Комментарии отсутствуют
Информация о видео
Другие видео канала
Threat Intelligence Frameworks - Breaking the chainsWatching The Watchers - EP3 - CRIME NEVER SLEEPSHeap Internals - Adverturing into 0xABABABAB for debuggers sakenew L!NKMalware Analysis: Stealer - RC4, C2 emulation, dump HTTP POST (Part 3)Beps Exploit Kit Analysis - Initial LookReversing Unfiltered: Emulating a 2011 Banker Trojans Hardware ID generationExtracting Config From Malware - GuideFarming Binaries - Obfuscating through inline assembly and moreAnalysing Lockbit and AlphaV DDoS Protection client side code - Hashing and spread functionsWatching The Watchers - EP1 - The Supply Chain [PoS malware]Watching The Watchers - EP2 - UNINTENDED TARGETS [PoS malware]Reverse Engineering Malware - String ObfuscationAnalysing Athena HTTP/IRC Malware SourceMalware Analysis: Stealer - Mutex Check, Stackstrings, IDA (Part 1)Reverse Engineering Smoke Loader: RC4, Anti-Analysis, Anti-VMGoing Through a Real Infection - MalvertisingMalware Analysis: Stealer - XOR, CyberChef, x64Dbg Scripting (Part 2)Gaming The Game - Reverse Engineering a Pub Quiz MachineWordpress 4.7 Crypto Vuln - CVE-2017-5493Threat actors Sideloading - PlugX General Walkthrough