搜索
为您找到约
315
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
Cisco Firepower and Advanced Malware Protection
Cisco Firepower and Advanced Malware Protection LiveLessons.tgz
2.1 GB
Torrent downloaded from demonoid.pw.txt
46 Bytes
Torrent Downloaded From ExtraTorrent.cc.txt
352 Bytes
[磁力链接]
添加时间:
2017-02-23
大小:
2.1 GB
最近下载:
2025-12-25
热度:
2428
[CourseClub.NET] Skillshare - Malware Analysis Course for IT security
1. Introduction to Malware Analysis.mp4
7.1 MB
2. Malware Analysis Course Outline.mp4
9.9 MB
3. Malware Analysis Lab Setup.mp4
25.4 MB
4. Malware Analysis Taking and Restoring.mp4
26.9 MB
5. Part 1 Using Monitoring Tools.mp4
71.3 MB
6. Network Analysis.mp4
65.4 MB
7. Analyzing Inner Encryption.mp4
94.9 MB
8. Olly Essentials.mp4
85.6 MB
9. Analyzing and Decrypting Mysterious File.mp4
102.9 MB
Day 1.rar
583.0 MB
Day 2.rar
52.7 MB
[CourseClub.NET].url
123 Bytes
[DesireCourse.Com].url
51 Bytes
[磁力链接]
添加时间:
2018-11-14
大小:
1.1 GB
最近下载:
2025-12-25
热度:
2399
Reverse Engineering, Debugging and Malware Analysis - 2021
06 Software Exploitation/006 Stack Guards Bypass - Part 2.mp4
664.4 MB
06 Software Exploitation/004 Methods Exploitation.mp4
537.6 MB
06 Software Exploitation/007 Evil Server.mp4
523.5 MB
06 Software Exploitation/005 Stack Guards Bypass.mp4
405.3 MB
05 Debugging/001 Low Level (Assembly) Debugging With Immunity Debugger.mp4
273.9 MB
06 Software Exploitation/003 Stack Reliability and GCC Example.mp4
190.3 MB
06 Software Exploitation/002 Low-Level View and Managing Stacks.mp4
184.7 MB
06 Software Exploitation/001 Software Exploitation Intro and Stack Frames in Memory.mp4
166.4 MB
04 Malware and Memory Analysis/001 Volatility Cridex.mp4
161.0 MB
04 Malware and Memory Analysis/003 Cridex Malware Analysis.mp4
161.0 MB
01 Reverse Engineering Fundamentals/001 Reverse Engineering Fundamentals.mp4
122.9 MB
04 Malware and Memory Analysis/002 Volatility R2D2.mp4
95.0 MB
01 Reverse Engineering Fundamentals/002 Reverse Engineering Tools.mp4
73.4 MB
03 Malware Behavior/002 Malware Identification.mp4
63.2 MB
03 Malware Behavior/003 Presistence.mp4
47.9 MB
01 Reverse Engineering Fundamentals/003 Analysis Types and Reporting.mp4
41.7 MB
03 Malware Behavior/001 Analysis Tools.mp4
36.4 MB
02 Operating System Components/004 Volatile Memory.mp4
36.0 MB
02 Operating System Components/002 Non-Volatile Memory.mp4
33.6 MB
02 Operating System Components/003 The Windows Registry.mp4
28.8 MB
[磁力链接]
添加时间:
2022-01-12
大小:
3.9 GB
最近下载:
2025-11-21
热度:
2284
[FreeCourseSite.com] Udemy - How Hackers Create Undetectable Malware and Viruses
1. We Begin Here/1. Welcome and Introduction.mp4
3.3 MB
1. We Begin Here/1. Welcome and Introduction.vtt
2.2 kB
1. We Begin Here/2. Introduction to Undetectable Malware.mp4
36.7 MB
1. We Begin Here/2. Introduction to Undetectable Malware.vtt
10.3 kB
2. Understanding Malware and Creating the Hacking Environment/1. Installing Python and Pip.mp4
14.2 MB
2. Understanding Malware and Creating the Hacking Environment/1. Installing Python and Pip.vtt
4.6 kB
2. Understanding Malware and Creating the Hacking Environment/2. Installing Veil-Framework.mp4
11.6 MB
2. Understanding Malware and Creating the Hacking Environment/2. Installing Veil-Framework.vtt
4.1 kB
2. Understanding Malware and Creating the Hacking Environment/3. Setting Up The Veil Framework.mp4
48.6 MB
2. Understanding Malware and Creating the Hacking Environment/3. Setting Up The Veil Framework.vtt
8.4 kB
2. Understanding Malware and Creating the Hacking Environment/4. Installing Gnome Desktop.mp4
