Defeating Anti-reverse Engineering and Anti-debugging Techniques
File List
- 03. Stopping Anti-debugging Techniques/04. Demo- Tracing Process Hollowing.mp4 36.4 MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/06. Identifying Control-flow Obfuscation.mp4 34.4 MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/04. Demo- Tracing Difficult Function Calls and Returns.mp4 26.1 MB
- 04. Adding Stealth to Your Malware Sandbox/01. Using Virtualization for Your Sandboxing.mp4 17.3 MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/03. Messing with Function Calls and Returns.mp4 15.2 MB
- 03. Stopping Anti-debugging Techniques/05. Abusing Exceptions.mp4 12.6 MB
- 03. Stopping Anti-debugging Techniques/02. Detecting a Debugger.mp4 12.6 MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/05. Obfuscating Control Flow.mp4 12.5 MB
- 04. Adding Stealth to Your Malware Sandbox/02. Processes, Shares, and Other Artifacts.mp4 11.5 MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/01. Tricking the Disassembler.mp4 10.5 MB
- 04. Adding Stealth to Your Malware Sandbox/03. Other Evidence of a Virtual Environment.mp4 9.8 MB
- 03. Stopping Anti-debugging Techniques/06. Switching Architectures.mp4 8.8 MB
- 03. Stopping Anti-debugging Techniques/03. Process Hollowing and Shellcode.mp4 8.3 MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/02. Hiding Strings and API Calls.mp4 7.9 MB
- 01. How Anti-analysis Affects Your Analysis/01. Goals and Motivations.mp4 6.5 MB
- 03. Stopping Anti-debugging Techniques/01. Tricking a Debugger.mp4 6.3 MB
- 04. Adding Stealth to Your Malware Sandbox/04. Conclusion and Course Wrap-up.mp4 5.4 MB
- 01. How Anti-analysis Affects Your Analysis/03. What You Should Know.mp4 5.0 MB
- 00. Course Overview/00. Course Overview.mp4 4.4 MB
- 01. How Anti-analysis Affects Your Analysis/02. Where You Will Encounter These Tricks.mp4 3.8 MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/00. Module Introduction.mp4 1.4 MB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/07. Conclusion.mp4 1.2 MB
- 04. Adding Stealth to Your Malware Sandbox/00. Module Introduction.mp4 1.2 MB
- 03. Stopping Anti-debugging Techniques/00. Module Introduction.mp4 999.7 KB
- 01. How Anti-analysis Affects Your Analysis/00. Module Introduction.mp4 869.9 KB
- 03. Stopping Anti-debugging Techniques/07. Conclusion.mp4 740.7 KB
- 01. How Anti-analysis Affects Your Analysis/04. Conclusion.mp4 592.5 KB
- 03. Stopping Anti-debugging Techniques/04. Demo- Tracing Process Hollowing.srt 18.2 KB
- 04. Adding Stealth to Your Malware Sandbox/01. Using Virtualization for Your Sandboxing.srt 15.6 KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/06. Identifying Control-flow Obfuscation.srt 14.9 KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/03. Messing with Function Calls and Returns.srt 14.8 KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/04. Demo- Tracing Difficult Function Calls and Returns.srt 14.3 KB
- 03. Stopping Anti-debugging Techniques/02. Detecting a Debugger.srt 12.0 KB
- 04. Adding Stealth to Your Malware Sandbox/02. Processes, Shares, and Other Artifacts.srt 11.4 KB
- 04. Adding Stealth to Your Malware Sandbox/03. Other Evidence of a Virtual Environment.srt 9.6 KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/05. Obfuscating Control Flow.srt 9.3 KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/01. Tricking the Disassembler.srt 9.2 KB
- 03. Stopping Anti-debugging Techniques/05. Abusing Exceptions.srt 9.1 KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/02. Hiding Strings and API Calls.srt 7.4 KB
- 03. Stopping Anti-debugging Techniques/03. Process Hollowing and Shellcode.srt 6.9 KB
- 03. Stopping Anti-debugging Techniques/01. Tricking a Debugger.srt 6.3 KB
- 01. How Anti-analysis Affects Your Analysis/01. Goals and Motivations.srt 6.0 KB
- 04. Adding Stealth to Your Malware Sandbox/04. Conclusion and Course Wrap-up.srt 5.8 KB
- 03. Stopping Anti-debugging Techniques/06. Switching Architectures.srt 5.0 KB
- 01. How Anti-analysis Affects Your Analysis/02. Where You Will Encounter These Tricks.srt 4.4 KB
- 01. How Anti-analysis Affects Your Analysis/03. What You Should Know.srt 4.4 KB
- 00. Course Overview/00. Course Overview.srt 3.5 KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/00. Module Introduction.srt 1.7 KB
- 04. Adding Stealth to Your Malware Sandbox/00. Module Introduction.srt 1.4 KB
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/07. Conclusion.srt 1.3 KB
- 03. Stopping Anti-debugging Techniques/00. Module Introduction.srt 1.2 KB
- 01. How Anti-analysis Affects Your Analysis/00. Module Introduction.srt 1.0 KB
- 03. Stopping Anti-debugging Techniques/07. Conclusion.srt 839 bytes
- 01. How Anti-analysis Affects Your Analysis/04. Conclusion.srt 780 bytes
- 00. Course Overview/6 Simple Memory Techniques - All hacker use.html 98 bytes
- 02. Detecting and Defeating Anti-reverse Engineering Techniques/Linux Tails Operating System.html 84 bytes
- 04. Adding Stealth to Your Malware Sandbox/Defense against the Black Arts.html 84 bytes
- 04. Adding Stealth to Your Malware Sandbox/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html 84 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.