种子简介
种子名称:
[UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
文件类型:
视频
文件数目:
36个文件
文件大小:
272.67 MB
收录时间:
2021-7-14 22:20
已经下载:
3次
资源热度:
238
最近下载:
2024-12-2 13:29
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:d32916d2a7e136799e911bfd33761e51aa71f53c&dn=[UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation.torrent
05. Identifying Malware Use of Cryptography/01. Purpose of Cryptography in Malware.mp419.74MB
00. Course Overview/00. Course Overview.mp43.44MB
01. How Obfuscation Affects Your Analysis/00. Module Introduction.mp41.03MB
01. How Obfuscation Affects Your Analysis/01. Understanding Code Obfuscation.mp44.11MB
01. How Obfuscation Affects Your Analysis/02. How Obfuscation Impacts Analysis.mp411.72MB
01. How Obfuscation Affects Your Analysis/03. What You Should Know.mp45.06MB
01. How Obfuscation Affects Your Analysis/04. Conclusion.mp4928.01KB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/00. Module Introduction.mp41.13MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Prevalent Obfuscation Techniques.mp46.53MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Obfuscation in Visual Basic for Applications (VBA).mp418.11MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Demo - Defeating VBA Obfuscation.mp416.67MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Obfuscation in PowerShell.mp43.43MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Demo - Defeating PowerShell Obfuscation.mp414.78MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Lab - Performing Comprehensive Analysis.mp413.86MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Conclusion.mp41.74MB
03. Detecting and Defeating String Obfuscation in Native Code/00. Module Introduction.mp4841.14KB
03. Detecting and Defeating String Obfuscation in Native Code/01. Differences from Interpreted Code.mp45.06MB
03. Detecting and Defeating String Obfuscation in Native Code/02. String Obfuscation.mp48.46MB
03. Detecting and Defeating String Obfuscation in Native Code/03. Demo - Identifying String Obfuscation.mp414.81MB
03. Detecting and Defeating String Obfuscation in Native Code/04. Lab - Defeating String Obfuscation.mp417.01MB
03. Detecting and Defeating String Obfuscation in Native Code/05. Conclusion.mp41001.91KB
04. Detecting and Defeating Function Obfuscation in Native Code/00. Module Introduction.mp41.24MB
04. Detecting and Defeating Function Obfuscation in Native Code/01. Constructing an Import Table.mp42.45MB
04. Detecting and Defeating Function Obfuscation in Native Code/02. Walking the PEB, Parsing a PE.mp418.17MB
04. Detecting and Defeating Function Obfuscation in Native Code/03. Demo - Dynamic API Resolution.mp419.72MB
04. Detecting and Defeating Function Obfuscation in Native Code/04. Lab - Tracing Import Table Construction.mp418.61MB
04. Detecting and Defeating Function Obfuscation in Native Code/05. Conclusion.mp4924.11KB
05. Identifying Malware Use of Cryptography/00. Module Introduction.mp4835.06KB
05. Identifying Malware Use of Cryptography/02. Tools to Help Identify Use of Cryptography .mp45.72MB
05. Identifying Malware Use of Cryptography/03. Demo - Finding Cryptography.mp418.96MB
05. Identifying Malware Use of Cryptography/04. Lab - Analyzing Malware That Uses Cryptography.mp410.19MB
05. Identifying Malware Use of Cryptography/05. Conclusion.mp4930.4KB
06. Leveling up Your Skills/00. Module Introduction.mp4459.59KB
06. Leveling up Your Skills/01. What You Learned.mp42.9MB
06. Leveling up Your Skills/02. Leveling up Your Skills.mp41.85MB
06. Leveling up Your Skills/03. Conclusion.mp4370.77KB