Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#IDA Pro
Showing:
22
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Malware Analysis
0
rewiews
Learn techniques for analyzing malicious software, including document analysis, .NET and Java reverse engineering, debugging with IDA Pro, and understanding remote access tools and botnets.
Add to list
12
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Malware Analysis and Reverse Engineering Course
0
rewiews
Learn techniques for analyzing and reverse engineering malware to understand its behavior and protect systems from threats.
Add to list
30
Lesons
1 hour 30 minutes
On-Demand
Free-Video
HackerSploit
IDA Pro, Malware Analysis, and Python Libraries for Cybersecurity - Episode 4
0
rewiews
Explore IDA Pro, assembly language for malware analysis, and Python libraries for penetration testing in this informative cybersecurity discussion with experts from HackerSploit.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Dr Josh Stroschein
Tracing Stack Usage and Stack Frames in a Debugger
0
rewiews
Explore stack usage and stack frames in a debugger, tracing function calls to understand stack operations, calling conventions, and frame unwinding during program execution.
Add to list
4
Lesons
12 minutes
On-Demand
Free-Video
Dr Josh Stroschein
Walking the PEB, Enhancing IDA's Output with Structures, and Unlocking Runtime-Linking - Lecture 4
0
rewiews
Explore PEB usage in malware, learn runtime DLL location techniques, and enhance IDA analysis with custom structures for improved reverse engineering.
Add to list
4
Lesons
16 minutes
On-Demand
Free-Video
Dr Josh Stroschein
TLS Callbacks in PE Files - Detection and Analysis
0
rewiews
Explore TLS callbacks in PE files, their use in malware, and detection methods. Learn to identify and analyze these anti-debugging techniques using various tools and Yara rules.
Add to list
11
Lesons
17 minutes
On-Demand
Free-Video
Dr Josh Stroschein
Performing Basic Triage Analysis and Unpacking with x64dbg - Ransomware Analysis - Part 2
0
rewiews
Perform basic triage analysis on ransomware binaries, compare obfuscated and unobfuscated versions, and learn to unpack using x64dbg and Scylla for effective malware analysis.
Add to list
6
Lesons
21 minutes
On-Demand
Free-Video
Recon Conference
Keeping Your Tools Safe IDA
0
rewiews
Explore techniques for safeguarding IDA tools and enhancing reverse engineering security in this concise presentation from REcon Brussels 2017.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Recon Conference
Automation Techniques in C++ Reverse Engineering
0
rewiews
Explore automated dynamic analysis techniques for C++ reverse engineering, focusing on structure usage, function argument types, and inheritance relationships through DLL injection.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Ekoparty Security Conference
IDA Synergy - Collaborative Reverse Engineering
0
rewiews
Explore IDASynergy: a collaborative reverse engineering tool combining IDAPython Plugin and version control for efficient team-based analysis of complex software systems.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Python - The Wonder Woman of Embedded Device Reversing
0
rewiews
Explore Python's power in embedded device reverse engineering, covering triage, scripting, analysis, and IDA integration for efficient vulnerability research.
Add to list
17
Lesons
45 minutes
On-Demand
Free-Video
Kaspersky
Static Binary Analysis - The Essentials
0
rewiews
Dive into reverse engineering and static malware analysis essentials with Igor Kuznetsov. Learn visual inspection, disassembly techniques, and structure analysis using IDA Pro and Ghidra.
Add to list
31
Lesons
52 minutes
On-Demand
Free-Video
0xdade
Extracting an ELF From an ESP32
0
rewiews
Detailed exploration of extracting ELF files from ESP32 firmware images, covering binary format analysis, conversion processes, and tools for reverse engineering IoT device firmware.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Black Hat
Augmenting Static Analysis Using Pintool - Ablation
0
rewiews
Extracts runtime information to enhance static analysis, resolving virtual calls in C++ binaries and visually comparing samples for efficient vulnerability research and code auditing.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Qiling Framework with IDA Pro
0
rewiews
Explore Qiling Framework's sandbox emulation capabilities with IDA Pro for cross-platform binary analysis, fuzzing, and dynamic MBR analysis. Learn to build custom analysis tools using Python APIs.
Add to list
1
Lesons
1 hour 18 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
fn_fuzzy - Fast Multiple Binary Diffing Triage With IDA
0
rewiews
Efficient binary diffing tool for IDA Pro, using fuzzy hashes to quickly compare and import function data from multiple IDBs, enhancing malware analysis productivity.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Black Hat
Digging for IE11 Sandbox Escapes Part 1
0
rewiews
Explore IE11 sandbox vulnerabilities, focusing on logic bugs and Enhanced Protected Mode. Learn techniques to investigate, analyze, and exploit sandbox weaknesses in Windows 8.1.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Black Hat
Digging for IE11 Sandbox Escapes Part 2
0
rewiews
Explore IE11 sandbox vulnerabilities, focusing on logic bugs and Enhanced Protected Mode. Learn to investigate, analyze, and exploit sandbox escapes discovered during a bug bounty program.
Add to list
18
Lesons
40 minutes
On-Demand
Free-Video
Black Hat
Persist It - Using and Abusing Microsoft's Fix It Patches
0
rewiews
Explore Microsoft's Fix It patches, their analysis, and potential for system persistence through reverse engineering and exploitation techniques.
Add to list
38
Lesons
49 minutes
On-Demand
Free-Video
Black Hat
Hit Them Where It Hurts - Finding Holes in COTS Software
0
rewiews
Explore techniques for identifying vulnerabilities in commercial software, focusing on legal considerations, input tracing, and assembly analysis.
Add to list
14
Lesons
1 hour 13 minutes
On-Demand
Free-Video
A Deep Look at Stack Buffer Overflows and Format String Vulnerabilities
0
rewiews
Explore stack buffer overflows and format string vulnerabilities through hands-on examples, reverse engineering techniques, and debugging tools. Learn essential skills for identifying and exploiting common software weaknesses.
Add to list
19
Lesons
2 hours 59 minutes
On-Demand
Free-Video
DEFCONConference
Game Changing Advances in Windows Shellcode Analysis Using SHAREM Framework
0
rewiews
Discover groundbreaking advances in Windows shellcode analysis through SHAREM framework, offering enhanced emulation, complete code coverage, and superior disassembly capabilities for security professionals.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
load more...