45.1 MB
2. Understanding Malware and Creating the Hacking Environment/4. Installing Gnome Desktop.vtt
6.3 kB
3. Veil and Metasploit/1. Wine Mono and Veil-Evasion Installation.mp4
6.6 MB
3. Veil and Metasploit/1. Wine Mono and Veil-Evasion Installation.vtt
2.6 kB
3. Veil and Metasploit/2. Installing Metasploit.mp4
30.1 MB
3. Veil and Metasploit/2. Installing Metasploit.vtt
10.4 kB
3. Veil and Metasploit/3. Metasploit Installation Complete.mp4
1.1 MB
3. Veil and Metasploit/3. Metasploit Installation Complete.vtt
629 Bytes
3. Veil and Metasploit/4. Testing MSF Console.mp4
1.8 MB
3. Veil and Metasploit/4. Testing MSF Console.vtt
980 Bytes
[磁力链接]
添加时间:
2018-09-03
大小:
291.2 MB
最近下载:
2025-12-26
热度:
2278
Malwarebytes Anti-Malware Premium
Malwarebytes Premium/Setup/malwarebytes_setup_offline
278.7 MB
Malwarebytes Premium/Premium.exe
66.0 MB
Video instaLL.wmv
54.5 MB
Malwarebytes Premium/Utilities/mb-support.exe
14.2 MB
Malwarebytes Premium/UPDATE.exe
103.9 kB
Malwarebytes Premium/Malwarebytes Anti-Malware.exe
98.3 kB
Malwarebytes Premium/Uninstall.exe
86.0 kB
INFO.txt
4.9 kB
info.nfo
3.1 kB
Malwarebytes Premium/Setup/malwarebytes_setup_offline.md5
164 Bytes
[磁力链接]
添加时间:
2024-07-09
大小:
413.6 MB
最近下载:
2025-12-27
热度:
2221
[FreeCourseSite.com] Udemy - Reverse Engineering, Debugging and Malware Analysis - 2021
6. Software Exploitation/6. Stack Guards Bypass - Part 2.mp4
664.4 MB
6. Software Exploitation/4. Methods Exploitation.mp4
537.6 MB
6. Software Exploitation/7. Evil Server.mp4
523.5 MB
6. Software Exploitation/5. Stack Guards Bypass.mp4
405.3 MB
5. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.mp4
273.9 MB
6. Software Exploitation/3. Stack Reliability and GCC Example.mp4
190.3 MB
6. Software Exploitation/2. Low-Level View and Managing Stacks.mp4
184.7 MB
6. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.mp4
166.4 MB
4. Malware and Memory Analysis/1. Volatility Cridex.mp4
161.0 MB
4. Malware and Memory Analysis/3. Cridex Malware Analysis.mp4
161.0 MB
1. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.mp4
122.9 MB
4. Malware and Memory Analysis/2. Volatility R2D2.mp4
95.0 MB
1. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.mp4
73.4 MB
3. Malware Behavior/2. Malware Identification.mp4
63.2 MB
3. Malware Behavior/3. Presistence.mp4
47.9 MB
1. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.mp4
41.7 MB
3. Malware Behavior/1. Analysis Tools.mp4
36.4 MB
2. Operating System Components/4. Volatile Memory.mp4
36.0 MB
2. Operating System Components/2. Non-Volatile Memory.mp4
33.6 MB
2. Operating System Components/3. The Windows Registry.mp4
28.8 MB
[磁力链接]
添加时间:
2021-06-21
大小:
3.9 GB
最近下载:
2025-12-27
热度:
2168
[DesireCourse.Com] Udemy - How Hackers Create Undetectable Malware and Viruses
01-we-begin-here/001-welcome-and-introduction.mp4
3.3 MB
01-we-begin-here/002-introduction-to-undetectable-malware.mp4
36.7 MB
02-understanding-malware-and-creating-the-hacking-environment/003-installing-python-and-pip.mp4
14.2 MB
02-understanding-malware-and-creating-the-hacking-environment/004-installing-veilframework.mp4
11.6 MB
02-understanding-malware-and-creating-the-hacking-environment/005-setting-up-the-veil-framework.mp4
48.6 MB
02-understanding-malware-and-creating-the-hacking-environment/006-installing-gnome-desktop.mp4
45.1 MB
03-veil-and-metasploit/007-wine-mono-and-veilevasion-installation.mp4
6.6 MB
03-veil-and-metasploit/008-installing-metasploit.mp4
30.1 MB
