TorBT - Torrents and Magnet Links Search Engine

Mastering Reverse Engineering & Malware Analysis REMASM+

File Name
Size
1. Disassembly and Disassembler/1. The Disassembly Theory.mp4
35 MB
1. Disassembly and Disassembler/2. Disassembly - What.mp4
70 MB
10. Writing our second 64Bit Assembly Program/1. Coding ASM file.mp4
66 MB
10. Writing our second 64Bit Assembly Program/2. Analyzing Output with GDB and creating makefile.mp4
131 MB
11. OR XOR AND/1. The OR.mp4
15 MB
11. OR XOR AND/2. NOT.mp4
10 MB
11. OR XOR AND/3. XOR.mp4
14 MB
11. OR XOR AND/4. AND.mp4
20 MB
12. Data Display Debugger - DDD/1. Developing another Assembly Program to Analyze with DDD.mp4
87 MB
12. Data Display Debugger - DDD/2. Analyzing Previously Written Code.mp4
61 MB
12. Data Display Debugger - DDD/3. Using DDD and Analyzing RAX Values.mp4
96 MB
13. Jump and Loop/1. Using Conditions and Jumping.mp4
116 MB
13. Jump and Loop/1.1 A1 - code.txt
1.5 kB
13. Jump and Loop/10. Jump if below.mp4
33 MB
13. Jump and Loop/10.1 A10.txt
394 B
13. Jump and Loop/11. Jump if below or equal.mp4
30 MB
13. Jump and Loop/11.1 A11.txt
427 B
13. Jump and Loop/2. Jump if equal.mp4
36 MB
13. Jump and Loop/2.1 A2.txt
391 B
13. Jump and Loop/3. Jump if Not Equal.mp4
14 MB
13. Jump and Loop/3.1 A3.txt
431 B
13. Jump and Loop/4. Jump if Greater.mp4
29 MB
13. Jump and Loop/4.1 A4.txt
479 B
13. Jump and Loop/5. Greater than or Equal to.mp4
28 MB
13. Jump and Loop/5.1 A5.txt
516 B
13. Jump and Loop/6. Jump if Less.mp4
26 MB
13. Jump and Loop/6.1 A6.txt
400 B
13. Jump and Loop/7. Jump if less or equal.mp4
35 MB
13. Jump and Loop/7.1 A7.txt
483 B
13. Jump and Loop/8. Jump if Above.mp4
41 MB
13. Jump and Loop/8.1 A8.txt
500 B
13. Jump and Loop/9. Jump if Above or Equal.mp4
32 MB
13. Jump and Loop/9.1 A9.txt
452 B
14. Assembly Project using Jump and Loop/1. Developing Loop and Calculator Project with Assembly.mp4
27 MB
14. Assembly Project using Jump and Loop/1.1 a1.txt
507 B
14. Assembly Project using Jump and Loop/2. Testing our Project.mp4
65 MB
14. Assembly Project using Jump and Loop/2.1 a2.txt
521 B
15. Memory Manipulation/1. Project EXABYTE.mp4
202 MB
15. Memory Manipulation/1.1 a1.txt
1.7 kB
15. Memory Manipulation/2. Testing and Analyzing Project with Readelf and GDB.mp4
222 MB
16. Calculator with Assembly/1. Defining variables.mp4
64 MB
16. Calculator with Assembly/2. Addition and Subtraction.mp4
58 MB
16. Calculator with Assembly/2.1 a2.txt
1.6 kB
16. Calculator with Assembly/3. Last Decorations.mp4
84 MB
16. Calculator with Assembly/3.1 a3 - fixed.txt
3.5 kB
16. Calculator with Assembly/4. Explaining Registers in Practice.mp4
82 MB
16. Calculator with Assembly/4.1 a4.txt
14 kB
16. Calculator with Assembly/5. Completing Section.mp4
76 MB
16. Calculator with Assembly/5.1 a5.txt
3.5 kB
17. Starting with Ghidra/1. Opening project in Ghidra.mp4
85 MB
17. Starting with Ghidra/2. Discovering Ghidra.mp4
61 MB
18. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4
117 MB
18. Malware Analysis and Reverse Engineering with Ghidra/1.1 A1 M4lware Sample 1.zip
229 kB
18. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4
103 MB
18. Malware Analysis and Reverse Engineering with Ghidra/3. OSINT for Reverse Engineering.mp4
53 MB
18. Malware Analysis and Reverse Engineering with Ghidra/4. Analyzing Libraries that Malware Uses.mp4
23 MB
18. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4
122 MB
18. Malware Analysis and Reverse Engineering with Ghidra/6. Finding Entry Points and Changing Undefined Function Names.mp4
46 MB
19. IDA Pro IDA Freeware/1. Downloading and Installing IDA Pro _ IDA Freeware.mp4
67 MB
19. IDA Pro IDA Freeware/2. Being friends with IDA.mp4
56 MB
19. IDA Pro IDA Freeware/3. Useful Tabs in IDA.mp4
63 MB
2. Binary Analysis/1. Analysis of Binary and 4 Stages of Compilation.mp4
34 MB
2. Binary Analysis/2. Preprocessing.mp4
60 MB
2. Binary Analysis/3. Compilation Phase.mp4
39 MB
2. Binary Analysis/4. Assembly Phase.mp4
38 MB
2. Binary Analysis/5. Linking Phase.mp4
94 MB
3. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4
147 MB
3. Linux - ELF Format/2. Learning ELF Fields.mp4
129 MB
3. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4
156 MB
4. Windows - PE Format/1. Fundamentals of Windows PE Format.mp4
197 MB
5. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4
104 MB
5. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4
157 MB
5. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4
107 MB
5. Symbols, Stripped and Not Stripped Binaries/4. How binary loads and executes in theory.mp4
64 MB
6. Reverse Engineering and Malware Analysis - Installing Ghidra/1. Downloading Ghidra and File Structure.mp4
80 MB
6. Reverse Engineering and Malware Analysis - Installing Ghidra/2. Installing JDK in Linux.mp4
48 MB
6. Reverse Engineering and Malware Analysis - Installing Ghidra/3. Installing JDK in Windows or MacOS.mp4
32 MB
6. Reverse Engineering and Malware Analysis - Installing Ghidra/4. Installing SASM.mp4
82 MB
7. Writing our first 64Bit Assembly Program/1. Hello world with makefile.mp4
88 MB
7. Writing our first 64Bit Assembly Program/2. Why nasm is best and compare assemblers.mp4
18 MB
7. Writing our first 64Bit Assembly Program/3. Sticking to traditions - Hello world program without makefile.mp4
65 MB
8. Understanding Data Types/1. Understanding CPU architectures and Binaries.mp4
11 MB
8. Understanding Data Types/2. Converting Decimal to Binary with Basic Math.mp4
24 MB
9. Debugging x86-64/1. Starting gdb and setting flavors.mp4
98 MB
9. Debugging x86-64/2. Debugging and Finding Variables in Memory addresses.mp4
143 MB
9. Debugging x86-64/3. Learning more with GDB.mp4
110 MB