磁力狗

磁力狗
为您索检到88条磁力链接,耗时2毫秒。

最新地址

【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics v3 - AI and ChatGPT Mastery in Malware Analysis
收录时间:2024-02-28 文档个数:28 文档大小:2.7 GB 最近下载:2025-02-16 人气:1824 磁力链接
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/6. Lab Unraveling Malware Mysteries in Memory with Volatility.mp4 403.3 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/3. Lab Advanced Malware Analysis - Dynamic Techniques with Process Hacker.mp4 255.6 MB
  • mp4~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/3. Lab Implementing Clustering Technique&Feature Engg in Malware Variant Analysis.mp4 210.8 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/9. Lab Deep Neural Networks for Effective and Efficient Malware Detection&Analysis.mp4 199.6 MB
  • mp4~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/2. Lab Implementing Malware Behavior Profiling with RF.mp4 128.8 MB
  • mp4~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/4. LabAdvanced Ransomware Behavior Prediction & Classification with Deep Learning.mp4 128.4 MB
  • mp4~Get Your Files Here !/1. Advanced Multi-Stage Malware Analysis AI Synergy and Correlation Insights/3. Lab Visualizing Feature Correlations in Malware Analysis Using Heatmaps.mp4 124.4 MB
  • mp4~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/2. Lab Ransomware Analysis and Dissection.mp4 116.2 MB
  • mp4~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/2. Determining Optimal Clustering Size for Effective Malware Variant Detection.mp4 109.4 MB
  • mp4~Get Your Files Here !/2. Forecasting Malware Threats Predictive Analytics and Time Series Modeling/3. Lab Implementing Advanced Analytics TSA for Predicting Future Malware Threats.mp4 96.9 MB
  • mp4~Get Your Files Here !/2. Forecasting Malware Threats Predictive Analytics and Time Series Modeling/2. Beyond Real-Time Predicting Malware Threats Before They Happen.mp4 80.2 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/5. Key Features for Effective Memory Analysis.mp4 77.8 MB
  • mp4~Get Your Files Here !/6. Deciphering Ransomware with AI Comprehensive Analysis and Advanced Prediction/1. Decoding the Ransomware Lifecycle From Initial Infiltration to Encryption.mp4 75.2 MB
  • mp4~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/3. Demystifying AI in Malware Analysis Explainable AI.mp4 75.0 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/1. Introduction to Dynamic malware analysis.mp4 66.2 MB
  • mp4~Get Your Files Here !/3. Advancing Malware DetectionAI-Driven Behavior Analysis and Model Explainability/4. Lab SHAP-based Explainability in Malware Detection with RF.mp4 65.4 MB
  • mp4~Get Your Files Here !/4. In-Depth Clustering Techniques for Malware variant Discovery & Analysis/1. Identification and Analysis of Malware Variants through Unsupervised Clustering.mp4 61.8 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/4. Dynamic Malware Analysis Challenges, Solutions, and the Road Ahead.mp4 61.7 MB
  • mp4~Get Your Files Here !/5. Harnessing AI for Breakthroughs in Dynamic Malware and Memory Analysis/2. Key Features for Dynamic Memory Analysis.mp4 60.5 MB
  • mp4~Get Your Files Here !/1. Advanced Multi-Stage Malware Analysis AI Synergy and Correlation Insights/2. Unveiling the Mechanics of Correlation Analysis in Multi-Stage Malware Detection.mp4 46.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics V4 - Ai and Chatgpt Mastery In Malware Analysis
收录时间:2024-03-22 文档个数:29 文档大小:1.6 GB 最近下载:2025-02-16 人气:4462 磁力链接
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/7 - LabDeveloping Automated Deep Learning Strategies for Fileless Malware Detection.mp4 224.1 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/21 - Lab Metamorphic Malware Detection using Graph Neural Networks.mp4 174.7 MB
  • mp4~Get Your Files Here !/6 - Innovative Effective Malware Analysis with ChatGPT Strategies Techniques/27 - Lab Deploying ChatGPT for InDepth Malware Code Behavior Analysis.mp4 168.2 MB
