Reverse Engineering Malware with Ghidra
File List
- 03. Enhancing Your Reversing Workflow/03. Demo- Function Analysis.mp4 63.1 MB
- 02. Working with Ghidra’s Core Components/05. Demo- Analyzing a Trojan.mp4 38.7 MB
- 04. Harnessing Ghidra’s Superpowers/01. Working with the Decompiler.mp4 29.7 MB
- 04. Harnessing Ghidra’s Superpowers/05. Demo- Scripting Example.mp4 24.6 MB
- 01. Software Reverse Engineering with Ghidra/04. Demo- Getting Started with Ghidra.mp4 21.8 MB
- 04. Harnessing Ghidra’s Superpowers/03. Demo- Headless Analyzer.mp4 17.4 MB
- 03. Enhancing Your Reversing Workflow/01. Enhancing the CodeBrowser.mp4 14.3 MB
- 03. Enhancing Your Reversing Workflow/02. Function Analysis Tools and Techniques.mp4 12.0 MB
- 02. Working with Ghidra’s Core Components/03. Exploring the Main User Interface.mp4 10.6 MB
- 02. Working with Ghidra’s Core Components/04. Ghidra’s Decompiler.mp4 10.2 MB
- 01. Software Reverse Engineering with Ghidra/01. Reverse Engineering and the Ghidra Software Reverse Engineering (SRE) Tools.mp4 9.3 MB
- 01. Software Reverse Engineering with Ghidra/03. What You Should Know.mp4 6.3 MB
- 02. Working with Ghidra’s Core Components/02. Projects and Auto-analysis.mp4 6.3 MB
- 04. Harnessing Ghidra’s Superpowers/04. Ghidra Scripts.mp4 4.2 MB
- 02. Working with Ghidra’s Core Components/01. Exploring Ghidra’s Main Components and Features.mp4 4.2 MB
- 04. Harnessing Ghidra’s Superpowers/06. Conclusion and Course Wrap-up.mp4 4.0 MB
- 04. Harnessing Ghidra’s Superpowers/02. Headless Analyzer.mp4 3.9 MB
- 01. Software Reverse Engineering with Ghidra/02. Malware Packing, Obfuscation, and Other Mayhem.mp4 3.8 MB
- 00. Course Overview/00. Course Overview.mp4 3.6 MB
- 01. Software Reverse Engineering with Ghidra/00. Module Introduction.mp4 1.5 MB
- 04. Harnessing Ghidra’s Superpowers/00. Module Introduction.mp4 1.1 MB
- 02. Working with Ghidra’s Core Components/00. Module Introduction.mp4 1.0 MB
- 01. Software Reverse Engineering with Ghidra/05. Conclusion.mp4 1.0 MB
- 02. Working with Ghidra’s Core Components/06. Conclusion.mp4 819.1 KB
- 03. Enhancing Your Reversing Workflow/00. Module Introduction.mp4 721.0 KB
- 03. Enhancing Your Reversing Workflow/04. Conclusion.mp4 663.5 KB
- 03. Enhancing Your Reversing Workflow/03. Demo- Function Analysis.srt 20.6 KB
- 02. Working with Ghidra’s Core Components/05. Demo- Analyzing a Trojan.srt 16.5 KB
- 01. Software Reverse Engineering with Ghidra/04. Demo- Getting Started with Ghidra.srt 14.0 KB
- 04. Harnessing Ghidra’s Superpowers/01. Working with the Decompiler.srt 13.3 KB
- 03. Enhancing Your Reversing Workflow/01. Enhancing the CodeBrowser.srt 12.7 KB
- 04. Harnessing Ghidra’s Superpowers/05. Demo- Scripting Example.srt 10.6 KB
- 04. Harnessing Ghidra’s Superpowers/03. Demo- Headless Analyzer.srt 8.9 KB
- 03. Enhancing Your Reversing Workflow/02. Function Analysis Tools and Techniques.srt 8.9 KB
- 01. Software Reverse Engineering with Ghidra/01. Reverse Engineering and the Ghidra Software Reverse Engineering (SRE) Tools.srt 8.8 KB
- 02. Working with Ghidra’s Core Components/03. Exploring the Main User Interface.srt 8.4 KB
- 02. Working with Ghidra’s Core Components/04. Ghidra’s Decompiler.srt 7.4 KB
- 02. Working with Ghidra’s Core Components/02. Projects and Auto-analysis.srt 5.8 KB
- 01. Software Reverse Engineering with Ghidra/03. What You Should Know.srt 5.3 KB
- 02. Working with Ghidra’s Core Components/01. Exploring Ghidra’s Main Components and Features.srt 4.3 KB
- 04. Harnessing Ghidra’s Superpowers/06. Conclusion and Course Wrap-up.srt 4.3 KB
- 01. Software Reverse Engineering with Ghidra/02. Malware Packing, Obfuscation, and Other Mayhem.srt 3.3 KB
- 00. Course Overview/00. Course Overview.srt 2.8 KB
- 04. Harnessing Ghidra’s Superpowers/02. Headless Analyzer.srt 2.4 KB
- 04. Harnessing Ghidra’s Superpowers/04. Ghidra Scripts.srt 2.3 KB
- 01. Software Reverse Engineering with Ghidra/00. Module Introduction.srt 1.7 KB
- 04. Harnessing Ghidra’s Superpowers/00. Module Introduction.srt 1.3 KB
- 01. Software Reverse Engineering with Ghidra/05. Conclusion.srt 1.2 KB
- 02. Working with Ghidra’s Core Components/00. Module Introduction.srt 1.0 KB
- 02. Working with Ghidra’s Core Components/06. Conclusion.srt 991 bytes
- 03. Enhancing Your Reversing Workflow/04. Conclusion.srt 838 bytes
- 03. Enhancing Your Reversing Workflow/00. Module Introduction.srt 786 bytes
- 00. Course Overview/6 Simple Memory Techniques - All hacker use it.html 98 bytes
- 02. Working with Ghidra’s Core Components/Linux Tails Operating System.html 84 bytes
- 02. Working with Ghidra’s Core Components/USB Rubber Ducky Deluxe.html 84 bytes
- 02. Working with Ghidra’s Core Components/Yubico - YubiKey 5 NFC.html 84 bytes
- 04. Harnessing Ghidra’s Superpowers/Echo Dot (3rd Gen) - Smart speaker with Alexa - Charcoal.html 84 bytes
- 04. Harnessing Ghidra’s Superpowers/Raspberry Pi 4.html 84 bytes
- 04. Harnessing Ghidra’s Superpowers/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html 84 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.