03-veil-and-metasploit/009-metasploit-installation-complete.mp4
1.1 MB
03-veil-and-metasploit/010-testing-msf-console.mp4
1.8 MB
03-veil-and-metasploit/011-veil-evasion-final-installation.mp4
16.4 MB
03-veil-and-metasploit/012-adding-the-metasploit-folder-to-veil-installation.mp4
1.5 MB
03-veil-and-metasploit/013-introduction-to-veil-and-the-importance-in-ethical-hacking.mp4
10.7 MB
04-how-hackers-create-undetectable-malware/014-creating-an-exploit.mp4
26.5 MB
04-how-hackers-create-undetectable-malware/015-testing-exploit-on-windows-10-machine.mp4
32.2 MB
04-how-hackers-create-undetectable-malware/016-encrypting-payload.mp4
4.7 MB
[DesireCourse.Com].url
51 Bytes
[磁力链接]
添加时间:
2018-08-05
大小:
291.0 MB
最近下载:
2025-12-07
热度:
2105
[UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
05. Identifying Malware Use of Cryptography/01. Purpose of Cryptography in Malware.mp4
20.7 MB
04. Detecting and Defeating Function Obfuscation in Native Code/03. Demo - Dynamic API Resolution.mp4
20.7 MB
05. Identifying Malware Use of Cryptography/03. Demo - Finding Cryptography.mp4
19.9 MB
04. Detecting and Defeating Function Obfuscation in Native Code/04. Lab - Tracing Import Table Construction.mp4
19.5 MB
04. Detecting and Defeating Function Obfuscation in Native Code/02. Walking the PEB, Parsing a PE.mp4
19.1 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Obfuscation in Visual Basic for Applications (VBA).mp4
19.0 MB
03. Detecting and Defeating String Obfuscation in Native Code/04. Lab - Defeating String Obfuscation.mp4
17.8 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Demo - Defeating VBA Obfuscation.mp4
17.5 MB
03. Detecting and Defeating String Obfuscation in Native Code/03. Demo - Identifying String Obfuscation.mp4
15.5 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Demo - Defeating PowerShell Obfuscation.mp4
15.5 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Lab - Performing Comprehensive Analysis.mp4
14.5 MB
01. How Obfuscation Affects Your Analysis/02. How Obfuscation Impacts Analysis.mp4
12.3 MB
05. Identifying Malware Use of Cryptography/04. Lab - Analyzing Malware That Uses Cryptography.mp4
10.7 MB
03. Detecting and Defeating String Obfuscation in Native Code/02. String Obfuscation.mp4
8.9 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Prevalent Obfuscation Techniques.mp4
6.8 MB
05. Identifying Malware Use of Cryptography/02. Tools to Help Identify Use of Cryptography .mp4
6.0 MB
03. Detecting and Defeating String Obfuscation in Native Code/01. Differences from Interpreted Code.mp4
5.3 MB
01. How Obfuscation Affects Your Analysis/03. What You Should Know.mp4
5.3 MB
01. How Obfuscation Affects Your Analysis/01. Understanding Code Obfuscation.mp4
4.3 MB
00. Course Overview/00. Course Overview.mp4
3.6 MB
[磁力链接]
添加时间:
2022-05-07
大小:
285.9 MB
最近下载:
2025-12-25
热度:
2044
[ CourseMega.com ] Udemy - Reverse Engineering & Malware Analysis of .NET & Java.zip
[ CourseMega.com ] Udemy - Reverse Engineering & Malware Analysis of .NET & Java.zip
1.5 GB
[磁力链接]
添加时间:
2022-01-16
大小:
1.5 GB
最近下载:
2025-12-25
热度:
2005
Malware Hunting with Mark Russinovich and Sysinternals Tools
Malware Hunting with Mark Russinovich and the Sysinternals Tools.mp4
324.0 MB
Readme.txt
3.0 kB
Sysinternals Suite May 26 2015 RELEASE/Readme.txt
2.8 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/accesschk.exe
683.2 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AccessEnum.exe
175.0 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AdExplorer.chm