  • mp4~Get Your Files Here !/2 - Advanced Detection of Stealthy MalwareLeveraging Memory Forensics DeepLearning/10 - Lab Implementing Deep Learning for Enhanced Detection of Stealthy Malware.mp4 155.1 MB
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/2 - Unraveling the Features of Fileless Malware for Effective Detection.mp4 80.8 MB
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/3 - Advanced Techniques in Fileless Malware Detection.mp4 72.1 MB
  • mp4~Get Your Files Here !/5 - AIDriven Analysis of Malware Executables/22 - Behavioral and Executable Malware A Unified AI Detection Strategy.mp4 71.1 MB
  • mp4~Get Your Files Here !/3 - Modernizing Future of Malware Defense Automated Platforms and Sandbox Solutions/11 - Enhancing Malware Analysis through Advanced Automation Platforms.mp4 56.0 MB
  • mp4~Get Your Files Here !/2 - Advanced Detection of Stealthy MalwareLeveraging Memory Forensics DeepLearning/8 - Deep Learnings Edge and Memory forensics in Unmasking Obfuscated Malware.mp4 50.7 MB
  • mp4~Get Your Files Here !/5 - AIDriven Analysis of Malware Executables/23 - Lab Detecting Malware in Executable Files.mp4 49.5 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/14 - Understanding Metamorphic Malware Evolution Behavior and Defense.mp4 49.1 MB
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/1 - Decoding Fileless Malware A Deep Dive into AIDriven Detection Mechanisms.mp4 45.8 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/18 - Exploring Control Flow Graphs and Graph Neural Networks.mp4 45.6 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/16 - Advanced Techniques for Metamorphic Malware Detection.mp4 41.1 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/19 - Deep Dive into Malware Analysis using Control Flow Graphs Graph Neural Network.mp4 39.6 MB
  • mp4~Get Your Files Here !/4 - Advanced Malware Dynamics Decoding Analyzing Metamorphic Malware/15 - Dissecting Metamorphic Malware Understanding What Changes What Stays the Same.mp4 36.7 MB
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/5 - Algorithmic Approaches in AIDriven Fileless Malware Analysis.mp4 35.0 MB
  • mp4~Get Your Files Here !/3 - Modernizing Future of Malware Defense Automated Platforms and Sandbox Solutions/13 - Merging Defenses How Fileless Malware Detection Integrates with System Architec.mp4 30.3 MB
  • mp4~Get Your Files Here !/3 - Modernizing Future of Malware Defense Automated Platforms and Sandbox Solutions/12 - Harnessing Malware Sandbox Platforms for Enhanced Enterprise Security Infrastruc.mp4 27.6 MB
  • mp4~Get Your Files Here !/1 - Advanced Detection of Fileless Malware Integrating Memory Forensics with AIDL/6 - Building Malware Detection ModelUtilizing Memory Forensics for Dataset Creation.mp4 27.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Malware Forensics V5 - Ai and Chatgpt Mastery In Malware Analysis
收录时间:2024-04-25 文档个数:25 文档大小:1.8 GB 最近下载:2025-02-07 人气:1344 磁力链接
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/20 - Lab AI Trojan Attack Detection using Meta Neural Analysis.mp4 442.4 MB
  • mp4~Get Your Files Here !/4 - Encrypted Traffic Analysis Malware Detection Without Decryption/14 - Lab Malware Detection within Encrypted Traffic.mp4 331.1 MB
  • mp4~Get Your Files Here !/6 - AI in Malware Forensics Evaluation Trends and Future Directions/23 - Navigating the Horizon The Role of AI in Shaping the Future of Malware Analysis.mp4 143.3 MB
  • mp4~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/4 - Lab Implementing Autoencoders in Polymorphic Malware Analysis.mp4 137.8 MB
  • mp4~Get Your Files Here !/3 - Attribution Mastery Identifying the Origins of Malware Threats/11 - Lab Automating IoC Extraction with ChatGPT for Cybersecurity Analysis.mp4 65.6 MB
