If you find any content such as violations and infringements (DMCA), please report it immediately according to the contact information at the bottom.
File size:357.74 MB
Time:2026-01-19
Hit count :1 Related :MalwareAnalysis-IdentifyingDefeatingCodeObfuscation
File list
05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.mp4-28.32 MB
06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.mp4-25.98 MB
05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.mp4-25.92 MB
05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.mp4-25.07 MB
06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.mp4-24.89 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).mp4-23.77 MB
04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.mp4-22.14 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.mp4-20.81 MB
04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.mp4-19.38 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.mp4-19.34 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.mp4-18.95 MB
06. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.mp4-14.82 MB
02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.mp4-14.26 MB
04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.mp4-10.78 MB
03. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.mp4-7.98 MB
06. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.mp4-6.91 MB
02. How Obfuscation Affects Your Analysis/04. What You Should Know.mp4-6.43 MB
04. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.mp4-6.04 MB
02. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.mp4-5.05 MB