- 【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics v3 - AI and ChatGPT Mastery in Malware Analysis
-
收录时间:2024-02-28
文档个数:28
文档大小:2.7 GB
最近下载:2025-02-16
人气:1824
磁力链接
~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/6. Lab Unraveling Malware Mysteries in Memory with Volatility.mp4 403.3 MB
~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/3. Lab Advanced Malware Analysis - Dynamic Techniques with Process Hacker.mp4 255.6 MB
~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/3. Lab Implementing Clustering Technique&Feature Engg in Malware Variant Analysis.mp4 210.8 MB
~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/9. Lab Deep Neural Networks for Effective and Efficient Malware Detection&Analysis.mp4 199.6 MB
~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/2. Lab Implementing Malware Behavior Profiling with RF.mp4 128.8 MB
~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/4. LabAdvanced Ransomware Behavior Prediction & Classification with Deep Learning.mp4 128.4 MB
~Get Your Files Here !/1. Advanced Multi-Stage Malware Analysis AI Synergy and Correlation Insights/3. Lab Visualizing Feature Correlations in Malware Analysis Using Heatmaps.mp4 124.4 MB
~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/2. Lab Ransomware Analysis and Dissection.mp4 116.2 MB
~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/2. Determining Optimal Clustering Size for Effective Malware Variant Detection.mp4 109.4 MB
~Get Your Files Here !/2. Forecasting Malware Threats Predictive Analytics and Time Series Modeling/3. Lab Implementing Advanced Analytics TSA for Predicting Future Malware Threats.mp4 96.9 MB
~Get Your Files Here !/2. Forecasting Malware Threats Predictive Analytics and Time Series Modeling/2. Beyond Real-Time Predicting Malware Threats Before They Happen.mp4 80.2 MB
~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/5. Key Features for Effective Memory Analysis.mp4 77.8 MB
~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/1. Decoding the Ransomware Lifecycle From Initial Infiltration to Encryption.mp4 75.2 MB
~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/3. Demystifying AI in Malware Analysis Explainable AI.mp4 75.0 MB
~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/1. Introduction to Dynamic malware analysis.mp4 66.2 MB
~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/4. Lab SHAP-based Explainability in Malware Detection with RF.mp4 65.4 MB
~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/1. Identification and Analysis of Malware Variants through Unsupervised Clustering.mp4 61.8 MB
~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/4. Dynamic Malware Analysis Challenges, Solutions, and the Road Ahead.mp4 61.7 MB
~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/2. Key Features for Dynamic Memory Analysis.mp4 60.5 MB
~Get Your Files Here !/1. Advanced Multi-Stage Malware Analysis AI Synergy and Correlation Insights/2. Unveiling the Mechanics of Correlation Analysis in Multi-Stage Malware Detection.mp4 46.5 MB
猜你喜欢:
Malware
AI
v3
Udemy
DevCourseWeb
Mastery
Forensics
Analysis
ChatGPT
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics V4 - Ai and Chatgpt Mastery In Malware Analysis
-
收录时间:2024-03-22
文档个数:29
文档大小:1.6 GB
最近下载:2025-02-16
人气:4462
磁力链接
~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/7 - LabDeveloping Automated Deep Learning Strategies for Fileless Malware Detection.mp4 224.1 MB
~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/21 - Lab Metamorphic Malware Detection using Graph Neural Networks.mp4 174.7 MB
~Get Your Files Here !/6 - Innovative Effective Malware Analysis with ChatGPT Strategies Techniques/27 - Lab Deploying ChatGPT for InDepth Malware Code Behavior Analysis.mp4 168.2 MB