  • mp4~Get Your Files Here !/3 - Attribution Mastery Identifying the Origins of Malware Threats/10 - Lab Applying SVM for Attribution Modeling in Malware Analysis.mp4 64.4 MB
  • mp4~Get Your Files Here !/4 - Encrypted Traffic Analysis Malware Detection Without Decryption/13 - Advanced Techniques for Identifying Malwares in Encrypted Traffic.mp4 59.1 MB
  • mp4~Get Your Files Here !/2 - AIDriven Analysis of Malware Behavior/8 - Lab ChatGPT Condenses Quick Insights from Complex Security Reports.mp4 56.4 MB
  • mp4~Get Your Files Here !/2 - AIDriven Analysis of Malware Behavior/7 - Lab AIbased Behavioral Malware Analysis.mp4 52.7 MB
  • mp4~Get Your Files Here !/2 - AIDriven Analysis of Malware Behavior/6 - Decoding File Behaviors Spotting Malicious and Benign Patterns.mp4 49.8 MB
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/15 - Unmasking AI Trojans A Glimpse into Hidden Threats.mp4 43.1 MB
  • mp4~Get Your Files Here !/4 - Encrypted Traffic Analysis Malware Detection Without Decryption/12 - Malware Detection in Encrypted Traffic Without Decryption.mp4 40.8 MB
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/19 - Meta Neural Trojan Detection Workflow.mp4 39.3 MB
  • mp4~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/5 - Real Time Case Study Tackling Polymorphic Malware Threats.mp4 38.6 MB
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/17 - Unraveling the Mystique Inner Workings of Meta Neural Analysis.mp4 38.2 MB
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/16 - Defense Against Neural Trojan Attacks.mp4 37.8 MB
  • mp4~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/2 - Understanding Autoencoders A Deep Dive.mp4 34.5 MB
  • mp4~Get Your Files Here !/5 - AI Trojan Warfare Advanced Detection Techniques Using Meta Neural Analysis/18 - Meta Neural Analysis for AI Trojan Detection.mp4 31.3 MB
  • mp4~Get Your Files Here !/1 - Advanced Malware Dynamics Decoding Analyzing Polymorphic Malware/1 - The Complex World of Polymorphic Malware Lifecycle and Detection Strategies.mp4 30.2 MB
  • mp4~Get Your Files Here !/3 - Attribution Mastery Identifying the Origins of Malware Threats/9 - Uncovering the Puppet Masters Advanced Attribution in Malware Analysis.mp4 29.5 MB
【影视】 [FreeCourseSite.com] Udemy - How Hackers Create Undetectable Malware and Viruses
收录时间:2020-01-24 文档个数:35 文档大小:291.2 MB 最近下载:2025-02-20 人气:3656 磁力链接
  • mp42. Understanding Malware and Creating the Hacking Environment/3. Setting Up The Veil Framework.mp4 48.6 MB
  • mp42. Understanding Malware and Creating the Hacking Environment/4. Installing Gnome Desktop.mp4 45.1 MB
  • mp41. We Begin Here/2. Introduction to Undetectable Malware.mp4 36.7 MB
  • mp44. How Hackers Create Undetectable Malware/2. Testing Exploit on Windows 10 Machine.mp4 32.2 MB
  • mp43. Veil and Metasploit/2. Installing Metasploit.mp4 30.1 MB
  • mp44. How Hackers Create Undetectable Malware/1. Creating an Exploit.mp4 26.5 MB
  • mp43. Veil and Metasploit/5. Veil Evasion Final Installation.mp4 16.4 MB
  • mp42. Understanding Malware and Creating the Hacking Environment/1. Installing Python and Pip.mp4 14.2 MB
  • mp42. Understanding Malware and Creating the Hacking Environment/2. Installing Veil-Framework.mp4 11.6 MB
  • mp43. Veil and Metasploit/7. Introduction to Veil and The Importance in Ethical Hacking.mp4 10.7 MB
  • mp43. Veil and Metasploit/1. Wine Mono and Veil-Evasion Installation.mp4 6.6 MB
  • mp44. How Hackers Create Undetectable Malware/3. Encrypting Payload.mp4 4.7 MB
  • mp41. We Begin Here/1. Welcome and Introduction.mp4 3.3 MB
  • mp43. Veil and Metasploit/4. Testing MSF Console.mp4 1.8 MB
  • mp43. Veil and Metasploit/6. Adding the Metasploit Folder to Veil Installation.mp4 1.5 MB
  • mp43. Veil and Metasploit/3. Metasploit Installation Complete.mp4 1.1 MB
  • vtt4. How Hackers Create Undetectable Malware/2. Testing Exploit on Windows 10 Machine.vtt 13.6 kB