50.4 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADExplorer.exe
479.8 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.chm
401.6 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.exe
1.0 MB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/adrestore.exe
150.3 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autologon.exe
148.9 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autoruns.chm
50.5 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autoruns.exe
680.6 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autorunsc.exe
593.0 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Bginfo.exe
847.0 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Cacheset.exe
154.4 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Clockres.exe
151.9 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Contig.exe
208.0 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Coreinfo.exe
892.1 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ctrl2cap.amd.sys
10.1 kB
[磁力链接]
添加时间:
2017-03-15
大小:
359.7 MB
最近下载:
2025-12-25
热度:
1942
[FreeCourseLab.com] Udemy - How Hackers Create Malware and Infiltrate Victim Machines
1. Introduction/1. Introduction and Welcome.mp4
13.9 MB
1. Introduction/1. Introduction and Welcome.vtt
8.4 kB
2. Initial Building Blocks/1. Introduction to Malware and Trojans.mp4
8.1 MB
2. Initial Building Blocks/1. Introduction to Malware and Trojans.vtt
5.3 kB
2. Initial Building Blocks/2. Installing C C++ Compiler.mp4
14.9 MB
2. Initial Building Blocks/2. Installing C C++ Compiler.vtt
5.7 kB
2. Initial Building Blocks/3. Downloading Additional Applications.mp4
15.1 MB
2. Initial Building Blocks/3. Downloading Additional Applications.vtt
5.7 kB
3. Lets Create Malware!/1. Creating a Malware Program with Codeblocks.mp4
23.3 MB
3. Lets Create Malware!/1. Creating a Malware Program with Codeblocks.vtt
9.5 kB
3. Lets Create Malware!/2. Running Apache Server and Uploading Malware to Server.mp4
31.3 MB
3. Lets Create Malware!/2. Running Apache Server and Uploading Malware to Server.vtt
10.0 kB
3. Lets Create Malware!/3. Using Reverse Shell on Victim's PC.mp4
26.4 MB
3. Lets Create Malware!/3. Using Reverse Shell on Victim's PC.vtt
9.0 kB
3. Lets Create Malware!/4. Viewing Access Logs and Introduction to the Metasploit Framerwork.mp4
23.2 MB
3. Lets Create Malware!/4. Viewing Access Logs and Introduction to the Metasploit Framerwork.vtt
8.6 kB
3. Lets Create Malware!/5. What to Do When Victim is on a Different Network.mp4
8.8 MB
3. Lets Create Malware!/5. What to Do When Victim is on a Different Network.vtt
3.2 kB
3. Lets Create Malware!/6. Using Metasploit to Create an Exploit.mp4
8.7 MB
3. Lets Create Malware!/6. Using Metasploit to Create an Exploit.vtt
3.7 kB
[磁力链接]
添加时间:
2018-11-12
大小:
173.7 MB
最近下载:
2025-12-26
热度:
1941
[ FreeCourseWeb.com ] PluralSight - Malware Analysis- Identifying and Defeating Packing.zip
[ FreeCourseWeb.com ] PluralSight - Malware Analysis- Identifying and Defeating Packing.zip
362.5 MB
[磁力链接]
添加时间:
2021-04-13
大小:
362.5 MB
最近下载:
2025-12-21
热度:
1935
[ FreeCourseWeb.com ] PluralSight - Malware Analysis- Identifying and Defeating Packing.zip
[ FreeCourseWeb.com ] PluralSight - Malware Analysis- Identifying and Defeating Packing.zip
362.5 MB
[磁力链接]
添加时间:
2021-06-15
大小:
362.5 MB
最近下载:
2025-09-11
热度:
1819
License to Kill Malware Hunting with the Sysinternals Tools
License to Kill Malware Hunting with the Sysinternals Tools.mp4
877.9 MB
Readme.txt
3.3 kB
Sysinternals Suite May 26 2015 RELEASE/Readme.txt