~Get Your Files Here !/2 - Advanced Detection of Stealthy MalwareLeveraging Memory Forensics DeepLearning/10 - Lab Implementing Deep Learning for Enhanced Detection of Stealthy Malware.mp4 155.1 MB
~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/2 - Unraveling the Features of Fileless Malware for Effective Detection.mp4 80.8 MB
~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/3 - Advanced Techniques in Fileless Malware Detection.mp4 72.1 MB
~Get Your Files Here !/5 - AIDriven Analysis of Malware Executables/22 - Behavioral and Executable Malware A Unified AI Detection Strategy.mp4 71.1 MB
~Get Your Files Here !/3 - Modernizing Future of Malware Defense Automated Platforms and Sandbox Solutions/11 - Enhancing Malware Analysis through Advanced Automation Platforms.mp4 56.0 MB
~Get Your Files Here !/2 - Advanced Detection of Stealthy MalwareLeveraging Memory Forensics DeepLearning/8 - Deep Learnings Edge and Memory forensics in Unmasking Obfuscated Malware.mp4 50.7 MB
~Get Your Files Here !/5 - AIDriven Analysis of Malware Executables/23 - Lab Detecting Malware in Executable Files.mp4 49.5 MB
~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/14 - Understanding Metamorphic Malware Evolution Behavior and Defense.mp4 49.1 MB
~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/1 - Decoding Fileless Malware A Deep Dive into AIDriven Detection Mechanisms.mp4 45.8 MB
~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/18 - Exploring Control Flow Graphs and Graph Neural Networks.mp4 45.6 MB
~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/16 - Advanced Techniques for Metamorphic Malware Detection.mp4 41.1 MB
~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/19 - Deep Dive into Malware Analysis using Control Flow Graphs Graph Neural Network.mp4 39.6 MB
~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/15 - Dissecting Metamorphic Malware Understanding What Changes What Stays the Same.mp4 36.7 MB
~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/5 - Algorithmic Approaches in AIDriven Fileless Malware Analysis.mp4 35.0 MB
~Get Your Files Here !/3 - Modernizing Future of Malware Defense Automated Platforms and Sandbox Solutions/13 - Merging Defenses How Fileless Malware Detection Integrates with System Architec.mp4 30.3 MB
~Get Your Files Here !/3 - Modernizing Future of Malware Defense Automated Platforms and Sandbox Solutions/12 - Harnessing Malware Sandbox Platforms for Enhanced Enterprise Security Infrastruc.mp4 27.6 MB
~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/6 - Building Malware Detection ModelUtilizing Memory Forensics for Dataset Creation.mp4 27.3 MB
猜你喜欢:
Malware
Ai
Analysis
Udemy
DevCourseWeb
Mastery
Forensics
V4
Chatgpt
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics V5 - Ai and Chatgpt Mastery In Malware Analysis
-
收录时间:2024-04-25
文档个数:25
文档大小:1.8 GB
最近下载:2025-02-07
人气:1344
磁力链接
~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/20 - Lab AI Trojan Attack Detection using Meta Neural Analysis.mp4 442.4 MB
~Get Your Files Here !/4 - Encrypted Traffic Analysis Malware Detection Without Decryption/14 - Lab Malware Detection within Encrypted Traffic.mp4 331.1 MB
~Get Your Files Here !/6 - AI in Malware Forensics Evaluation Trends and Future Directions/23 - Navigating the Horizon The Role of AI in Shaping the Future of Malware Analysis.mp4 143.3 MB
~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/4 - Lab Implementing Autoencoders in Polymorphic Malware Analysis.mp4 137.8 MB
~Get Your Files Here !/3 - Attribution Mastery Identifying the Origins of Malware Threats/11 - Lab Automating IoC Extraction with ChatGPT for Cybersecurity Analysis.mp4 65.6 MB
~Get Your Files Here !/3 - Attribution Mastery Identifying the Origins of Malware Threats/10 - Lab Applying SVM for Attribution Modeling in Malware Analysis.mp4 64.4 MB