  • vtt4. How Hackers Create Undetectable Malware/1. Creating an Exploit.vtt 12.4 kB
  • vtt3. Veil and Metasploit/2. Installing Metasploit.vtt 10.4 kB
  • vtt1. We Begin Here/2. Introduction to Undetectable Malware.vtt 10.3 kB
【影视】 [UdemyCourseDownloader] How to Create and Embed Malware
收录时间:2020-01-27 文档个数:59 文档大小:1.2 GB 最近下载:2025-02-20 人气:1151 磁力链接
  • mp43. Payload Binding Methods/2. Embedding Malware in Normal PDF.mp4 84.7 MB
  • mp48. Create and Embed Malware Through Android/7. Embedding Malware in PDF.mp4 78.3 MB
  • mp48. Create and Embed Malware Through Android/8. Embedding Malware in Image.mp4 77.7 MB
  • mp43. Payload Binding Methods/1. Embedding Malware in Original Apk.mp4 72.3 MB
  • mp45. Create an Undetectable Payload/1. Create Undetectable Python Payloads that Bypass Antiviruses.mp4 69.2 MB
  • mp42. Create Payloads to Hack Different Operating systems/4. Create a Payload and Hack any Android Device.mp4 59.4 MB
  • mp41. Introduction/1. Introduction.mp4 50.5 MB
  • mp44. Create a Malware to Hack Over Wan/2. Hack Any Windows Machine Which is Outside The Network using Netcat tool.mp4 46.9 MB
  • mp44. Create a Malware to Hack Over Wan/3. Hack Any Android Device From Anywhere Over Internet.mp4 44.4 MB
  • mp47. Hack or Recover saved Passwords from Windows Machine/2. Get Every Single Saved Password from Remote Machine.mp4 44.2 MB
  • mp42. Create Payloads to Hack Different Operating systems/6. Create Payload and Hack Linux Systems.mp4 44.0 MB
  • mp42. Create Payloads to Hack Different Operating systems/2. Creating a Simple Payload with Metasploit.mp4 40.2 MB
  • mp47. Hack or Recover saved Passwords from Windows Machine/3. Steal Passwords Using the USB Drive.mp4 38.0 MB
  • mp46. How to be Safe From Above Attacks/2. Detect Meterpreter in Your PC using Antipwny.mp4 37.7 MB
  • mp48. Create and Embed Malware Through Android/4. Hacking Windows Machine Using Metasploit Framework.mp4 37.4 MB
  • mp42. Create Payloads to Hack Different Operating systems/1. Introduction to Metasploit.mp4 36.6 MB
  • mp42. Create Payloads to Hack Different Operating systems/5. Create Payload and Hack any Windows Machines.mp4 36.4 MB
  • mp48. Create and Embed Malware Through Android/5. Hacking Linux Machine using Metasploit.mp4 35.5 MB
  • mp48. Create and Embed Malware Through Android/3. Introduction and Installing Metasploit Framework.mp4 33.6 MB
  • mp48. Create and Embed Malware Through Android/6. Hack Andriod Devices using Metasploit.mp4 33.4 MB
【影视】 Malware Analysis Fundamentals
收录时间:2020-01-30 文档个数:58 文档大小:584.6 MB 最近下载:2025-02-20 人气:3264 磁力链接
  • mp409. Dynamic Analysis Monitoring Malware Behavior/47. Monitoring Malware Behavior Demo.mp4 111.9 MB
  • mp408. Dynamic Analysis Detecting Malware System Changes/43. Detecting Changes Demo.mp4 71.2 MB
  • mp410. Lab 2 Dynamic Analysis/51. Dynamic Analysis Lab.mp4 56.2 MB
  • mp405. Static Analysis Understanding the PE Header/29. Demo PE Header Analysis.mp4 41.3 MB
  • mp404. Static Analysis Analyzing Embedded Strings/19. Demo Embedded Strings Analysis.mp4 27.1 MB
  • mp406 Lab 1 Static Analysis/34. PE Header and Hashing Lab Results.mp4 20.7 MB
  • mp406 Lab 1 Static Analysis/33. Embedded Strings Analysis Lab Results.mp4 18.5 MB
  • mp404. Static Analysis Analyzing Embedded Strings/21. Demo Finding Hidden Strings.mp4 18.3 MB
  • mp409. Dynamic Analysis Monitoring Malware Behavior/46. Process Monitor.mp4 15.1 MB
  • mp402. Introduction and Setting up Your Malware Analysis Lab/06. Demo Configuring a Virtual Machine for Malware Analysis.mp4 11.8 MB
  • mp407. Dynamic Analysis Considerations/39. Malware Persistence and Autoruns.mp4 11.8 MB
  • mp403. Static Analysis Identifying Malware/14. Demo File Identification and Hashing.mp4 11.2 MB
  • mp403. Static Analysis Identifying Malware/11. File Identification.mp4 9.8 MB
  • mp404. Static Analysis Analyzing Embedded Strings/20. Hiding Strings.mp4 9.7 MB