2.8 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/accesschk.exe
683.2 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AccessEnum.exe
175.0 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/AdExplorer.chm
50.4 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADExplorer.exe
479.8 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.chm
401.6 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ADInsight.exe
1.0 MB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/adrestore.exe
150.3 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autologon.exe
148.9 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autoruns.chm
50.5 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Autoruns.exe
680.6 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/autorunsc.exe
593.0 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Bginfo.exe
847.0 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Cacheset.exe
154.4 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Clockres.exe
151.9 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Contig.exe
208.0 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/Coreinfo.exe
892.1 kB
Sysinternals Suite May 26 2015 RELEASE/Sysinternals Suite May 26 2015 RELEASE/ctrl2cap.amd.sys
10.1 kB
[磁力链接]
添加时间:
2017-03-08
大小:
913.6 MB
最近下载:
2025-12-17
热度:
1731
[ FreeCourseWeb.com ] Udemy - Malware Analysis & Incident Response for IT Technicians.zip
[ FreeCourseWeb.com ] Udemy - Malware Analysis & Incident Response for IT Technicians.zip
220.3 MB
[磁力链接]
添加时间:
2021-03-15
大小:
220.3 MB
最近下载:
2025-12-22
热度:
1729
[ FreeCourseWeb.com ] Udemy - Android Malware Analysis - From Zero to Hero.zip
[ FreeCourseWeb.com ] Udemy - Android Malware Analysis - From Zero to Hero.zip
732.0 MB
[磁力链接]
添加时间:
2022-02-13
大小:
732.0 MB
最近下载:
2025-12-26
热度:
1648
Getting Started Analyzing Malware Infections
analyzing-malware-infections-getting-started/1-analyzing-malware-infections-getting-started-m1-slides.pdf
692.4 kB
analyzing-malware-infections-getting-started/2-analyzing-malware-infections-getting-started-m2-slides.pdf
582.1 kB
analyzing-malware-infections-getting-started/3-analyzing-malware-infections-getting-started-m3-slides.pdf
411.5 kB
analyzing-malware-infections-getting-started/4-analyzing-malware-infections-getting-started-m4-slides.pdf
755.7 kB
analyzing-malware-infections-getting-started/5-analyzing-malware-infections-getting-started-m5-slides.pdf
527.6 kB
01 - Course Overview - Course Overview.mp4
7.3 MB
02 - Investigating Malware Infections - Problem Statement.mp4
4.8 MB
03 - Investigating Malware Infections - Understanding Phishing Tactics.mp4
6.5 MB
04 - Investigating Malware Infections - Indicators of Compromise.mp4
4.6 MB
05 - Investigating Malware Infections - Analyzing a Suspicious Mail.mp4
11.6 MB
06 - Investigating Malware Infections - Setting up an Analysis Environment.mp4
4.5 MB
07 - Investigating Malware Infections - Analyzing Malware Off Network.mp4
3.7 MB
08 - Investigating Malware Infections - Snapshotting.mp4
2.4 MB
09 - Investigating Malware Infections - Safe Handling Procedures.mp4
5.2 MB
10 - Investigating Malware Infections - Safe Handling in Practice.mp4
12.7 MB
11 - Investigating Malware Infections - Summary.mp4
2.3 MB
12 - Analyzing Malicious Links - Classifying Malicious Links.mp4
4.8 MB
13 - Analyzing Malicious Links - Exploit Kits.mp4
3.4 MB
14 - Analyzing Malicious Links - Malicious Resources.mp4
3.6 MB
15 - Analyzing Malicious Links - Victim's Perspective of an Infection.mp4