~Get Your Files Here !/4 - Encrypted Traffic Analysis Malware Detection Without Decryption/13 - Advanced Techniques for Identifying Malwares in Encrypted Traffic.mp4 59.1 MB
~Get Your Files Here !/2 - AIDriven Analysis of Malware Behavior/8 - Lab ChatGPT Condenses Quick Insights from Complex Security Reports.mp4 56.4 MB
~Get Your Files Here !/2 - AIDriven Analysis of Malware Behavior/7 - Lab AIbased Behavioral Malware Analysis.mp4 52.7 MB
~Get Your Files Here !/2 - AIDriven Analysis of Malware Behavior/6 - Decoding File Behaviors Spotting Malicious and Benign Patterns.mp4 49.8 MB
~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/15 - Unmasking AI Trojans A Glimpse into Hidden Threats.mp4 43.1 MB
~Get Your Files Here !/4 - Encrypted Traffic Analysis Malware Detection Without Decryption/12 - Malware Detection in Encrypted Traffic Without Decryption.mp4 40.8 MB
~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/19 - Meta Neural Trojan Detection Workflow.mp4 39.3 MB
~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/5 - Real Time Case Study Tackling Polymorphic Malware Threats.mp4 38.6 MB
~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/17 - Unraveling the Mystique Inner Workings of Meta Neural Analysis.mp4 38.2 MB
~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/16 - Defense Against Neural Trojan Attacks.mp4 37.8 MB
~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/2 - Understanding Autoencoders A Deep Dive.mp4 34.5 MB
~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/18 - Meta Neural Analysis for AI Trojan Detection.mp4 31.3 MB
~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/1 - The Complex World of Polymorphic Malware Lifecycle and Detection Strategies.mp4 30.2 MB
~Get Your Files Here !/3 - Attribution Mastery Identifying the Origins of Malware Threats/9 - Uncovering the Puppet Masters Advanced Attribution in Malware Analysis.mp4 29.5 MB
猜你喜欢:
Malware
Ai
Analysis
Udemy
DevCourseWeb
Mastery
Forensics
V5
Chatgpt
com
- 【影视】 [FreeCourseSite.com] Udemy - How Hackers Create Undetectable Malware and Viruses
-
收录时间:2020-01-24
文档个数:35
文档大小:291.2 MB
最近下载:2025-02-20
人气:3656
磁力链接
2. Understanding Malware and Creating the Hacking Environment/3. Setting Up The Veil Framework.mp4 48.6 MB
2. Understanding Malware and Creating the Hacking Environment/4. Installing Gnome Desktop.mp4 45.1 MB
1. We Begin Here/2. Introduction to Undetectable Malware.mp4 36.7 MB
4. How Hackers Create Undetectable Malware/2. Testing Exploit on Windows 10 Machine.mp4 32.2 MB
3. Veil and Metasploit/2. Installing Metasploit.mp4 30.1 MB
4. How Hackers Create Undetectable Malware/1. Creating an Exploit.mp4 26.5 MB
3. Veil and Metasploit/5. Veil Evasion Final Installation.mp4 16.4 MB
2. Understanding Malware and Creating the Hacking Environment/1. Installing Python and Pip.mp4 14.2 MB
2. Understanding Malware and Creating the Hacking Environment/2. Installing Veil-Framework.mp4 11.6 MB
3. Veil and Metasploit/7. Introduction to Veil and The Importance in Ethical Hacking.mp4 10.7 MB
3. Veil and Metasploit/1. Wine Mono and Veil-Evasion Installation.mp4 6.6 MB
4. How Hackers Create Undetectable Malware/3. Encrypting Payload.mp4 4.7 MB
1. We Begin Here/1. Welcome and Introduction.mp4 3.3 MB
3. Veil and Metasploit/4. Testing MSF Console.mp4 1.8 MB
3. Veil and Metasploit/6. Adding the Metasploit Folder to Veil Installation.mp4 1.5 MB
3. Veil and Metasploit/3. Metasploit Installation Complete.mp4 1.1 MB
4. How Hackers Create Undetectable Malware/2. Testing Exploit on Windows 10 Machine.vtt 13.6 kB
4. How Hackers Create Undetectable Malware/1. Creating an Exploit.vtt 12.4 kB
3. Veil and Metasploit/2. Installing Metasploit.vtt 10.4 kB
1. We Begin Here/2. Introduction to Undetectable Malware.vtt 10.3 kB
