malware!/1. Creating a Malware Program with Codeblocks.vtt 9.5 kB
  • 3. Lets Create Malware!/2. Running Apache Server and Uploading Malware to Server.mp4 31.3 MB
  • 3. Lets Create Malware!/2. Running Apache Server and Uploading Malware to Server.vtt 10.0 kB
  • 3. Lets Create Malware!/3. Using Reverse Shell on Victim's PC.mp4 26.4 MB
  • 3. Lets Create Malware!/3. Using Reverse Shell on Victim's PC.vtt 9.0 kB
  • 3. Lets Create Malware!/4. Viewing Access Logs and Introduction to the Metasploit Framerwork.mp4 23.2 MB
  • 3. Lets Create Malware!/4. Viewing Access Logs and Introduction to the Metasploit Framerwork.vtt 8.6 kB
  • 3. Lets Create Malware!/5. What to Do When Victim is on a Different Network.mp4 8.8 MB
  • 3. Lets Create Malware!/5. What to Do When Victim is on a Different Network.vtt 3.2 kB
  • 3. Lets Create Malware!/6. Using Metasploit to Create an Exploit.mp4 8.7 MB
  • 3. Lets Create Malware!/6. Using Metasploit to Create an Exploit.vtt 3.7 kB
[磁力链接] 添加时间:2018-11-12 大小:173.7 MB 最近下载:2025-12-26 热度:1941

[ FreeCourseWeb.com ] PluralSight - Malware Analysis- Identifying and Defeating Packing.zip

  • [ FreeCourseWeb.com ] PluralSight - Malware Analysis- Identifying and Defeating Packing.zip 362.5 MB
[磁力链接] 添加时间:2021-04-13 大小:362.5 MB 最近下载:2025-12-21 热度:1935

[ FreeCourseWeb.com ] PluralSight - Malware Analysis- Identifying and Defeating Packing.zip

  • [ FreeCourseWeb.com ] PluralSight - Malware Analysis- Identifying and Defeating Packing.zip 362.5 MB
[磁力链接] 添加时间:2021-06-15 大小:362.5 MB 最近下载:2025-09-11 热度:1819

License to Kill Malware Hunting with the Sysinternals Tools

  • License to Kill Malware Hunting with the Sysinternals Tools.mp4 877.9 MB
  • Readme.txt 3.3 kB
  • Sysinternals Suite May 26 2015 RELEASE/Readme.txt 2.8 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/accesschk.exe 683.2 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AccessEnum.exe 175.0 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AdExplorer.chm 50.4 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADExplorer.exe 479.8 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.chm 401.6 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.exe 1.0 MB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/adrestore.exe 150.3 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autologon.exe 148.9 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autoruns.chm 50.5 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autoruns.exe 680.6 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autorunsc.exe 593.0 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Bginfo.exe 847.0 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Cacheset.exe 154.4 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Clockres.exe 151.9 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Contig.exe 208.0 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Coreinfo.exe 892.1 kB
  • Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ctrl2cap.amd.sys 10.1 kB
[磁力链接] 添加时间:2017-03-08 大小:913.6 MB 最近下载:2025-12-17 热度:1731

[ FreeCourseWeb.com ] Udemy - Malware Analysis & Incident Response for IT Technicians.zip

  • [ FreeCourseWeb.com ] Udemy - Malware Analysis & Incident Response for IT Technicians.zip 220.3 MB
[磁力链接] 添加时间:2021-03-15 大小:220.3 MB 最近下载:2025-12-22 热度:1729

[ FreeCourseWeb.com ] Udemy - Android Malware Analysis - From Zero to Hero.zip

  • [ FreeCourseWeb.com ] Udemy - Android Malware Analysis - From Zero to Hero.zip 732.0 MB
[磁力链接] 添加时间:2022-02-13 大小:732.0 MB 最近下载:2025-12-26 热度:1648