  • mp405. Static Analysis Understanding the PE Header/26. Import Address Table.mp4 8.6 MB
  • mp405. Static Analysis Understanding the PE Header/27. Resources.mp4 7.4 MB
  • zipmalware-analysis-fundamentals.zip 7.1 MB
  • mp406 Lab 1 Static Analysis/32. File Identification Lab Results.mp4 6.7 MB
  • mp403. Static Analysis Identifying Malware/12. File Identification Tools.mp4 6.4 MB
  • mp405. Static Analysis Understanding the PE Header/24. Windows PE Header.mp4 6.3 MB
【影视】 [FreeCoursesOnline.Me] [Packt] Advanced Malware Analysis - [FCO]
收录时间:2020-01-31 文档个数:40 文档大小:691.2 MB 最近下载:2025-02-19 人气:2930 磁力链接
  • mp43.Advanced Dynamic Malware Analysis/14.Malware Analysis Using OllyDbg.mp4 64.6 MB
  • mp45.How to Detect and Defend against Malware in a Network/29.How to Setup Snort.mp4 49.8 MB
  • mp46.How to Deal with Evasive Malware/33.Examples of Unpacking a Malware Program.mp4 49.1 MB
  • mp43.Advanced Dynamic Malware Analysis/15.Features of OllyDbg.mp4 44.1 MB
  • mp44.Advanced Static Malware Analysis/21.Loading and Navigating Using IDA Pro.mp4 39.1 MB
  • mp44.Advanced Static Malware Analysis/24.Analysing Malware Using IDA Pro.mp4 35.7 MB
  • mp43.Advanced Dynamic Malware Analysis/17.Malware Analysis Using WINDBG.mp4 34.0 MB
  • mp44.Advanced Static Malware Analysis/22.Functions in IDA.mp4 31.6 MB
  • mp44.Advanced Static Malware Analysis/23.IDA Pro Graphic Features.mp4 31.2 MB
  • mp43.Advanced Dynamic Malware Analysis/18.Features of WINDBG.mp4 23.9 MB
  • mp46.How to Deal with Evasive Malware/31.How to Detect Packed Malware.mp4 21.7 MB
  • mp41.Exploring Malware Functionalities/02.Backdoors.mp4 21.0 MB
  • mp41.Exploring Malware Functionalities/06.Rootkits.mp4 19.0 MB
  • mp42.Malware Advanced Techniques/09.Data Encoding.mp4 17.7 MB
  • mp41.Exploring Malware Functionalities/05.Ransomware.mp4 16.9 MB
  • mp44.Advanced Static Malware Analysis/19.Advanced Notes on the x86 Architecture.mp4 16.9 MB
  • mp41.Exploring Malware Functionalities/01.The Course Overview.mp4 16.8 MB
  • mp43.Advanced Dynamic Malware Analysis/12.An Overview of the Windows Environment.mp4 15.4 MB
  • mp42.Malware Advanced Techniques/07.Privilege Escalation.mp4 14.3 MB
  • mp42.Malware Advanced Techniques/10.Covert Launching Techniques.mp4 14.2 MB
【影视】 Malware Alex More
收录时间:2020-02-01 文档个数:1 文档大小:3.0 GB 最近下载:2025-02-20 人气:7373 磁力链接
  • mp4IR - Jul 06, 2018 - Alex More high.mp4 3.0 GB
【影视】 [FreeCoursesOnline.Me] [LYNDA] Ethical Hacking The Complete Malware Analysis Process [FCO]
收录时间:2020-02-02 文档个数:58 文档大小:212.0 MB 最近下载:2025-02-14 人气:7861 磁力链接
  • mp404-Advanced_Techniques/003-Polymorphic_malware.mp4 19.3 MB
  • mp406-Conclusion/001-Whats_next_.mp4 14.1 MB
  • mp404-Advanced_Techniques/001-Hiding_malware.mp4 13.5 MB
  • mp403-Malware_Detection/001-Indicators_of_compromise.mp4 12.6 MB
  • mp405-Reverse_Engineering_Malware/004-Analyzing_BlackEnergy_and_GreyEnergy.mp4 12.0 MB
  • mp401-Introduction/001-What_malware_is_and_how_it_behaves.mp4 10.9 MB
  • mp402-Introduction_to_Malware/005-How_malware_achieves_persistence.mp4 10.1 MB
  • mp402-Introduction_to_Malware/008-Virus_construction_kits.mp4 9.4 MB
  • mp404-Advanced_Techniques/004-Using_cryptography_in_ransomware.mp4 9.3 MB
  • mp405-Reverse_Engineering_Malware/001-Using_reverse_engineering_to_understand_code.mp4 9.2 MB
  • mp405-Reverse_Engineering_Malware/002-Considering_malware_in_families.mp4 8.5 MB
  • mp402-Introduction_to_Malware/010-The_MITRE_ATTCK_repository.mp4 8.4 MB
  • mp404-Advanced_Techniques/006-Analyzing_Win32.Sodin.mp4 6.9 MB
  • mp403-Malware_Detection/003-Sandboxing_malware.mp4 6.8 MB
  • mp402-Introduction_to_Malware/006-Digging_into_rootkits.mp4 6.7 MB
  • mp402-Introduction_to_Malware/004-How_malware_works.mp4 6.4 MB
  • mp402-Introduction_to_Malware/007-Automating_malware_with_botnets.mp4 6.0 MB
  • mp404-Advanced_Techniques/005-Understanding_advanced_persistent_threats.mp4 5.7 MB
