[FreeCourseSite.com] Udemy - Reverse Engineering, Debugging and Malware Analysis - 2021
File List
- 6. Software Exploitation/6. Stack Guards Bypass - Part 2.mp4 633.7 MB
- 6. Software Exploitation/4. Methods Exploitation.mp4 512.7 MB
- 6. Software Exploitation/7. Evil Server.mp4 499.2 MB
- 6. Software Exploitation/5. Stack Guards Bypass.mp4 386.5 MB
- 5. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.mp4 261.2 MB
- 6. Software Exploitation/3. Stack Reliability and GCC Example.mp4 181.4 MB
- 6. Software Exploitation/2. Low-Level View and Managing Stacks.mp4 176.2 MB
- 6. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.mp4 158.7 MB
- 4. Malware and Memory Analysis/1. Volatility Cridex.mp4 153.5 MB
- 4. Malware and Memory Analysis/3. Cridex Malware Analysis.mp4 153.5 MB
- 1. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.mp4 117.2 MB
- 4. Malware and Memory Analysis/2. Volatility R2D2.mp4 90.6 MB
- 1. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.mp4 70.0 MB
- 3. Malware Behavior/2. Malware Identification.mp4 60.2 MB
- 3. Malware Behavior/3. Presistence.mp4 45.7 MB
- 1. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.mp4 39.8 MB
- 3. Malware Behavior/1. Analysis Tools.mp4 34.7 MB
- 2. Operating System Components/4. Volatile Memory.mp4 34.3 MB
- 2. Operating System Components/2. Non-Volatile Memory.mp4 32.0 MB
- 2. Operating System Components/3. The Windows Registry.mp4 27.5 MB
- 2. Operating System Components/1. Filesystem.mp4 22.9 MB
- 6. Software Exploitation/7. Evil Server.srt 73.2 KB
- 6. Software Exploitation/4. Methods Exploitation.srt 59.3 KB
- 6. Software Exploitation/6. Stack Guards Bypass - Part 2.srt 47.5 KB
- 6. Software Exploitation/2. Low-Level View and Managing Stacks.srt 40.9 KB
- 6. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.srt 38.4 KB
- 6. Software Exploitation/5. Stack Guards Bypass.srt 34.6 KB
- 6. Software Exploitation/3. Stack Reliability and GCC Example.srt 30.1 KB
- 5. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.srt 25.8 KB
- 1. Reverse Engineering Fundamentals/2.1 patrick.gif 16.2 KB
- 1. Reverse Engineering Fundamentals/3.1 patrick.gif 16.2 KB
- 2. Operating System Components/1.1 malware.png 15.3 KB
- 4. Malware and Memory Analysis/1. Volatility Cridex.srt 9.9 KB
- 4. Malware and Memory Analysis/3. Cridex Malware Analysis.srt 9.9 KB
- 1. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.srt 8.3 KB
- 4. Malware and Memory Analysis/2. Volatility R2D2.srt 6.3 KB
- 1. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.srt 5.4 KB
- 3. Malware Behavior/1. Analysis Tools.srt 4.9 KB
- 3. Malware Behavior/2. Malware Identification.srt 4.3 KB
- 3. Malware Behavior/4. Malware Presistence.html 3.5 KB
- 1. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.srt 3.2 KB
- 2. Operating System Components/2. Non-Volatile Memory.srt 3.2 KB
- 3. Malware Behavior/3. Presistence.srt 2.9 KB
- 2. Operating System Components/1. Filesystem.srt 2.8 KB
- 2. Operating System Components/3. The Windows Registry.srt 2.4 KB
- 2. Operating System Components/4. Volatile Memory.srt 2.3 KB
- 2. Operating System Components/5. Operating System Components.html 166 bytes
- 6. Software Exploitation/8. Test 1.html 166 bytes
- 0. Websites you may like/[FCS Forum].url 133 bytes
- 0. Websites you may like/[FreeCourseSite.com].url 127 bytes
- 0. Websites you may like/[CourseClub.ME].url 122 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.