Torrent Info
Title Reverse Engineering Malware with Ghidra
Category
Size 295.07MB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
00. Course Overview.mp4 3.61MB
00. Course Overview.srt 2.78KB
00. Module Introduction.mp4 1.48MB
00. Module Introduction.mp4 1.02MB
00. Module Introduction.mp4 720.99KB
00. Module Introduction.mp4 1.09MB
00. Module Introduction.srt 1.68KB
00. Module Introduction.srt 1.03KB
00. Module Introduction.srt 786B
00. Module Introduction.srt 1.35KB
01. Enhancing the CodeBrowser.mp4 14.30MB
01. Enhancing the CodeBrowser.srt 12.71KB
01. Exploring Ghidra’s Main Components and Features.mp4 4.18MB
01. Exploring Ghidra’s Main Components and Features.srt 4.35KB
01. Reverse Engineering and the Ghidra Software Reverse Engineering (SRE) Tools.mp4 9.34MB
01. Reverse Engineering and the Ghidra Software Reverse Engineering (SRE) Tools.srt 8.85KB
01. Working with the Decompiler.mp4 29.70MB
01. Working with the Decompiler.srt 13.33KB
02. Function Analysis Tools and Techniques.mp4 12.03MB
02. Function Analysis Tools and Techniques.srt 8.87KB
02. Headless Analyzer.mp4 3.94MB
02. Headless Analyzer.srt 2.36KB
02. Malware Packing, Obfuscation, and Other Mayhem.mp4 3.82MB
02. Malware Packing, Obfuscation, and Other Mayhem.srt 3.32KB
02. Projects and Auto-analysis.mp4 6.28MB
02. Projects and Auto-analysis.srt 5.80KB
03. Demo- Function Analysis.mp4 63.06MB
03. Demo- Function Analysis.srt 20.56KB
03. Demo- Headless Analyzer.mp4 17.38MB
03. Demo- Headless Analyzer.srt 8.87KB
03. Exploring the Main User Interface.mp4 10.61MB
03. Exploring the Main User Interface.srt 8.40KB
03. What You Should Know.mp4 6.34MB
03. What You Should Know.srt 5.32KB
04. Conclusion.mp4 663.53KB
04. Conclusion.srt 838B
04. Demo- Getting Started with Ghidra.mp4 21.78MB
04. Demo- Getting Started with Ghidra.srt 14.04KB
04. Ghidra Scripts.mp4 4.22MB
04. Ghidra Scripts.srt 2.31KB
04. Ghidra’s Decompiler.mp4 10.22MB
04. Ghidra’s Decompiler.srt 7.36KB
05. Conclusion.mp4 1.00MB
05. Conclusion.srt 1.22KB
05. Demo- Analyzing a Trojan.mp4 38.71MB
05. Demo- Analyzing a Trojan.srt 16.52KB
05. Demo- Scripting Example.mp4 24.62MB
05. Demo- Scripting Example.srt 10.63KB
06. Conclusion.mp4 819.12KB
06. Conclusion.srt 991B
06. Conclusion and Course Wrap-up.mp4 4.03MB
06. Conclusion and Course Wrap-up.srt 4.26KB
6 Simple Memory Techniques - All hacker use it.html 98B
Echo Dot (3rd Gen) - Smart speaker with Alexa - Charcoal.html 84B
Linux Tails Operating System.html 84B
Raspberry Pi 4.html 84B
Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html 84B
USB Rubber Ducky Deluxe.html 84B
Yubico - YubiKey 5 NFC.html 84B
Distribution statistics by country
Ukraine (UA) 1
Total 1
IP List List of IP addresses which were distributed this torrent