  • mp402-Introduction_to_Malware/002-The_evolution_of_malware.mp4 5.7 MB
  • mp405-Reverse_Engineering_Malware/003-Automated_malware_analysis.mp4 5.6 MB
【影视】 [UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
收录时间:2020-02-03 文档个数:38 文档大小:285.9 MB 最近下载:2025-01-16 人气:2977 磁力链接
  • mp405. Identifying Malware Use of Cryptography/01. Purpose of Cryptography in Malware.mp4 20.7 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/03. Demo - Dynamic API Resolution.mp4 20.7 MB
  • mp405. Identifying Malware Use of Cryptography/03. Demo - Finding Cryptography.mp4 19.9 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/04. Lab - Tracing Import Table Construction.mp4 19.5 MB
  • mp404. Detecting and Defeating Function Obfuscation in Native Code/02. Walking the PEB, Parsing a PE.mp4 19.1 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Obfuscation in Visual Basic for Applications (VBA).mp4 19.0 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/04. Lab - Defeating String Obfuscation.mp4 17.8 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Demo - Defeating VBA Obfuscation.mp4 17.5 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/03. Demo - Identifying String Obfuscation.mp4 15.5 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Demo - Defeating PowerShell Obfuscation.mp4 15.5 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Lab - Performing Comprehensive Analysis.mp4 14.5 MB
  • mp401. How Obfuscation Affects Your Analysis/02. How Obfuscation Impacts Analysis.mp4 12.3 MB
  • mp405. Identifying Malware Use of Cryptography/04. Lab - Analyzing Malware That Uses Cryptography.mp4 10.7 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/02. String Obfuscation.mp4 8.9 MB
  • mp402. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Prevalent Obfuscation Techniques.mp4 6.8 MB
  • mp405. Identifying Malware Use of Cryptography/02. Tools to Help Identify Use of Cryptography .mp4 6.0 MB
  • mp403. Detecting and Defeating String Obfuscation in Native Code/01. Differences from Interpreted Code.mp4 5.3 MB
  • mp401. How Obfuscation Affects Your Analysis/03. What You Should Know.mp4 5.3 MB
  • mp401. How Obfuscation Affects Your Analysis/01. Understanding Code Obfuscation.mp4 4.3 MB
  • mp400. Course Overview/00. Course Overview.mp4 3.6 MB
【影视】 Lynda - Wireshark - Malware and Forensics
收录时间:2020-02-03 文档个数:32 文档大小:316.2 MB 最近下载:2025-02-19 人气:8718 磁力链接
  • mp43 - 2. Capture Overview/Display filters.mp4 26.7 MB
  • mp44 - 3. Unusual Traffic/Attack signatures.mp4 25.8 MB
  • mp43 - 2. Capture Overview/Save, export, and print.mp4 23.0 MB
  • mp43 - 2. Capture Overview/Statistics.mp4 19.4 MB
  • mp43 - 2. Capture Overview/Coloring rules.mp4 17.0 MB
  • mp45 - 4. Case Studies/Unwanted TOR activity.mp4 16.2 MB
  • mp43 - 2. Capture Overview/Using a ring buffer.mp4 13.6 MB
  • mp42 - 1. Deep Packet Analysis/Wireshark overview.mp4 12.8 MB
  • mp45 - 4. Case Studies/Fast flux DNS.mp4 12.8 MB
  • mp42 - 1. Deep Packet Analysis/Tshark.mp4 11.7 MB
  • mp45 - 4. Case Studies/Trojan in the house.mp4 10.7 MB
  • mp44 - 3. Unusual Traffic/OSI layer attacks.mp4 10.6 MB
  • mp43 - 2. Capture Overview/Capture filters.mp4 10.3 MB
  • mp42 - 1. Deep Packet Analysis/Create firewall rules.mp4 9.4 MB
  • mp42 - 1. Deep Packet Analysis/Cyberattacks and trends.mp4 8.8 MB
  • mp44 - 3. Unusual Traffic/Using VirusTotal.mp4 8.5 MB
  • mp42 - 1. Deep Packet Analysis/Tap into your network.mp4 8.1 MB
  • mp42 - 1. Deep Packet Analysis/Packet analysis overview.mp4 8.0 MB
  • mp43 - 2. Capture Overview/Solution - HTTP packets.mp4 8.0 MB
  • mp44 - 3. Unusual Traffic/Solution - Analyze.mp4 7.8 MB
【影视】 [FreeTutorials.Us] undetectable-malware
收录时间:2020-02-03 文档个数:20 文档大小:291.0 MB 最近下载:2024-11-29 人气:2436 磁力链接
  • mp402-understanding-malware-and-creating-the-hacking-environment/005-setting-up-the-veil-framework.mp4 48.6 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/006-installing-gnome-desktop.mp4 45.1 MB