3.6 MB
[磁力链接]
添加时间:
2017-02-22
大小:
261.3 MB
最近下载:
2025-12-24
热度:
1627
[ DevCourseWeb.com ] Udemy - A-Z Malware Design and Analysis
~Get Your Files Here !/01 - Part 1 - Essential Theories/004 Binary Analysis Fundementals.mp4
484.4 MB
~Get Your Files Here !/01 - Part 1 - Essential Theories/002 Lecture 2_ Malware Introdcution.mp4
210.2 MB
~Get Your Files Here !/02 - Practical Part/005 Learning how to setup and use IDA-Pro.mp4
193.7 MB
~Get Your Files Here !/03 - Write your own malware_/001 Create your own real-world malware for learning and analysis - part 1.mp4
170.0 MB
~Get Your Files Here !/01 - Part 1 - Essential Theories/003 Lecture 3_ Software Exploitations in Malware Design.mp4
123.0 MB
~Get Your Files Here !/03 - Write your own malware_/004 Create your own real-world malware for learning and analysis - Last part.mp4
92.4 MB
~Get Your Files Here !/02 - Practical Part/003 How to pack and unpack executable files.mp4
88.1 MB
~Get Your Files Here !/03 - Write your own malware_/002 Create your own real-world malware for learning and analysis - part 2.mp4
86.3 MB
~Get Your Files Here !/02 - Practical Part/001 Understanding the PE analysis of an executable file { part 1 }.mp4
82.0 MB
~Get Your Files Here !/02 - Practical Part/002 Analying the PE structure of your executable file.mp4
45.0 MB
~Get Your Files Here !/03 - Write your own malware_/003 Create your own real-world malware for learning and analysis - part 3.mp4
18.7 MB
~Get Your Files Here !/02 - Practical Part/004 Identidying the packing algorithm used in a given file.mp4
14.4 MB
~Get Your Files Here !/01 - Part 1 - Essential Theories/001 Introduction.mp4
13.3 MB
~Get Your Files Here !/01 - Part 1 - Essential Theories/004 Binary Analysis Fundementals_en.srt
102.8 kB
~Get Your Files Here !/03 - Write your own malware_/001 Create your own real-world malware for learning and analysis - part 1_en.srt
46.0 kB
~Get Your Files Here !/01 - Part 1 - Essential Theories/003 Lecture 3_ Software Exploitations in Malware Design_en.srt
33.0 kB
~Get Your Files Here !/02 - Practical Part/005 Learning how to setup and use IDA-Pro_en.srt
22.0 kB
~Get Your Files Here !/02 - Practical Part/001 Understanding the PE analysis of an executable file { part 1 }_en.srt
19.4 kB
~Get Your Files Here !/02 - Practical Part/003 How to pack and unpack executable files_en.srt
12.4 kB
~Get Your Files Here !/03 - Write your own malware_/002 Create your own real-world malware for learning and analysis - part 2_en.srt
12.2 kB
[磁力链接]
添加时间:
2022-02-09
大小:
1.6 GB
最近下载:
2025-12-25
热度:
1608
[ DevCourseWeb.com ] Udemy - Learn Reverse Engineering With Android Malware Analysis
~Get Your Files Here !/5. Malware case study Exodus spyware/1. Exodus malware case study.mp4
77.2 MB
~Get Your Files Here !/3. Building applications Android malware examples/1. Building and reverse engineering simple malware.mp4
72.3 MB
~Get Your Files Here !/3. Building applications Android malware examples/2. Building a simple phishing application.mp4
55.5 MB
~Get Your Files Here !/2. The Fundementals/4. Introduction to obfuscation in Android.mp4
48.0 MB
~Get Your Files Here !/4. Miscellaneous Techniques/1. Retrieving application's from a device.mp4
44.6 MB
~Get Your Files Here !/2. The Fundementals/2. Introduction to Android Malware Analysis.mp4
43.1 MB
~Get Your Files Here !/1. Introduction/2. Tooling.mp4
41.0 MB
~Get Your Files Here !/2. The Fundementals/1. Introduction to Android Reverse Engineering.mp4
39.6 MB
