TorBT - Torrents and Magnet Links Search Engine

[FreeCourseLab.com] Udemy - Reverse Engineering, Debugging and Malware Analysis - 2021

File Name
Size
1. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.mp4
117 MB
1. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.srt
8.3 kB
1. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.mp4
70 MB
1. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.srt
5.4 kB
1. Reverse Engineering Fundamentals/2.1 patrick.gif
16 kB
1. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.mp4
40 MB
1. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.srt
3.2 kB
1. Reverse Engineering Fundamentals/3.1 patrick.gif
16 kB
2. Operating System Components/1. Filesystem.mp4
23 MB
2. Operating System Components/1. Filesystem.srt
2.8 kB
2. Operating System Components/1.1 malware.png
15 kB
2. Operating System Components/2. Non-Volatile Memory.mp4
32 MB
2. Operating System Components/2. Non-Volatile Memory.srt
3.2 kB
2. Operating System Components/3. The Windows Registry.mp4
28 MB
2. Operating System Components/3. The Windows Registry.srt
2.4 kB
2. Operating System Components/4. Volatile Memory.mp4
34 MB
2. Operating System Components/4. Volatile Memory.srt
2.3 kB
2. Operating System Components/5. Operating System Components.html
166 B
3. Malware Behavior/1. Analysis Tools.mp4
35 MB
3. Malware Behavior/1. Analysis Tools.srt
4.9 kB
3. Malware Behavior/2. Malware Identification.mp4
60 MB
3. Malware Behavior/2. Malware Identification.srt
4.3 kB
3. Malware Behavior/3. Presistence.mp4
46 MB
3. Malware Behavior/3. Presistence.srt
2.9 kB
3. Malware Behavior/4. Malware Presistence.html
3.5 kB
4. Malware and Memory Analysis/1. Volatility Cridex.mp4
154 MB
4. Malware and Memory Analysis/1. Volatility Cridex.srt
9.9 kB
4. Malware and Memory Analysis/2. Volatility R2D2.mp4
91 MB
4. Malware and Memory Analysis/2. Volatility R2D2.srt
6.3 kB
4. Malware and Memory Analysis/3. Cridex Malware Analysis.mp4
154 MB
4. Malware and Memory Analysis/3. Cridex Malware Analysis.srt
9.9 kB
5. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.mp4
261 MB
5. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.srt
26 kB
6. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.mp4
159 MB
6. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.srt
38 kB
6. Software Exploitation/2. Low-Level View and Managing Stacks.mp4
176 MB
6. Software Exploitation/2. Low-Level View and Managing Stacks.srt
41 kB
6. Software Exploitation/3. Stack Reliability and GCC Example.mp4
181 MB
6. Software Exploitation/3. Stack Reliability and GCC Example.srt
30 kB
6. Software Exploitation/4. Methods Exploitation.mp4
513 MB
6. Software Exploitation/4. Methods Exploitation.srt
59 kB
6. Software Exploitation/5. Stack Guards Bypass.mp4
386 MB
6. Software Exploitation/5. Stack Guards Bypass.srt
35 kB
6. Software Exploitation/6. Stack Guards Bypass - Part 2.mp4
634 MB
6. Software Exploitation/6. Stack Guards Bypass - Part 2.srt
48 kB
6. Software Exploitation/7. Evil Server.mp4
499 MB
6. Software Exploitation/7. Evil Server.srt
73 kB
6. Software Exploitation/8. Test 1.html
166 B
[FreeCourseLab.com].url
126 B