  • mp401-we-begin-here/002-introduction-to-undetectable-malware.mp4 36.7 MB
  • mp404-how-hackers-create-undetectable-malware/015-testing-exploit-on-windows-10-machine.mp4 32.2 MB
  • mp403-veil-and-metasploit/008-installing-metasploit.mp4 30.1 MB
  • mp404-how-hackers-create-undetectable-malware/014-creating-an-exploit.mp4 26.5 MB
  • mp403-veil-and-metasploit/011-veil-evasion-final-installation.mp4 16.4 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/003-installing-python-and-pip.mp4 14.2 MB
  • mp402-understanding-malware-and-creating-the-hacking-environment/004-installing-veilframework.mp4 11.6 MB
  • mp403-veil-and-metasploit/013-introduction-to-veil-and-the-importance-in-ethical-hacking.mp4 10.7 MB
  • mp403-veil-and-metasploit/007-wine-mono-and-veilevasion-installation.mp4 6.6 MB
  • mp404-how-hackers-create-undetectable-malware/016-encrypting-payload.mp4 4.7 MB
  • mp401-we-begin-here/001-welcome-and-introduction.mp4 3.3 MB
  • mp403-veil-and-metasploit/010-testing-msf-console.mp4 1.8 MB
  • mp403-veil-and-metasploit/012-adding-the-metasploit-folder-to-veil-installation.mp4 1.5 MB
  • mp403-veil-and-metasploit/009-metasploit-installation-complete.mp4 1.1 MB
  • urlFreeCoursesOnline.Us.url 225 Bytes
  • txt[FreeCoursesOnline.Us].txt 138 Bytes
  • urlFreetutorials.Us.url 119 Bytes
  • txt[FreeTutorials.Us].txt 75 Bytes
【影视】 Cisco Press - Cisco Firepower and Advanced Malware Protection LiveLessons
收录时间:2020-02-04 文档个数:59 文档大小:2.1 GB 最近下载:2025-02-17 人气:4469 磁力链接
  • mp41.4 Understanding Advanced Malware Protection (AMP) for Endpoints and Networks.mp4 141.3 MB
  • mp41.8 Understanding the Cisco Identity Services Engine (ISE).mp4 116.9 MB
  • mp42.1 Understanding Inline vs. Promiscuous Mode.mp4 116.1 MB
  • mp41.1 Understanding the New Security Threat Landscape and the Attack Continuum.mp4 75.6 MB
  • mp43.6 Troubleshooting Cisco ASA with FirePOWER Services.mp4 72.9 MB
  • mp41.6 Understanding Cisco Email Security.mp4 69.9 MB
  • mp44.1 Introducing Cisco AMP for Networks.mp4 64.3 MB
  • mp41.2 Understanding the Cisco ASA Next-Generation Firewalls and the FirePOWER Module.mp4 63.0 MB
  • mp47.1 Cisco Next-Generation IPS Deployment Scenarios.mp4 59.9 MB
  • mp44.2 Understanding Cisco AMP for Networks Licensing.mp4 59.4 MB
  • mp42.7 Understanding Cisco ASA FirePOWER Services and High Availability.mp4 58.0 MB
  • mp41.7 Understanding Cisco Web Security.mp4 50.9 MB
  • mp44.4 Troubleshooting Cisco AMP for Networks.mp4 49.8 MB
  • mp41.3 Understanding Next-Generation Intrusion Prevention Systems (NGIPS).mp4 48.6 MB
  • mp40. Cisco Firepower and Advanced Malware Protection LiveLessons- Introduction.mp4 48.0 MB
  • mp45.6 Events, File Analysis, Threat Root Cause, and Advanced Reporting.mp4 47.9 MB
  • mp42.3 Understanding Cisco ASA FirePOWER Services Sizing.mp4 45.1 MB
  • mp47.2 Configuring Cisco Next-Generation IPS Policies and Rules.mp4 44.6 MB
  • mp43.4 Configuring the Cisco ASA FirePOWER Module Using the Adaptive Security Device Manager (ASDM).mp4 43.7 MB
  • mp43.7 Configuring Cisco Firepower Threat Defense.mp4 39.3 MB
【影视】 InfernalRestraints.18.07.06.Alex.More.Malware.XXX.720p.MP4-KTR[rarbg]
收录时间:2020-02-13 文档个数:3 文档大小:3.0 GB 最近下载:2025-02-03 人气:2570 磁力链接
  • mp4infernalrestraints.18.07.06.alex.more.malware.mp4 3.0 GB
  • nfoinfernalrestraints.18.07.06.alex.more.malware.nfo 5.2 kB
  • txtRARBG.txt 30 Bytes
【影视】 IR ALEX MORE - MALWARE 06.07.2018.mp4
收录时间:2020-02-16 文档个数:1 文档大小:3.0 GB 最近下载:2025-02-20 人气:3757 磁力链接
  • mp4IR ALEX MORE - MALWARE 06.07.2018.mp4 3.0 GB
【影视】 [FreeCoursesOnline.Me] SkillShare - Android Reversing And Malware Analysis
收录时间:2020-02-23 文档个数:15 文档大小:709.9 MB 最近下载:2025-02-02 人气:3895 磁力链接
  • mp47-Static analysis of android malware.mp4 210.6 MB
  • mp410-Dynamic analysis of android malware.mp4 77.5 MB