~Get Your Files Here !/4. Miscellaneous Techniques/2. Using machine learning to identify malware.mp4
33.9 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
32.3 MB
~Get Your Files Here !/6. Wrap Up/1. Thanks and wrap up.mp4
22.8 MB
~Get Your Files Here !/2. The Fundementals/2.1 malware-book.pdf
20.3 MB
~Get Your Files Here !/2. The Fundementals/2.2 malware-intro.pdf
8.3 MB
~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/dex/debug/mergeExtDexDebug/classes.dex
5.3 MB
~Get Your Files Here !/2. The Fundementals/5.1 obfuscation.pdf
4.8 MB
~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/apk/debug/app-debug.apk
4.0 MB
~Get Your Files Here !/2. The Fundementals/1.2 reverse-engineering.pdf
3.5 MB
~Get Your Files Here !/2. The Fundementals/1.1 ios-and-android-re.pdf
3.5 MB
~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/incremental/mergeDebugResources/merger.xml
1.6 MB
~Get Your Files Here !/3. Building applications Android malware examples/simplemalware/app/build/intermediates/incremental/debug-mergeJavaRes/zip-cache/93DqCsxRP16jyBW1wbfr9hOZXiw=
1.4 MB
[磁力链接]
添加时间:
2024-02-05
大小:
577.5 MB
最近下载:
2025-12-21
热度:
1581
build-undetectable-malware-using-c-language-ethical-hacking
course/05 - Creating Persistance & Nesting Our Program In Windows Registry/002 Interacting With Registry In Order To Start Our Program Automaticly.mp4
370.4 MB
course/07 - Hacking Windows 10/002 Hacking Windows 10 Target With Our Program.mp4
319.3 MB
course/02 - Hiding Our Program & Defining Connection Points/003 Defining Connection Points To Our Backdoor.mp4
305.9 MB
course/03 - Building Shell Function & Executing Commands/003 Server Socket Initiation.mp4
301.5 MB
course/03 - Building Shell Function & Executing Commands/004 Making Server Compatible With Our Backdoor.mp4
258.7 MB
course/06 - Adding Keylogger To Our Malware/001 Understanding Keylogger Code.mp4
244.9 MB
course/07 - Hacking Windows 10/004 Is It a Browser Or Backdoor.mp4
236.3 MB
course/03 - Building Shell Function & Executing Commands/001 Creating Our Shell Function.mp4
231.8 MB
course/03 - Building Shell Function & Executing Commands/002 Executing Commands On Target Machine.mp4
223.5 MB
course/03 - Building Shell Function & Executing Commands/005 Testing Our Malware For Command Execution.mp4
221.2 MB
course/01 - Introduction & Welcome To Hacking With C!/004 How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).mp4
201.9 MB
course/02 - Hiding Our Program & Defining Connection Points/002 Hiding Our Program Console Window.mp4
179.1 MB
course/04 - Switching Directories Inside Of A Program/001 Changing Our Program Directory.mp4
174.5 MB
course/07 - Hacking Windows 10/003 You Have Been Hacked.mp4
174.0 MB
course/02 - Hiding Our Program & Defining Connection Points/001 Explaining Malware Structure & Including Needed Libraries.mp4
151.3 MB
course/06 - Adding Keylogger To Our Malware/002 Adding Keylogger Function To Our Backdoor.mp4
149.5 MB
course/02 - Hiding Our Program & Defining Connection Points/005 Attempting Connection Every 10 Seconds With Our Target.mp4
138.3 MB
course/01 - Introduction & Welcome To Hacking With C!/002 What Are We Going To Learn In This Course & What You Need To Know!.mp4
108.8 MB
course/01 - Introduction & Welcome To Hacking With C!/003 Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine.mp4
104.0 MB
course/07 - Hacking Windows 10/001 Updating Our Server Code.mp4
102.4 MB
[磁力链接]
添加时间:
2022-01-10
大小:
4.3 GB
最近下载:
2025-12-19
热度:
1562
共16页
上一页
1
2
3
4
5
6
7
8
下一页