猜你喜欢:
Malware
FreeCourseSite
Hackers
Undetectable
Create
Udemy
How
Viruses
com
- 【影视】 [UdemyCourseDownloader] How to Create and Embed Malware
-
收录时间:2020-01-27
文档个数:59
文档大小:1.2 GB
最近下载:2025-02-20
人气:1151
磁力链接
3. Payload Binding Methods/2. Embedding Malware in Normal PDF.mp4 84.7 MB
8. Create and Embed Malware Through Android/7. Embedding Malware in PDF.mp4 78.3 MB
8. Create and Embed Malware Through Android/8. Embedding Malware in Image.mp4 77.7 MB
3. Payload Binding Methods/1. Embedding Malware in Original Apk.mp4 72.3 MB
5. Create an Undetectable Payload/1. Create Undetectable Python Payloads that Bypass Antiviruses.mp4 69.2 MB
2. Create Payloads to Hack Different Operating systems/4. Create a Payload and Hack any Android Device.mp4 59.4 MB
1. Introduction/1. Introduction.mp4 50.5 MB
4. Create a Malware to Hack Over Wan/2. Hack Any Windows Machine Which is Outside The Network using Netcat tool.mp4 46.9 MB
4. Create a Malware to Hack Over Wan/3. Hack Any Android Device From Anywhere Over Internet.mp4 44.4 MB
7. Hack or Recover saved Passwords from Windows Machine/2. Get Every Single Saved Password from Remote Machine.mp4 44.2 MB
2. Create Payloads to Hack Different Operating systems/6. Create Payload and Hack Linux Systems.mp4 44.0 MB
2. Create Payloads to Hack Different Operating systems/2. Creating a Simple Payload with Metasploit.mp4 40.2 MB
7. Hack or Recover saved Passwords from Windows Machine/3. Steal Passwords Using the USB Drive.mp4 38.0 MB
6. How to be Safe From Above Attacks/2. Detect Meterpreter in Your PC using Antipwny.mp4 37.7 MB
8. Create and Embed Malware Through Android/4. Hacking Windows Machine Using Metasploit Framework.mp4 37.4 MB
2. Create Payloads to Hack Different Operating systems/1. Introduction to Metasploit.mp4 36.6 MB
2. Create Payloads to Hack Different Operating systems/5. Create Payload and Hack any Windows Machines.mp4 36.4 MB
8. Create and Embed Malware Through Android/5. Hacking Linux Machine using Metasploit.mp4 35.5 MB
8. Create and Embed Malware Through Android/3. Introduction and Installing Metasploit Framework.mp4 33.6 MB
8. Create and Embed Malware Through Android/6. Hack Andriod Devices using Metasploit.mp4 33.4 MB
猜你喜欢:
UdemyCourseDownloader
Create
Embed
Malware
How
- 【影视】 Malware Analysis Fundamentals
-
收录时间:2020-01-30
文档个数:58
文档大小:584.6 MB
最近下载:2025-02-20
人气:3264
磁力链接
09. Dynamic Analysis Monitoring Malware Behavior/47. Monitoring Malware Behavior Demo.mp4 111.9 MB
08. Dynamic Analysis Detecting Malware System Changes/43. Detecting Changes Demo.mp4 71.2 MB
10. Lab 2 Dynamic Analysis/51. Dynamic Analysis Lab.mp4 56.2 MB
05. Static Analysis Understanding the PE Header/29. Demo PE Header Analysis.mp4 41.3 MB
04. Static Analysis Analyzing Embedded Strings/19. Demo Embedded Strings Analysis.mp4 27.1 MB
06 Lab 1 Static Analysis/34. PE Header and Hashing Lab Results.mp4 20.7 MB
06 Lab 1 Static Analysis/33. Embedded Strings Analysis Lab Results.mp4 18.5 MB
04. Static Analysis Analyzing Embedded Strings/21. Demo Finding Hidden Strings.mp4 18.3 MB
09. Dynamic Analysis Monitoring Malware Behavior/46. Process Monitor.mp4 15.1 MB
02. Introduction and Setting up Your Malware Analysis Lab/06. Demo Configuring a Virtual Machine for Malware Analysis.mp4 11.8 MB
07. Dynamic Analysis Considerations/39. Malware Persistence and Autoruns.mp4 11.8 MB
03. Static Analysis Identifying Malware/14. Demo File Identification and Hashing.mp4 11.2 MB
03. Static Analysis Identifying Malware/11. File Identification.mp4 9.8 MB
04. Static Analysis Analyzing Embedded Strings/20. Hiding Strings.mp4 9.7 MB
05. Static Analysis Understanding the PE Header/26. Import Address Table.mp4 8.6 MB
05. Static Analysis Understanding the PE Header/27. Resources.mp4 7.4 MB
malware-analysis-fundamentals.zip 7.1 MB
