TorBT - Torrents and Magnet Links Search Engine
Pluralsight - Advanced Malware Analysis - Combating Exploit Kits
- Date: 2026-04-23
- Size: 662 MB
- Files: 45
File Name
Size
01.Course Overview/0101.Course Overview.mp4
3.2 MB
02.Introduction/0202.Demo Analyzing a Bromium Alert.mp4
22 MB
02.Introduction/0203.Security Tool Follow-up.mp4
6.5 MB
02.Introduction/0201.Introduction to Malware.mp4
1.7 MB
02.Introduction/0204.First Malware Analysis Lab.mp4
659 kB
03.Recognizing the Exploit Vector/0302.How to Find the Exploit in a Malware Attack.mp4
17 MB
03.Recognizing the Exploit Vector/0303.Exploit Finding Demo.mp4
14 MB
03.Recognizing the Exploit Vector/0301.Recognizing Exploit Vector Intro.mp4
5.5 MB
03.Recognizing the Exploit Vector/0304.Exploit Finding Lab 1.mp4
280 kB
04.Unraveling Exploit Obfuscation/0402.Continued Deobfuscation.mp4
15 MB
04.Unraveling Exploit Obfuscation/0403.Deobfuscation Demo.mp4
11 MB
04.Unraveling Exploit Obfuscation/0401.Intro and Why to Script.mp4
8.4 MB
04.Unraveling Exploit Obfuscation/0404.Deobfuscation Lab 1.mp4
590 kB
05.Circumventing Exploit Kit Encryption/0503.Deobfuscation 2.mp4
6.5 MB
05.Circumventing Exploit Kit Encryption/0502.Exploit Kit Details.mp4
5.0 MB
05.Circumventing Exploit Kit Encryption/0501.Module Overview and Homework Review.mp4
3.2 MB
05.Circumventing Exploit Kit Encryption/0504.Deobfuscation Lab 2.mp4
604 kB
06.Understanding Moving Target Communications/0602.DGAs and More.mp4
6.9 MB
06.Understanding Moving Target Communications/0601.Module Goals and Assignment Review.mp4
3.1 MB
06.Understanding Moving Target Communications/0603.Non-DGA EKs.mp4
3.1 MB
06.Understanding Moving Target Communications/0604.Begining EK Detection Lab.mp4
1.6 MB
07.Detecting Angler in the Wild/0704.YARA Examples and Lab.mp4
5.3 MB
07.Detecting Angler in the Wild/0703.YARA.mp4
3.9 MB
07.Detecting Angler in the Wild/0702.Malware Detection.mp4
3.1 MB
07.Detecting Angler in the Wild/0701.How to Find More Samples.mp4
2.0 MB
08.Performing Safe Dynamic Analysis/0803.Dynamic Analysis Walk-through.mp4
8.8 MB
08.Performing Safe Dynamic Analysis/0802.Another Sample.mp4
5.2 MB
08.Performing Safe Dynamic Analysis/0801.Malware Analysis Goals.mp4
4.0 MB
08.Performing Safe Dynamic Analysis/0804.Sandbox Assignment.mp4
1.2 MB
09.Analyzing Files Statically/0902.Demo How to Use the tools.mp4
15 MB
09.Analyzing Files Statically/0901.File Analysis Tools and Techniques.mp4
7.0 MB
09.Analyzing Files Statically/0903.More Tool Details.mp4
6.8 MB
09.Analyzing Files Statically/0904.Assignment Run and Report.mp4
1.4 MB
10.Reversing Malware with Debugging Tools/1002.Demo Extract Malware with IDA Debugger.mp4
27 MB
10.Reversing Malware with Debugging Tools/1004.Debug Details and Assignment.mp4
15 MB
10.Reversing Malware with Debugging Tools/1003.More on how to Choose an Approach.mp4
12 MB
10.Reversing Malware with Debugging Tools/1001.Static or Dynamic Analysis.mp4
902 kB
11.Reversing Malware with IDA pro/1102.Reversing Demo.mp4
28 MB
11.Reversing Malware with IDA pro/1104.Reversing Details and Assignment.mp4
8.5 MB
11.Reversing Malware with IDA pro/1103.Goals and Cyclic Recap.mp4
8.4 MB
11.Reversing Malware with IDA pro/1101.Demo and Lesson Plan.mp4
885 kB
12.Customizing Reports From Researchers to CISOs/1202.How to Report Treat Data.mp4
11 MB
12.Customizing Reports From Researchers to CISOs/1201.Intro and Recap.mp4
2.0 MB
12.Customizing Reports From Researchers to CISOs/1203.Summary and Assignment.mp4
486 kB
Files/malware-advanced-analysis-combating-exploit-kits.zip
348 MB