  • mp41-Apk in a Nutshell.mp4 76.0 MB
  • mp44-Reverse engg using apktool.mp4 72.1 MB
  • mp45-Introduction to android malwares.mp4 67.1 MB
  • mp49-Dynamic analysis with droidbox.mp4 61.1 MB
  • mp48-Introduction to android tamer.mp4 45.7 MB
  • mp43-Reversing the source code.mp4 43.0 MB
  • mp42-Introduction to Reverse Enginnering of Android App.mp4 30.0 MB
  • mp46-Dynamic vs static.mp4 26.9 MB
  • url0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles & Community based Forum.url 377 Bytes
  • url0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
  • url0. Websites you may like/3. (FTUApps.com) Download Cracked Developers Applications For Free.url 239 Bytes
  • txt0. Websites you may like/How you can help our Group!.txt 208 Bytes
  • url0. Websites you may like/2. (NulledPremium.com) Download E-Learning, E-Books, Audio-Books, & more.etc.url 163 Bytes
【影视】 [FreeCoursesOnline.Me] Skillshare - Malware Analysis Course for IT security - [FCO]
收录时间:2020-02-24 文档个数:15 文档大小:489.7 MB 最近下载:2025-02-16 人气:1707 磁力链接
  • mp49. Analyzing and Decrypting Mysterious File.mp4 102.9 MB
  • mp47. Analyzing Inner Encryption.mp4 94.9 MB
  • mp48. Olly Essentials.mp4 85.6 MB
  • mp45. Part 1 Using Monitoring Tools.mp4 71.3 MB
  • mp46. Network Analysis.mp4 65.4 MB
  • mp44. Malware Analysis Taking and Restoring.mp4 26.9 MB
  • mp43. Malware Analysis Lab Setup.mp4 25.4 MB
  • mp42. Malware Analysis Course Outline.mp4 9.9 MB
  • mp41. Introduction to Malware Analysis.mp4 7.1 MB
  • htmlDiscuss.FreeTutorials.Us.html 169.7 kB
  • htmlFreeCoursesOnline.Me.html 110.9 kB
  • htmlFreeTutorials.Eu.html 104.7 kB
  • txt[TGx]Downloaded from torrentgalaxy.org.txt 524 Bytes
  • txtTorrent Downloaded From GloDls.to.txt 84 Bytes
  • txtPresented By SaM.txt 33 Bytes
【影视】 Alex More - Malware.711x400.mp4
收录时间:2020-02-26 文档个数:1 文档大小:437.1 MB 最近下载:2025-02-13 人气:1328 磁力链接
  • mp4Alex More - Malware.711x400.mp4 437.1 MB
【影视】 [FreeCourseSite.com] Udemy - Social Engineering, OSINT & Malware for Hacking
收录时间:2020-02-29 文档个数:76 文档大小:728.3 MB 最近下载:2025-02-18 人气:4402 磁力链接
  • mp41. Introduction/6. Install Kali From an ISO File Step 2.mp4 115.9 MB
  • mp41. Introduction/4. Install Kali From a VMWare Image Step 3.mp4 85.4 MB
  • mp41. Introduction/7. Install Kali From an ISO File Step 3.mp4 81.4 MB
  • mp41. Introduction/2. Install Kali From a VMWare Image Step 1.mp4 53.8 MB
  • mp41. Introduction/3. Install Kali From a VMWare Image Step 2.mp4 49.9 MB
  • mp44. Embedding Malware/2. Embedding Malware in WORD.mp4 33.2 MB
  • mp41. Introduction/5. Install Kali From an ISO File Step 1.mp4 31.6 MB
  • mp43. Creating Malware and Malware Tools/2. MSFvenom Part 1.mp4 25.7 MB
  • mp43. Creating Malware and Malware Tools/7. TheFatRat in Action.mp4 24.3 MB
  • mp45. Empire Project/2. Empire in Action Part 1.mp4 21.7 MB
  • mp49. Information Gathering Through the Internet/1. Introduction.mp4 13.5 MB
  • mp47. Social Engineering Toolkit/1. Social Engineering Toolkit.mp4 13.3 MB
  • mp44. Embedding Malware/3. Embedding Malware in Firefox Add-on.mp4 13.0 MB
  • mp49. Information Gathering Through the Internet/7. FOCA Fingerprinting Organisations with Collected Archives.mp4 11.9 MB
  • mp49. Information Gathering Through the Internet/9. Maltego - Visual Link Analysis Tool.mp4 10.7 MB
  • mp43. Creating Malware and Malware Tools/5. Veil in Action.mp4 10.3 MB
  • mp45. Empire Project/3. Empire in Action Part 2.mp4 10.3 MB
  • mp41. Introduction/1. Introduction.mp4 10.2 MB
  • mp49. Information Gathering Through the Internet/2. Using Search Engines & Google Hacking to Gather Information.mp4 10.1 MB
  • mp45. Empire Project/1. Empire Installation.mp4 10.0 MB
【影视】 InfernalRestraints.18.07.06.Alex.More.Malware.XXX.SD
收录时间:2020-02-29 文档个数:1 文档大小:437.1 MB 最近下载:2025-02-16 人气:3096 磁力链接
  • mp4InfernalRestraints.18.07.06.Alex.More.Malware.XXX.SD.mp4 437.1 MB
共5页 上一页 1 2 3 4 5 下一页
>