Getting Started Analyzing Malware Infections

  • analyzing-malware-infections-getting-started/1-analyzing-malware-infections-getting-started-m1-slides.pdf 692.4 kB
  • analyzing-malware-infections-getting-started/2-analyzing-malware-infections-getting-started-m2-slides.pdf 582.1 kB
  • analyzing-malware-infections-getting-started/3-analyzing-malware-infections-getting-started-m3-slides.pdf 411.5 kB
  • analyzing-malware-infections-getting-started/4-analyzing-malware-infections-getting-started-m4-slides.pdf 755.7 kB
  • analyzing-malware-infections-getting-started/5-analyzing-malware-infections-getting-started-m5-slides.pdf 527.6 kB
  • 01 - Course Overview - Course Overview.mp4 7.3 MB
  • 02 - Investigating Malware Infections - Problem Statement.mp4 4.8 MB
  • 03 - Investigating Malware Infections - Understanding Phishing Tactics.mp4 6.5 MB
  • 04 - Investigating Malware Infections - Indicators of Compromise.mp4 4.6 MB
  • 05 - Investigating Malware Infections - Analyzing a Suspicious Mail.mp4 11.6 MB
  • 06 - Investigating Malware Infections - Setting up an Analysis Environment.mp4 4.5 MB
  • 07 - Investigating Malware Infections - Analyzing Malware Off Network.mp4 3.7 MB
  • 08 - Investigating Malware Infections - Snapshotting.mp4 2.4 MB
  • 09 - Investigating Malware Infections - Safe Handling Procedures.mp4 5.2 MB
  • 10 - Investigating Malware Infections - Safe Handling in Practice.mp4 12.7 MB
  • 11 - Investigating Malware Infections - Summary.mp4 2.3 MB
  • 12 - Analyzing Malicious Links - Classifying Malicious Links.mp4 4.8 MB
  • 13 - Analyzing Malicious Links - Exploit Kits.mp4 3.4 MB
  • 14 - Analyzing Malicious Links - Malicious Resources.mp4 3.6 MB
  • 15 - Analyzing Malicious Links - Victim's Perspective of an Infection.mp4 3.6 MB
[磁力链接] 添加时间:2017-02-22 大小:261.3 MB 最近下载:2025-12-24 热度:1627

[ DevCourseWeb.com ] Udemy - A-Z Malware Design and Analysis

  • ~Get Your Files Here !/01 - Part 1 - Essential Theories/004 Binary Analysis Fundementals.mp4 484.4 MB
  • ~Get Your Files Here !/01 - Part 1 - Essential Theories/002 Lecture 2_ Malware Introdcution.mp4 210.2 MB
  • ~Get Your Files Here !/02 - Practical Part/005 Learning how to setup and use IDA-Pro.mp4 193.7 MB
  • ~Get Your Files Here !/03 - Write your own malware_/001 Create your own real-world malware for learning and analysis - part 1.mp4 170.0 MB
  • ~Get Your Files Here !/01 - Part 1 - Essential Theories/003 Lecture 3_ Software Exploitations in Malware Design.mp4 123.0 MB
  • ~Get Your Files Here !/03 - Write your own malware_/004 Create your own real-world malware for learning and analysis - Last part.mp4 92.4 MB
  • ~Get Your Files Here !/02 - Practical Part/003 How to pack and unpack executable files.mp4 88.1 MB
  • ~Get Your Files Here !/03 - Write your own malware_/002 Create your own real-world malware for learning and analysis - part 2.mp4 86.3 MB
  • ~Get Your Files Here !/02 - Practical Part/001 Understanding the PE analysis of an executable file { part 1 }.mp4 82.0 MB
  • ~Get Your Files Here !/02 - Practical Part/002 Analying the PE structure of your executable file.mp4 45.0 MB
  • ~Get Your Files Here !/03 - Write your own malware_/003 Create your own real-world malware for learning and analysis - part 3.mp4 18.7 MB
  • ~Get Your Files Here !/02 - Practical Part/004 Identidying the packing algorithm used in a given file.mp4 14.4 MB
  • ~Get Your Files Here !/01 - Part 1 - Essential Theories/001 Introduction.mp4 13.3 MB
  • ~Get Your Files Here !/01 - Part 1 - Essential Theories/004 Binary Analysis Fundementals_en.srt 102.8 kB
  • ~Get Your Files Here !/03 - Write your own malware_/001 Create your own real-world malware for learning and analysis - part 1_en.srt 46.0 kB
  • ~Get Your Files Here !/01 - Part 1 - Essential Theories/003 Lecture 3_ Software Exploitations in Malware Design_en.srt 33.0 kB
  • ~Get Your Files Here !/02 - Practical Part/005 Learning how to setup and use IDA-Pro_en.srt 22.0 kB
  • ~Get Your Files Here !/02 - Practical Part/001 Understanding the PE analysis of an executable file { part 1 }_en.srt 19.4 kB
  • ~Get Your Files Here !/02 - Practical Part/003 How to pack and unpack executable files_en.srt 12.4 kB
  • ~Get Your Files Here !/03 - Write your own malware_/002 Create your own real-world malware for learning and analysis - part 2_en.srt 12.2 kB
[磁力链接] 添加时间:2022-02-09 大小:1.6 GB 最近下载:2025-12-25 热度:1608

[ DevCourseWeb.com ] Udemy - Learn Reverse Engineering With Android Malware Analysis