06 Lab 1 Static Analysis/32. File Identification Lab Results.mp4 6.7 MB
03. Static Analysis Identifying Malware/12. File Identification Tools.mp4 6.4 MB
05. Static Analysis Understanding the PE Header/24. Windows PE Header.mp4 6.3 MB
猜你喜欢:
Fundamentals
Malware
Analysis
- 【影视】 [FreeCoursesOnline.Me] [Packt] Advanced Malware Analysis - [FCO]
-
收录时间:2020-01-31
文档个数:40
文档大小:691.2 MB
最近下载:2025-02-19
人气:2930
磁力链接
3.Advanced Dynamic Malware Analysis/14.Malware Analysis Using OllyDbg.mp4 64.6 MB
5.How to Detect and Defend against Malware in a Network/29.How to Setup Snort.mp4 49.8 MB
6.How to Deal with Evasive Malware/33.Examples of Unpacking a Malware Program.mp4 49.1 MB
3.Advanced Dynamic Malware Analysis/15.Features of OllyDbg.mp4 44.1 MB
4.Advanced Static Malware Analysis/21.Loading and Navigating Using IDA Pro.mp4 39.1 MB
4.Advanced Static Malware Analysis/24.Analysing Malware Using IDA Pro.mp4 35.7 MB
3.Advanced Dynamic Malware Analysis/17.Malware Analysis Using WINDBG.mp4 34.0 MB
4.Advanced Static Malware Analysis/22.Functions in IDA.mp4 31.6 MB
4.Advanced Static Malware Analysis/23.IDA Pro Graphic Features.mp4 31.2 MB
3.Advanced Dynamic Malware Analysis/18.Features of WINDBG.mp4 23.9 MB
6.How to Deal with Evasive Malware/31.How to Detect Packed Malware.mp4 21.7 MB
1.Exploring Malware Functionalities/02.Backdoors.mp4 21.0 MB
1.Exploring Malware Functionalities/06.Rootkits.mp4 19.0 MB
2.Malware Advanced Techniques/09.Data Encoding.mp4 17.7 MB
1.Exploring Malware Functionalities/05.Ransomware.mp4 16.9 MB
4.Advanced Static Malware Analysis/19.Advanced Notes on the x86 Architecture.mp4 16.9 MB
1.Exploring Malware Functionalities/01.The Course Overview.mp4 16.8 MB
3.Advanced Dynamic Malware Analysis/12.An Overview of the Windows Environment.mp4 15.4 MB
2.Malware Advanced Techniques/07.Privilege Escalation.mp4 14.3 MB
2.Malware Advanced Techniques/10.Covert Launching Techniques.mp4 14.2 MB
猜你喜欢:
FreeCoursesOnline
Me
Malware
Analysis
Packt
Advanced
FCO
- 【影视】 Malware Alex More
-
收录时间:2020-02-01
文档个数:1
文档大小:3.0 GB
最近下载:2025-02-20
人气:7373
磁力链接
IR - Jul 06, 2018 - Alex More high.mp4 3.0 GB
猜你喜欢:
Malware
Alex
More
- 【影视】 [FreeCoursesOnline.Me] [LYNDA] Ethical Hacking The Complete Malware Analysis Process [FCO]
-
收录时间:2020-02-02
文档个数:58
文档大小:212.0 MB
最近下载:2025-02-14
人气:7861
磁力链接
04-Advanced_Techniques/003-Polymorphic_malware.mp4 19.3 MB
06-Conclusion/001-Whats_next_.mp4 14.1 MB
04-Advanced_Techniques/001-Hiding_malware.mp4 13.5 MB
03-Malware_Detection/001-Indicators_of_compromise.mp4 12.6 MB
05-Reverse_Engineering_Malware/004-Analyzing_BlackEnergy_and_GreyEnergy.mp4 12.0 MB
01-Introduction/001-What_malware_is_and_how_it_behaves.mp4 10.9 MB
02-Introduction_to_Malware/005-How_malware_achieves_persistence.mp4 10.1 MB
02-Introduction_to_Malware/008-Virus_construction_kits.mp4 9.4 MB
04-Advanced_Techniques/004-Using_cryptography_in_ransomware.mp4 9.3 MB
05-Reverse_Engineering_Malware/001-Using_reverse_engineering_to_understand_code.mp4 9.2 MB
05-Reverse_Engineering_Malware/002-Considering_malware_in_families.mp4 8.5 MB
02-Introduction_to_Malware/010-The_MITRE_ATTCK_repository.mp4 8.4 MB
04-Advanced_Techniques/006-Analyzing_Win32.Sodin.mp4 6.9 MB
03-Malware_Detection/003-Sandboxing_malware.mp4 6.8 MB
02-Introduction_to_Malware/006-Digging_into_rootkits.mp4 6.7 MB
02-Introduction_to_Malware/004-How_malware_works.mp4 6.4 MB
02-Introduction_to_Malware/007-Automating_malware_with_botnets.mp4 6.0 MB
04-Advanced_Techniques/005-Understanding_advanced_persistent_threats.mp4 5.7 MB
02-Introduction_to_Malware/002-The_evolution_of_malware.mp4 5.7 MB
05-Reverse_Engineering_Malware/003-Automated_malware_analysis.mp4 5.6 MB
猜你喜欢:
FreeCoursesOnline
Me
Malware
Complete
Ethical
Process
LYNDA
Analysis
Hacking
FCO
