[UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
File List
- 05. Identifying Malware Use of Cryptography/01. Purpose of Cryptography in Malware.mp4 19.7 MB
- 04. Detecting and Defeating Function Obfuscation in Native Code/03. Demo - Dynamic API Resolution.mp4 19.7 MB
- 05. Identifying Malware Use of Cryptography/03. Demo - Finding Cryptography.mp4 19.0 MB
- 04. Detecting and Defeating Function Obfuscation in Native Code/04. Lab - Tracing Import Table Construction.mp4 18.6 MB
- 04. Detecting and Defeating Function Obfuscation in Native Code/02. Walking the PEB, Parsing a PE.mp4 18.2 MB
- 02. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Obfuscation in Visual Basic for Applications (VBA).mp4 18.1 MB
- 03. Detecting and Defeating String Obfuscation in Native Code/04. Lab - Defeating String Obfuscation.mp4 17.0 MB
- 02. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Demo - Defeating VBA Obfuscation.mp4 16.7 MB
- 03. Detecting and Defeating String Obfuscation in Native Code/03. Demo - Identifying String Obfuscation.mp4 14.8 MB
- 02. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Demo - Defeating PowerShell Obfuscation.mp4 14.8 MB
- 02. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Lab - Performing Comprehensive Analysis.mp4 13.9 MB
- 01. How Obfuscation Affects Your Analysis/02. How Obfuscation Impacts Analysis.mp4 11.7 MB
- 05. Identifying Malware Use of Cryptography/04. Lab - Analyzing Malware That Uses Cryptography.mp4 10.2 MB
- 03. Detecting and Defeating String Obfuscation in Native Code/02. String Obfuscation.mp4 8.5 MB
- 02. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Prevalent Obfuscation Techniques.mp4 6.5 MB
- 05. Identifying Malware Use of Cryptography/02. Tools to Help Identify Use of Cryptography .mp4 5.7 MB
- 03. Detecting and Defeating String Obfuscation in Native Code/01. Differences from Interpreted Code.mp4 5.1 MB
- 01. How Obfuscation Affects Your Analysis/03. What You Should Know.mp4 5.1 MB
- 01. How Obfuscation Affects Your Analysis/01. Understanding Code Obfuscation.mp4 4.1 MB
- 00. Course Overview/00. Course Overview.mp4 3.4 MB
- 02. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Obfuscation in PowerShell.mp4 3.4 MB
- 06. Leveling up Your Skills/01. What You Learned.mp4 2.9 MB
- 04. Detecting and Defeating Function Obfuscation in Native Code/01. Constructing an Import Table.mp4 2.4 MB
- 06. Leveling up Your Skills/02. Leveling up Your Skills.mp4 1.9 MB
- 02. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Conclusion.mp4 1.7 MB
- 04. Detecting and Defeating Function Obfuscation in Native Code/00. Module Introduction.mp4 1.2 MB
- 02. Detecting and Defeating Code Obfuscation in Interpreted Code/00. Module Introduction.mp4 1.1 MB
- 01. How Obfuscation Affects Your Analysis/00. Module Introduction.mp4 1.0 MB
- 03. Detecting and Defeating String Obfuscation in Native Code/05. Conclusion.mp4 1001.9 KB
- 05. Identifying Malware Use of Cryptography/05. Conclusion.mp4 930.4 KB
- 01. How Obfuscation Affects Your Analysis/04. Conclusion.mp4 928.0 KB
- 04. Detecting and Defeating Function Obfuscation in Native Code/05. Conclusion.mp4 924.1 KB
- 03. Detecting and Defeating String Obfuscation in Native Code/00. Module Introduction.mp4 841.1 KB
- 05. Identifying Malware Use of Cryptography/00. Module Introduction.mp4 835.1 KB
- 06. Leveling up Your Skills/00. Module Introduction.mp4 459.6 KB
- 06. Leveling up Your Skills/03. Conclusion.mp4 370.8 KB
- udemycoursedownloader.com.url 132 bytes
- Udemy Course downloader.txt 94 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.