Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Decompilation
Showing:
17
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Ethereum Engineering Group
Control Flow Graph Reconstruction from EVM Bytecode
0
rewiews
Dive into advanced techniques for reconstructing control flow graphs from Ethereum Virtual Machine bytecode, exploring core concepts and practical applications.
Add to list
1
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Reverse Engineering Demystified - OISF 2013
0
rewiews
Explore reverse engineering techniques, from source code analysis to binary disassembly. Learn about vulnerability discovery, static and dynamic approaches, and overcoming obstacles in software analysis.
Add to list
22
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Writing a New Decompiler for JRuby Security Audits
0
rewiews
Explore JRuby vulnerabilities and learn about YBurj, a new open-source decompiler for JRuby IR, enabling recovery of compiled source code for enhanced security audits.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
Software Reverse Engineering with Ghidra - NSA Codebreaker Challenge Demo
0
rewiews
Explore NSA's Ghidra platform for software reverse engineering through a hands-on demonstration solving real-world challenges and learning basic features.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Android Makers
Securing Mobile App Secrets: Preventing Credential Leaks in Android Applications
0
rewiews
Explore how mobile apps leak sensitive credentials, analyze real-life breaches, and learn actionable steps to prevent secrets from being exposed in source code and compiled applications.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Locating Vulnerabilities in Ethereum Smart Contracts - Hybrid Analysis Method
0
rewiews
Explore a hybrid analysis method combining smart contract decompilation and EVM simulation to identify vulnerabilities in Ethereum projects, with practical demonstrations and insights.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Taking Ghidra to the Next Level
0
rewiews
Enhancing Ghidra: BinCraft's modernization efforts, improved decompilation, and integration of advanced techniques like GraalVM for a more powerful reverse engineering tool.
Add to list
19
Lesons
46 minutes
On-Demand
Free-Video
Recon Conference
Decompiler Internals - Microcode
0
rewiews
Explore the intermediate language used in Hex-Rays Decompiler, its simplicity and power in representing programs, and plans for publication and programmatic access.
Add to list
1
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Strange Loop Conference
Kotlin - Uncovered
0
rewiews
Explore Kotlin's inner workings by decompiling to Java, examining data classes, lambdas, and delegation to gain deeper understanding and tools for further investigation.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
FIDLing with Decompilers
0
rewiews
Explore decompilation basics, popular tools, and the Hex-Rays Decompiler. Learn about FIDL, a new library simplifying decompiler API usage, with practical examples and demos.
Add to list
15
Lesons
52 minutes
On-Demand
Free-Video
Black Hat
Decompiler Internals - Microcode
0
rewiews
Explore the intermediate language used in Hex-Rays Decompiler, understanding its simplicity and power in representing complex programs.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
IEEE
Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study
0
rewiews
Explore a usability-optimized decompiler for malware analysis, featuring readability improvements that significantly enhance analysts' ability to understand and combat complex malicious software.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Black Hat
Detecting Bugs Using Decompilation and Data Flow Analysis
0
rewiews
Explore Bugwise, a free online service for detecting software bugs through decompilation and data flow analysis, showcasing its success in finding vulnerabilities in Debian Linux.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Black Hat
Unleashing the Power of Decompilation for x86 Deep Neural Network Executables
0
rewiews
Explore BTD, a decompiler for deep neural network executables, enabling reverse engineering of compiled DL models on various hardware platforms to enhance security and transparency.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
PyCon US
Reverse Engineering Python Binaries - There and Back Again
0
rewiews
Uncover Python bytecode secrets: Learn to interpret and decompile .pyc files, explore challenges in automated decompilation, and gain insights into recovering source code from bytecode.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
NDC Conferences
Lost and Found in Translation - An Intro to ML Assisted Decompilation and Deobfuscation
0
rewiews
Explore ML-assisted decompilation and deobfuscation, covering large language models, neural machine translation, and their applications in reverse engineering and security auditing.
Add to list
25
Lesons
54 minutes
On-Demand
Free-Video
PyCon US
Reverse Engineering Python Binaries - There and Back Again
0
rewiews
Uncover Python bytecode secrets: Learn to interpret and decompile .pyc files, explore challenges in automated decompilation, and gain insights into recovering source code from bytecode.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
load more...