- 【影视】 [UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
-
收录时间:2020-02-03
文档个数:38
文档大小:285.9 MB
最近下载:2025-01-16
人气:2977
磁力链接
05. Identifying Malware Use of Cryptography/01. Purpose of Cryptography in Malware.mp4 20.7 MB
04. Detecting and Defeating Function Obfuscation in Native Code/03. Demo - Dynamic API Resolution.mp4 20.7 MB
05. Identifying Malware Use of Cryptography/03. Demo - Finding Cryptography.mp4 19.9 MB
04. Detecting and Defeating Function Obfuscation in Native Code/04. Lab - Tracing Import Table Construction.mp4 19.5 MB
04. Detecting and Defeating Function Obfuscation in Native Code/02. Walking the PEB, Parsing a PE.mp4 19.1 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Obfuscation in Visual Basic for Applications (VBA).mp4 19.0 MB
03. Detecting and Defeating String Obfuscation in Native Code/04. Lab - Defeating String Obfuscation.mp4 17.8 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Demo - Defeating VBA Obfuscation.mp4 17.5 MB
03. Detecting and Defeating String Obfuscation in Native Code/03. Demo - Identifying String Obfuscation.mp4 15.5 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Demo - Defeating PowerShell Obfuscation.mp4 15.5 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Lab - Performing Comprehensive Analysis.mp4 14.5 MB
01. How Obfuscation Affects Your Analysis/02. How Obfuscation Impacts Analysis.mp4 12.3 MB
05. Identifying Malware Use of Cryptography/04. Lab - Analyzing Malware That Uses Cryptography.mp4 10.7 MB
03. Detecting and Defeating String Obfuscation in Native Code/02. String Obfuscation.mp4 8.9 MB
02. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Prevalent Obfuscation Techniques.mp4 6.8 MB
05. Identifying Malware Use of Cryptography/02. Tools to Help Identify Use of Cryptography .mp4 6.0 MB
03. Detecting and Defeating String Obfuscation in Native Code/01. Differences from Interpreted Code.mp4 5.3 MB
01. How Obfuscation Affects Your Analysis/03. What You Should Know.mp4 5.3 MB
01. How Obfuscation Affects Your Analysis/01. Understanding Code Obfuscation.mp4 4.3 MB
00. Course Overview/00. Course Overview.mp4 3.6 MB
猜你喜欢:
UdemyCourseDownloader
Malware
Code
Identifying
Obfuscation
Defeating
Analysis
- 【影视】 Lynda - Wireshark - Malware and Forensics
-
收录时间:2020-02-03
文档个数:32
文档大小:316.2 MB
最近下载:2025-02-19
人气:8718
磁力链接
3 - 2. Capture Overview/Display filters.mp4 26.7 MB
4 - 3. Unusual Traffic/Attack signatures.mp4 25.8 MB
3 - 2. Capture Overview/Save, export, and print.mp4 23.0 MB
3 - 2. Capture Overview/Statistics.mp4 19.4 MB
3 - 2. Capture Overview/Coloring rules.mp4 17.0 MB
5 - 4. Case Studies/Unwanted TOR activity.mp4 16.2 MB
3 - 2. Capture Overview/Using a ring buffer.mp4 13.6 MB
2 - 1. Deep Packet Analysis/Wireshark overview.mp4 12.8 MB
5 - 4. Case Studies/Fast flux DNS.mp4 12.8 MB
2 - 1. Deep Packet Analysis/Tshark.mp4 11.7 MB
5 - 4. Case Studies/Trojan in the house.mp4 10.7 MB
4 - 3. Unusual Traffic/OSI layer attacks.mp4 10.6 MB
3 - 2. Capture Overview/Capture filters.mp4 10.3 MB
2 - 1. Deep Packet Analysis/Create firewall rules.mp4 9.4 MB
2 - 1. Deep Packet Analysis/Cyberattacks and trends.mp4 8.8 MB
4 - 3. Unusual Traffic/Using VirusTotal.mp4 8.5 MB
2 - 1. Deep Packet Analysis/Tap into your network.mp4 8.1 MB
2 - 1. Deep Packet Analysis/Packet analysis overview.mp4 8.0 MB
3 - 2. Capture Overview/Solution - HTTP packets.mp4 8.0 MB
4 - 3. Unusual Traffic/Solution - Analyze.mp4 7.8 MB
猜你喜欢:
Lynda
Malware
Forensics
Wireshark
- 【影视】 [FreeTutorials.Us] undetectable-malware
-
收录时间:2020-02-03
文档个数:20
文档大小:291.0 MB
最近下载:2024-11-29
人气:2436
磁力链接
02-understanding-malware-and-creating-the-hacking-environment/005-setting-up-the-veil-framework.mp4 48.6 MB
02-understanding-malware-and-creating-the-hacking-environment/006-installing-gnome-desktop.mp4 45.1 MB
