[TutsNode.net] - Reverse Engineering 4 - Software Protection/18. Technique #3 Hiding debugger, then do Serial Phising/1. Technique #3 Hiding debugger, then do Serial Phising.mp4 216.9 MB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/16. Technique #1 Hiding debugger and using loader for process patching/1. Technique #1 Hiding debugger and using loader for process patching.mp4 149.8 MB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/13. Using ScyllaHide to hide the debugger/1. Using ScyllaHide to hide the debugger.mp4 73.3 MB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/2. Introduction to Software Protection/1. Introduction to Software Protection.mp4 47.2 MB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/6. Patching the dumped file/1. Patching the dumped file.mp4 46.0 MB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/18. Technique #3 Hiding debugger, then do Serial Phising/1. Technique #3 Hiding debugger, then do Serial Phising.srt 17.1 kB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/16. Technique #1 Hiding debugger and using loader for process patching/1. Technique #1 Hiding debugger and using loader for process patching.srt 11.8 kB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/2. Introduction to Software Protection/1. Introduction to Software Protection.srt 9.8 kB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/8. Creating a Loader/1. Creating a Loader.srt 9.2 kB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/13. Using ScyllaHide to hide the debugger/1. Using ScyllaHide to hide the debugger.srt 5.9 kB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/4. Examining the packer protection/1. Examining the packer protection.srt 5.9 kB