  • ~Get Your Files Here !/5. Malware case study Exodus spyware/1. Exodus malware case study.mp4 77.2 MB
  • ~Get Your Files Here !/3. Building applications Android malware examples/1. Building and reverse engineering simple malware.mp4 72.3 MB
  • ~Get Your Files Here !/3. Building applications Android malware examples/2. Building a simple phishing application.mp4 55.5 MB
  • ~Get Your Files Here !/2. The Fundementals/4. Introduction to obfuscation in Android.mp4 48.0 MB
  • ~Get Your Files Here !/4. Miscellaneous Techniques/1. Retrieving application's from a device.mp4 44.6 MB
  • ~Get Your Files Here !/2. The Fundementals/2. Introduction to Android Malware Analysis.mp4 43.1 MB
  • ~Get Your Files Here !/1. Introduction/2. Tooling.mp4 41.0 MB
  • ~Get Your Files Here !/2. The Fundementals/1. Introduction to Android Reverse Engineering.mp4 39.6 MB
  • ~Get Your Files Here !/4. Miscellaneous Techniques/2. Using machine learning to identify malware.mp4 33.9 MB
  • ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 32.3 MB
  • ~Get Your Files Here !/6. Wrap Up/1. Thanks and wrap up.mp4 22.8 MB
  • ~Get Your Files Here !/2. The Fundementals/2.1 malware-book.pdf 20.3 MB
  • ~Get Your Files Here !/2. The Fundementals/2.2 malware-intro.pdf 8.3 MB
  • ~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/dex/debug/mergeExtDexDebug/classes.dex 5.3 MB
  • ~Get Your Files Here !/2. The Fundementals/5.1 obfuscation.pdf 4.8 MB
  • ~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/apk/debug/app-debug.apk 4.0 MB
  • ~Get Your Files Here !/2. The Fundementals/1.2 reverse-engineering.pdf 3.5 MB
  • ~Get Your Files Here !/2. The Fundementals/1.1 ios-and-android-re.pdf 3.5 MB
  • ~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/incremental/mergeDebugResources/merger.xml 1.6 MB
  • ~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/incremental/debug-mergeJavaRes/zip-cache/93DqCsxRP16jyBW1wbfr9hOZXiw= 1.4 MB
[磁力链接] 添加时间:2024-02-05 大小:577.5 MB 最近下载:2025-12-21 热度:1581

build-undetectable-malware-using-c-language-ethical-hacking

  • course/05 - Creating Persistance & Nesting Our Program In Windows Registry/002 Interacting With Registry In Order To Start Our Program Automaticly.mp4 370.4 MB
  • course/07 - Hacking Windows 10/002 Hacking Windows 10 Target With Our Program.mp4 319.3 MB
  • course/02 - Hiding Our Program & Defining Connection Points/003 Defining Connection Points To Our Backdoor.mp4 305.9 MB
  • course/03 - Building Shell Function & Executing Commands/003 Server Socket Initiation.mp4 301.5 MB
  • course/03 - Building Shell Function & Executing Commands/004 Making Server Compatible With Our Backdoor.mp4 258.7 MB
  • course/06 - Adding Keylogger To Our Malware/001 Understanding Keylogger Code.mp4 244.9 MB
  • course/07 - Hacking Windows 10/004 Is It a Browser Or Backdoor.mp4 236.3 MB
  • course/03 - Building Shell Function & Executing Commands/001 Creating Our Shell Function.mp4 231.8 MB
  • course/03 - Building Shell Function & Executing Commands/002 Executing Commands On Target Machine.mp4 223.5 MB
  • course/03 - Building Shell Function & Executing Commands/005 Testing Our Malware For Command Execution.mp4 221.2 MB
  • course/01 - Introduction & Welcome To Hacking With C!/004 How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).mp4 201.9 MB
  • course/02 - Hiding Our Program & Defining Connection Points/002 Hiding Our Program Console Window.mp4 179.1 MB
  • course/04 - Switching Directories Inside Of A Program/001 Changing Our Program Directory.mp4 174.5 MB
  • course/07 - Hacking Windows 10/003 You Have Been Hacked.mp4 174.0 MB
  • course/02 - Hiding Our Program & Defining Connection Points/001 Explaining Malware Structure & Including Needed Libraries.mp4 151.3 MB
  • course/06 - Adding Keylogger To Our Malware/002 Adding Keylogger Function To Our Backdoor.mp4 149.5 MB
  • course/02 - Hiding Our Program & Defining Connection Points/005 Attempting Connection Every 10 Seconds With Our Target.mp4 138.3 MB
  • course/01 - Introduction & Welcome To Hacking With C!/002 What Are We Going To Learn In This Course & What You Need To Know!.mp4 108.8 MB
  • course/01 - Introduction & Welcome To Hacking With C!/003 Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine.mp4 104.0 MB
  • course/07 - Hacking Windows 10/001 Updating Our Server Code.mp4 102.4 MB
[磁力链接] 添加时间:2022-01-10 大小:4.3 GB 最近下载:2025-12-19 热度:1562


共16页 上一页 1 2 3 4 5 6 7 8 下一页