01-we-begin-here/002-introduction-to-undetectable-malware.mp4 36.7 MB
04-how-hackers-create-undetectable-malware/015-testing-exploit-on-windows-10-machine.mp4 32.2 MB
03-veil-and-metasploit/008-installing-metasploit.mp4 30.1 MB
04-how-hackers-create-undetectable-malware/014-creating-an-exploit.mp4 26.5 MB
03-veil-and-metasploit/011-veil-evasion-final-installation.mp4 16.4 MB
02-understanding-malware-and-creating-the-hacking-environment/003-installing-python-and-pip.mp4 14.2 MB
02-understanding-malware-and-creating-the-hacking-environment/004-installing-veilframework.mp4 11.6 MB
03-veil-and-metasploit/013-introduction-to-veil-and-the-importance-in-ethical-hacking.mp4 10.7 MB
03-veil-and-metasploit/007-wine-mono-and-veilevasion-installation.mp4 6.6 MB
04-how-hackers-create-undetectable-malware/016-encrypting-payload.mp4 4.7 MB
01-we-begin-here/001-welcome-and-introduction.mp4 3.3 MB
03-veil-and-metasploit/010-testing-msf-console.mp4 1.8 MB
03-veil-and-metasploit/012-adding-the-metasploit-folder-to-veil-installation.mp4 1.5 MB
03-veil-and-metasploit/009-metasploit-installation-complete.mp4 1.1 MB
FreeCoursesOnline.Us.url 225 Bytes
[FreeCoursesOnline.Us].txt 138 Bytes
Freetutorials.Us.url 119 Bytes
[FreeTutorials.Us].txt 75 Bytes
猜你喜欢:
undetectable
malware
Us
FreeTutorials
- 【影视】 Cisco Press - Cisco Firepower and Advanced Malware Protection LiveLessons
-
收录时间:2020-02-04
文档个数:59
文档大小:2.1 GB
最近下载:2025-02-17
人气:4469
磁力链接
1.4 Understanding Advanced Malware Protection (AMP) for Endpoints and Networks.mp4 141.3 MB
1.8 Understanding the Cisco Identity Services Engine (ISE).mp4 116.9 MB
2.1 Understanding Inline vs. Promiscuous Mode.mp4 116.1 MB
1.1 Understanding the New Security Threat Landscape and the Attack Continuum.mp4 75.6 MB
3.6 Troubleshooting Cisco ASA with FirePOWER Services.mp4 72.9 MB
1.6 Understanding Cisco Email Security.mp4 69.9 MB
4.1 Introducing Cisco AMP for Networks.mp4 64.3 MB
1.2 Understanding the Cisco ASA Next-Generation Firewalls and the FirePOWER Module.mp4 63.0 MB
7.1 Cisco Next-Generation IPS Deployment Scenarios.mp4 59.9 MB
4.2 Understanding Cisco AMP for Networks Licensing.mp4 59.4 MB
2.7 Understanding Cisco ASA FirePOWER Services and High Availability.mp4 58.0 MB
1.7 Understanding Cisco Web Security.mp4 50.9 MB
4.4 Troubleshooting Cisco AMP for Networks.mp4 49.8 MB
1.3 Understanding Next-Generation Intrusion Prevention Systems (NGIPS).mp4 48.6 MB
0. Cisco Firepower and Advanced Malware Protection LiveLessons- Introduction.mp4 48.0 MB
5.6 Events, File Analysis, Threat Root Cause, and Advanced Reporting.mp4 47.9 MB
2.3 Understanding Cisco ASA FirePOWER Services Sizing.mp4 45.1 MB
7.2 Configuring Cisco Next-Generation IPS Policies and Rules.mp4 44.6 MB
3.4 Configuring the Cisco ASA FirePOWER Module Using the Adaptive Security Device Manager (ASDM).mp4 43.7 MB
3.7 Configuring Cisco Firepower Threat Defense.mp4 39.3 MB
猜你喜欢:
Cisco
Malware
LiveLessons
Protection
Firepower
Press
Advanced
- 【影视】 InfernalRestraints.18.07.06.Alex.More.Malware.XXX.720p.MP4-KTR[rarbg]
-
收录时间:2020-02-13
文档个数:3
文档大小:3.0 GB
最近下载:2025-02-03
人气:2570
磁力链接
infernalrestraints.18.07.06.alex.more.malware.mp4 3.0 GB
infernalrestraints.18.07.06.alex.more.malware.nfo 5.2 kB
RARBG.txt 30 Bytes
猜你喜欢:
Malware
720p
Alex
18.07
XXX
KTR
MP4
rarbg
InfernalRestraints
06
- 【影视】 IR ALEX MORE - MALWARE 06.07.2018.mp4
-
收录时间:2020-02-16
文档个数:1
文档大小:3.0 GB
最近下载:2025-02-20
人气:3757
磁力链接
IR ALEX MORE - MALWARE 06.07.2018.mp4 3.0 GB
猜你喜欢:
MALWARE
ALEX
IR
mp4
2018
06.07
MORE
- 【影视】 [FreeCoursesOnline.Me] SkillShare - Android Reversing And Malware Analysis
-
收录时间:2020-02-23
文档个数:15
文档大小:709.9 MB
最近下载:2025-02-02
人气:3895
磁力链接
7-Static analysis of android malware.mp4 210.6 MB
10-Dynamic analysis of android malware.mp4 77.5 MB
1-Apk in a Nutshell.mp4 76.0 MB
4-Reverse engg using apktool.mp4 72.1 MB
