TorBT - Torrents and Magnet Links Search Engine

Udemy - Reverse Engineering and Malware Analysis x64-32 ; CRMA+ 2022 [OCSALY - Online Computer Science Academy] [ไม่มี Sub.]

File Name
Size
1. Introduction/1. What is Reverse Engineering.mp4
142 MB
.pad/553738
541 kB
1. Introduction/2. What is Malware Analysis.mp4
141 MB
.pad/757078
739 kB
10. Reverse Engineering Software and Malware/1. Introduction to RE and Assembly.mp4
146 MB
.pad/515879
504 kB
10. Reverse Engineering Software and Malware/2. High Level vs Machine code Reversing and Execution principle.mp4
155 MB
.pad/924973
903 kB
2. Firewalls and Security Terminologies/1. Cyber Security - Reverse Engineering and Malware Analysis.mp4
133 MB
.pad/604337
590 kB
2. Firewalls and Security Terminologies/2. How Firewalls Works.mp4
118 MB
.pad/550569
538 kB
2. Firewalls and Security Terminologies/3. Windows Firewall Working Principle.mp4
90 MB
.pad/460795
450 kB
2. Firewalls and Security Terminologies/4. DMZ Working Principle.mp4
27 MB
.pad/679704
664 kB
2. Firewalls and Security Terminologies/5. VPN Working Principle.mp4
96 MB
.pad/875031
854 kB
3. Malware Identification/1. Malware Identification.mp4
62 MB
.pad/746158
729 kB
3. Malware Identification/2. Malware Persistence.mp4
48 MB
.pad/140025
137 kB
3. Malware Identification/3. Tools for Malware Identification.mp4
62 MB
.pad/115776
113 kB
4. Reverse Engineering and Assembly/1. CPU Instruction set & Registers.mp4
146 MB
.pad/544117
531 kB
4. Reverse Engineering and Assembly/2. Low Level Function execution and Stacks.mp4
155 MB
.pad/959264
937 kB
5. Linux for Malware Analysis and Reverse Engineering - Filesystem/1. Installing Kali Linux.mp4
138 MB
.pad/208839
204 kB
5. Linux for Malware Analysis and Reverse Engineering - Filesystem/2. Beginning Linux Training.mp4
177 MB
.pad/1037854
1014 kB
5. Linux for Malware Analysis and Reverse Engineering - Filesystem/3. Filesystem.mp4
282 MB
.pad/612624
598 kB
5. Linux for Malware Analysis and Reverse Engineering - Filesystem/4. Linux - Logging and Webserver files.mp4
238 MB
.pad/89124
87 kB
5. Linux for Malware Analysis and Reverse Engineering - Filesystem/5. Archive Files.mp4
288 MB
.pad/805106
786 kB
5. Linux for Malware Analysis and Reverse Engineering - Filesystem/6. Files and Permissions.mp4
158 MB
.pad/534212
522 kB
5. Linux for Malware Analysis and Reverse Engineering - Filesystem/7. Linux Permissions.html
9.7 kB
.pad/1038688
1014 kB
6. Linux for MA and RE - Process Management and User ENV/1. Process Management.mp4
334 MB
.pad/612920
599 kB
6. Linux for MA and RE - Process Management and User ENV/2. User Enviroment Variables.mp4
219 MB
.pad/174139
170 kB
7. Linux for MA and RE - Networking and Software Control/1. Linux Networking.mp4
334 MB
.pad/640061
625 kB
7. Linux for MA and RE - Networking and Software Control/2. Linux - Software Control.mp4
226 MB
.pad/877911
857 kB
7. Linux for MA and RE - Networking and Software Control/3. Linux Practice Test.html
191 B
.pad/1048385
1024 kB
8. Network Training for Reverse Engineering and Malware Analysis/1. Network Training for Reverse Engineering and Malware Analysis - Part 1.mp4
139 MB
.pad/794736
776 kB
8. Network Training for Reverse Engineering and Malware Analysis/2. Network Training for Reverse Engineering and Malware Analysis - Part 2.mp4
213 MB
.pad/653317
638 kB
9. RE and Malware Analysis Basic C C++ Types and Programming Principles/1. Integer Types.mp4
117 MB
.pad/240941
235 kB
9. RE and Malware Analysis Basic C C++ Types and Programming Principles/2. Floating-Point Types.mp4
64 MB
.pad/472076
461 kB
9. RE and Malware Analysis Basic C C++ Types and Programming Principles/3. Char Types.mp4
80 MB
.pad/478157
467 kB
9. RE and Malware Analysis Basic C C++ Types and Programming Principles/4. Boolean Types.mp4
53 MB
.pad/672583
657 kB
9. RE and Malware Analysis Basic C C++ Types and Programming Principles/5. Logical Operators.mp4
40 MB
.pad/574710
561 kB
9. RE and Malware Analysis Basic C C++ Types and Programming Principles/6. Sizes.mp4
53 MB
.pad/349912
342 kB
9. RE and Malware Analysis Basic C C++ Types and Programming Principles/7. Arrays - Part 1.mp4
58 MB
.pad/563569
550 kB
Reverse-Engineering-and-Malware-Analysis-x64-32-CRMA-2022.jpg
59 kB