TorBT - Torrents and Magnet Links Search Engine

Defeating Anti-reverse Engineering and Anti-debugging Techniques

File Name
Size
03. Stopping Anti-debugging Techniques/04. Demo- Tracing Process Hollowing.mp4
36 MB
00. Course Overview/00. Course Overview.mp4
4.4 MB
00. Course Overview/00. Course Overview.srt
3.5 kB
01. How Anti-analysis Affects Your Analysis/00. Module Introduction.mp4
870 kB
01. How Anti-analysis Affects Your Analysis/00. Module Introduction.srt
1.0 kB
01. How Anti-analysis Affects Your Analysis/01. Goals and Motivations.mp4
6.5 MB
01. How Anti-analysis Affects Your Analysis/01. Goals and Motivations.srt
6.0 kB
01. How Anti-analysis Affects Your Analysis/02. Where You Will Encounter These Tricks.mp4
3.8 MB
01. How Anti-analysis Affects Your Analysis/02. Where You Will Encounter These Tricks.srt
4.4 kB
01. How Anti-analysis Affects Your Analysis/03. What You Should Know.mp4
5.0 MB
01. How Anti-analysis Affects Your Analysis/03. What You Should Know.srt
4.4 kB
01. How Anti-analysis Affects Your Analysis/04. Conclusion.mp4
592 kB
01. How Anti-analysis Affects Your Analysis/04. Conclusion.srt
780 B
02. Detecting and Defeating Anti-reverse Engineering Techniques/00. Module Introduction.mp4
1.4 MB
02. Detecting and Defeating Anti-reverse Engineering Techniques/00. Module Introduction.srt
1.7 kB
02. Detecting and Defeating Anti-reverse Engineering Techniques/01. Tricking the Disassembler.mp4
10 MB
02. Detecting and Defeating Anti-reverse Engineering Techniques/01. Tricking the Disassembler.srt
9.2 kB
02. Detecting and Defeating Anti-reverse Engineering Techniques/02. Hiding Strings and API Calls.mp4
7.9 MB
02. Detecting and Defeating Anti-reverse Engineering Techniques/02. Hiding Strings and API Calls.srt
7.4 kB
02. Detecting and Defeating Anti-reverse Engineering Techniques/03. Messing with Function Calls and Returns.mp4
15 MB
02. Detecting and Defeating Anti-reverse Engineering Techniques/03. Messing with Function Calls and Returns.srt
15 kB
02. Detecting and Defeating Anti-reverse Engineering Techniques/04. Demo- Tracing Difficult Function Calls and Returns.mp4
26 MB
02. Detecting and Defeating Anti-reverse Engineering Techniques/04. Demo- Tracing Difficult Function Calls and Returns.srt
14 kB
02. Detecting and Defeating Anti-reverse Engineering Techniques/05. Obfuscating Control Flow.mp4
12 MB
02. Detecting and Defeating Anti-reverse Engineering Techniques/05. Obfuscating Control Flow.srt
9.3 kB
02. Detecting and Defeating Anti-reverse Engineering Techniques/06. Identifying Control-flow Obfuscation.mp4
34 MB
02. Detecting and Defeating Anti-reverse Engineering Techniques/06. Identifying Control-flow Obfuscation.srt
15 kB
02. Detecting and Defeating Anti-reverse Engineering Techniques/07. Conclusion.mp4
1.2 MB
02. Detecting and Defeating Anti-reverse Engineering Techniques/07. Conclusion.srt
1.3 kB
02. Detecting and Defeating Anti-reverse Engineering Techniques/Linux Tails Operating System.html
84 B
03. Stopping Anti-debugging Techniques/00. Module Introduction.mp4
1000 kB
03. Stopping Anti-debugging Techniques/00. Module Introduction.srt
1.2 kB
03. Stopping Anti-debugging Techniques/01. Tricking a Debugger.mp4
6.3 MB
03. Stopping Anti-debugging Techniques/01. Tricking a Debugger.srt
6.3 kB
03. Stopping Anti-debugging Techniques/02. Detecting a Debugger.mp4
13 MB
03. Stopping Anti-debugging Techniques/02. Detecting a Debugger.srt
12 kB
03. Stopping Anti-debugging Techniques/03. Process Hollowing and Shellcode.mp4
8.3 MB
03. Stopping Anti-debugging Techniques/03. Process Hollowing and Shellcode.srt
6.9 kB
00. Course Overview/6 Simple Memory Techniques - All hacker use.html
98 B
03. Stopping Anti-debugging Techniques/04. Demo- Tracing Process Hollowing.srt
18 kB
03. Stopping Anti-debugging Techniques/05. Abusing Exceptions.mp4
13 MB
03. Stopping Anti-debugging Techniques/05. Abusing Exceptions.srt
9.1 kB
03. Stopping Anti-debugging Techniques/06. Switching Architectures.mp4
8.8 MB
03. Stopping Anti-debugging Techniques/06. Switching Architectures.srt
5.0 kB
03. Stopping Anti-debugging Techniques/07. Conclusion.mp4
741 kB
03. Stopping Anti-debugging Techniques/07. Conclusion.srt
839 B
04. Adding Stealth to Your Malware Sandbox/00. Module Introduction.mp4
1.2 MB
04. Adding Stealth to Your Malware Sandbox/00. Module Introduction.srt
1.4 kB
04. Adding Stealth to Your Malware Sandbox/01. Using Virtualization for Your Sandboxing.mp4
17 MB
04. Adding Stealth to Your Malware Sandbox/01. Using Virtualization for Your Sandboxing.srt
16 kB
04. Adding Stealth to Your Malware Sandbox/02. Processes, Shares, and Other Artifacts.mp4
12 MB
04. Adding Stealth to Your Malware Sandbox/02. Processes, Shares, and Other Artifacts.srt
11 kB
04. Adding Stealth to Your Malware Sandbox/03. Other Evidence of a Virtual Environment.mp4
9.8 MB
04. Adding Stealth to Your Malware Sandbox/03. Other Evidence of a Virtual Environment.srt
9.6 kB
04. Adding Stealth to Your Malware Sandbox/04. Conclusion and Course Wrap-up.mp4
5.4 MB
04. Adding Stealth to Your Malware Sandbox/04. Conclusion and Course Wrap-up.srt
5.8 kB
04. Adding Stealth to Your Malware Sandbox/Defense against the Black Arts.html
84 B
04. Adding Stealth to Your Malware Sandbox/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html
84 B