Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
4B |
001 Dynamic Analysis of .NET Trojan - Part 1.en.srt |
7.65KB |
001 Dynamic Analysis of .NET Trojan - Part 1.mp4 |
50.61MB |
001 Installing dnSpy.en.srt |
4.82KB |
001 Installing dnSpy.mp4 |
32.12MB |
001 Installing ILDASM and ILASM.en.srt |
5.01KB |
001 Installing ILDASM and ILASM.mp4 |
39.16MB |
001 Introduction.en.srt |
3.28KB |
001 Introduction.mp4 |
40.79MB |
001 Lab Demo Instructions on Reverse Engineering .NET executables.en.srt |
2.14KB |
001 Lab Demo Instructions on Reverse Engineering .NET executables.mp4 |
8.03MB |
001 Lab Exercise_ Principles of Analyzing a .NET Ransomware.en.srt |
6.18KB |
001 Lab Exercise_ Principles of Analyzing a .NET Ransomware.mp4 |
23.68MB |
001 Principles of .NET Analysis.en.srt |
8.47KB |
001 Principles of .NET Analysis.mp4 |
35.20MB |
001 Principles of .NET and Java Malware Analysis.en.srt |
7.24KB |
001 Principles of .NET and Java Malware Analysis.mp4 |
31.85MB |
001 Principles of Analyzing a Java RAT.en.srt |
1.96KB |
001 Principles of Analyzing a Java RAT.mp4 |
7.12MB |
001 Principles of Java Bytecodes.en.srt |
7.22KB |
001 Principles of Java Bytecodes.mp4 |
28.60MB |
001 Reverse Engineering Java Binary Using ByteCode Viewer.en.srt |
2.84KB |
001 Reverse Engineering Java Binary Using ByteCode Viewer.mp4 |
18.03MB |
001 Using dnSpy for the first time.en.srt |
13.13KB |
001 Using dnSpy for the first time.mp4 |
90.44MB |
001 Where to Download Malware Samples to Practice Malware Analysis.en.srt |
1.25KB |
001 Where to Download Malware Samples to Practice Malware Analysis.mp4 |
12.25MB |
002 Analyzing Java ByteCodes by Disassembling.en.srt |
4.44KB |
002 Analyzing Java ByteCodes by Disassembling.mp4 |
24.39MB |
002 Bonus Lecture.en.srt |
1.61KB |
002 Bonus Lecture.mp4 |
10.61MB |
002 Dynamic Analysis of .NET Trojan - Part 2.en.srt |
6.55KB |
002 Dynamic Analysis of .NET Trojan - Part 2.mp4 |
74.75MB |
002 Install a Virtual Machine.en.srt |
9.08KB |
002 Install a Virtual Machine.mp4 |
77.62MB |
002 Lab_ Reverse Engineering .NET Ransomware - Part 1.en.srt |
12.43KB |
002 Lab_ Reverse Engineering .NET Ransomware - Part 1.mp4 |
102.31MB |
002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.en.srt |
7.95KB |
002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.mp4 |
49.16MB |
002 Lab Demo Walkthrough_ Reverse Engineering .NET.en.srt |
13.26KB |
002 Lab Demo Walkthrough_ Reverse Engineering .NET.mp4 |
102.67MB |
002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).en.srt |
8.72KB |
002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).mp4 |
58.78MB |
002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.en.srt |
9.96KB |
002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.mp4 |
97.63MB |
002 Lab Setup-v3.pdf |
56.73KB |
002 windows 7 download links - v3.txt |
373B |
003 Configuring the Virtual Machine.en.srt |
12.65KB |
003 Configuring the Virtual Machine.mp4 |
152.36MB |
003 Lab_ Reverse Engineering .NET Ransomware - Part 2.en.srt |
6.70KB |
003 Lab_ Reverse Engineering .NET Ransomware - Part 2.mp4 |
70.75MB |
003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.en.srt |
11.20KB |
003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.mp4 |
94.54MB |
004 flarevm.txt |
55B |
004 Installing Tools_ FlareVM.en.srt |
3.94KB |
004 Installing Tools_ FlareVM.mp4 |
59.63MB |
005 principles of dotnet and java malware analysis.pdf |
728.32KB |
006 download link for visual studio.txt |
109B |
007 List of CIL Instructions.txt |
83B |
007 Principles of .NET Analysis-v2.pdf |
510.86KB |
008 dotnet_demo1.zip |
2.13KB |
008 password.txt |
61B |
009 dnSpy link.txt |
196B |
010 dotnet_demo1.zip |
2.13KB |
010 password.txt |
61B |
011 Lab Demo - reversing dotnet binary.pdf |
465.26KB |
011 password.txt |
66B |
011 PS_DotNet_Lab1.zip |
5.79KB |
013 password.txt |
145B |
013 Principles of Analyzing dotNet Ransomware.pdf |
539.44KB |
013 PS_DotNet_RealWorld_Ransomware.zip |
16.72KB |
016 lab1-dotnet-trojan.zip |
455.55KB |
016 password.txt |
70B |
018 hello-earth-proj.zip |
462B |
018 password.txt |
79B |
018 principles of java bytecode.pdf |
753.59KB |
021 password.txt |
74B |
021 PS_Java_Demo1_Jar.zip |
3.50KB |
022 password.txt |
75B |
022 PS_Java_Lab_01_Jar.zip |
203.35KB |
023 Java_RealWorld-CrossRAT.zip |
211.27KB |
023 password.txt |
85B |
023 Principles of Analyzing Java RAT.pdf |
430.76KB |
025 malware samples urls.txt |
594B |
026 useful-resources-for-further-study-2021.pdf |
668.72KB |
1 |
5B |
10 |
227.24KB |
11 |
397.71KB |
12 |
346.14KB |
13 |
214.57KB |
14 |
347.45KB |
15 |
302.84KB |
16 |
389.05KB |
17 |
158.45KB |
18 |
408.65KB |
19 |
112.56KB |
2 |
186.62KB |
20 |
331.70KB |
21 |
23.97KB |
22 |
255.20KB |
23 |
397.69KB |
24 |
47.29KB |
25 |
389.35KB |
26 |
270.41KB |
27 |
295.68KB |
28 |
355.28KB |
29 |
484.56KB |
3 |
173.44KB |
4 |
6.99KB |
5 |
63.29KB |
6 |
389.70KB |
7 |
253.49KB |
8 |
251.23KB |
9 |
383.71KB |
TutsNode.com.txt |
63B |