5-Introduction to android malwares.mp4 67.1 MB
9-Dynamic analysis with droidbox.mp4 61.1 MB
8-Introduction to android tamer.mp4 45.7 MB
3-Reversing the source code.mp4 43.0 MB
2-Introduction to Reverse Enginnering of Android App.mp4 30.0 MB
6-Dynamic vs static.mp4 26.9 MB
0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles & Community based Forum.url 377 Bytes
0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
0. Websites you may like/3. (FTUApps.com) Download Cracked Developers Applications For Free.url 239 Bytes
0. Websites you may like/How you can help our Group!.txt 208 Bytes
0. Websites you may like/2. (NulledPremium.com) Download E-Learning, E-Books, Audio-Books, & more.etc.url 163 Bytes
猜你喜欢:
FreeCoursesOnline
Me
Reversing
Malware
Analysis
SkillShare
Android
- 【影视】 [FreeCoursesOnline.Me] Skillshare - Malware Analysis Course for IT security - [FCO]
-
收录时间:2020-02-24
文档个数:15
文档大小:489.7 MB
最近下载:2025-02-16
人气:1707
磁力链接
9. Analyzing and Decrypting Mysterious File.mp4 102.9 MB
7. Analyzing Inner Encryption.mp4 94.9 MB
8. Olly Essentials.mp4 85.6 MB
5. Part 1 Using Monitoring Tools.mp4 71.3 MB
6. Network Analysis.mp4 65.4 MB
4. Malware Analysis Taking and Restoring.mp4 26.9 MB
3. Malware Analysis Lab Setup.mp4 25.4 MB
2. Malware Analysis Course Outline.mp4 9.9 MB
1. Introduction to Malware Analysis.mp4 7.1 MB
Discuss.FreeTutorials.Us.html 169.7 kB
FreeCoursesOnline.Me.html 110.9 kB
FreeTutorials.Eu.html 104.7 kB
[TGx]Downloaded from torrentgalaxy.org.txt 524 Bytes
Torrent Downloaded From GloDls.to.txt 84 Bytes
Presented By SaM.txt 33 Bytes
猜你喜欢:
FreeCoursesOnline
Me
Malware
Analysis
Course
Skillshare
security
FCO
- 【影视】 Alex More - Malware.711x400.mp4
-
收录时间:2020-02-26
文档个数:1
文档大小:437.1 MB
最近下载:2025-02-13
人气:1328
磁力链接
Alex More - Malware.711x400.mp4 437.1 MB
猜你喜欢:
Malware
Alex
mp4
711x400
More
- 【影视】 [FreeCourseSite.com] Udemy - Social Engineering, OSINT & Malware for Hacking
-
收录时间:2020-02-29
文档个数:76
文档大小:728.3 MB
最近下载:2025-02-18
人气:4402
磁力链接
1. Introduction/6. Install Kali From an ISO File Step 2.mp4 115.9 MB
1. Introduction/4. Install Kali From a VMWare Image Step 3.mp4 85.4 MB
1. Introduction/7. Install Kali From an ISO File Step 3.mp4 81.4 MB
1. Introduction/2. Install Kali From a VMWare Image Step 1.mp4 53.8 MB
1. Introduction/3. Install Kali From a VMWare Image Step 2.mp4 49.9 MB
4. Embedding Malware/2. Embedding Malware in WORD.mp4 33.2 MB
1. Introduction/5. Install Kali From an ISO File Step 1.mp4 31.6 MB
3. Creating Malware and Malware Tools/2. MSFvenom Part 1.mp4 25.7 MB
3. Creating Malware and Malware Tools/7. TheFatRat in Action.mp4 24.3 MB
5. Empire Project/2. Empire in Action Part 1.mp4 21.7 MB
9. Information Gathering Through the Internet/1. Introduction.mp4 13.5 MB
7. Social Engineering Toolkit/1. Social Engineering Toolkit.mp4 13.3 MB
4. Embedding Malware/3. Embedding Malware in Firefox Add-on.mp4 13.0 MB
9. Information Gathering Through the Internet/7. FOCA Fingerprinting Organisations with Collected Archives.mp4 11.9 MB
9. Information Gathering Through the Internet/9. Maltego - Visual Link Analysis Tool.mp4 10.7 MB
3. Creating Malware and Malware Tools/5. Veil in Action.mp4 10.3 MB
5. Empire Project/3. Empire in Action Part 2.mp4 10.3 MB
1. Introduction/1. Introduction.mp4 10.2 MB
9. Information Gathering Through the Internet/2. Using Search Engines & Google Hacking to Gather Information.mp4 10.1 MB
5. Empire Project/1. Empire Installation.mp4 10.0 MB
猜你喜欢:
Malware
FreeCourseSite
Udemy
Engineering
OSINT
Social
Hacking
com
- 【影视】 InfernalRestraints.18.07.06.Alex.More.Malware.XXX.SD
-
收录时间:2020-02-29
文档个数:1
文档大小:437.1 MB
最近下载:2025-02-16
人气:3096
磁力链接
InfernalRestraints.18.07.06.Alex.More.Malware.XXX.SD.mp4 437.1 MB
猜你喜欢:
Malware
Alex
18.07
XXX
InfernalRestraints
06
SD
More