M. Heiderich, E.A.V. Nava, G. Heyes, D. Lindsay - Web Application Obfuscation - 2010.pdf
5 months, 1 week
Files: 1 Total size: 1.5 MB Total requests: 32 Last access time: 2 days, 14 hours
|
[ FreeCourseWeb.com ] PluralSight - Malware Analysis- Identifying and Defeating Code Obfuscation.zip
8 months
Files: 1 Total size: 254.7 MB Total requests: 17 Last access time: 1 month, 1 week
|
[UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
8 months, 2 weeks
Files: 5 Total size: 272.7 MB Total requests: 40 Last access time: 1 day, 22 hours
|
Malware Analysis- Identifying and Defeating Code Obfuscation
8 months, 2 weeks
Files: 5 Total size: 357.7 MB Total requests: 314 Last access time: 14 hours, 30 minutes
|
Practical reverse engineering x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation (Bruce Dang, Alexandre Gazet, Elias Bachaalany etc.)
1 year, 5 months
Files: 2 Total size: 3.2 MB Total requests: 34 Last access time: 1 week, 3 days
|
The Short Film Obfuscation (HD).avi
1 year, 6 months
Files: 1 Total size: 141.0 MB Total requests: 124 Last access time: 16 hours, 48 minutes
|
Practical Reverse Engineering - x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation [EPUB]
1 year, 6 months
Files: 1 Total size: 3.2 MB Total requests: 90 Last access time: 1 week, 1 day
|
Obfuscation- A User's Guide for Privacy and Protest [2015]
1 year, 7 months
Files: 3 Total size: 59.2 MB Total requests: 165 Last access time: 5 days, 10 hours
|