Search Torrents
|
Browse Torrents
|
48 Hour Uploads
|
TV shows
|
Music
|
Top 100
Audio
Video
Applications
Games
Porn
Other
All
Music
Audio books
Sound clips
FLAC
Other
Movies
Movies DVDR
Music videos
Movie clips
TV shows
Handheld
HD - Movies
HD - TV shows
3D
Other
Windows
Mac
UNIX
Handheld
IOS (iPad/iPhone)
Android
Other OS
PC
Mac
PSx
XBOX360
Wii
Handheld
IOS (iPad/iPhone)
Android
Other
Movies
Movies DVDR
Pictures
Games
HD - Movies
Movie clips
Other
E-books
Comics
Pictures
Covers
Physibles
Other
Details for:
Reverse Engineering & Malware Analysis | REMASM+
reverse engineering amp malware analysis remasm
Type:
Other
Files:
86
Size:
4.7 GB
Uploaded On:
Aug. 29, 2023, 3:05 a.m.
Added By:
Metodone
Seeders:
0
Leechers:
0
Info Hash:
BC06BBAAB5E407DCFF3735BF5CEC85CA28296DD9
Get This Torrent
Author: Udemy Duration: 10:48:51 Language: English Quality: Video: MPEG4 Video (H264) 1280x720 30fps 1917kbps Audio: AAC 44100Hz stereo 128kbps Description: Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra,x86-64, IDA Pro, IDA Free, Assembly and NASM Welcome to a best online learning experience that delves deep into the fascinating world of reverse engineering and malware analysis. In this comprehensive course, you'll embark on a journey that unravels the complexities of software, empowering you to decode its inner workings, uncover vulnerabilities, and fortify digital defenses. Join us in "Mastering Reverse Engineering and Malware Analysis" to acquire the skills needed to navigate the digital landscape with confidence and expertise. Discover the Essence of Reverse Engineering and Malware Analysis Reverse engineering is the intricate process of dissecting software and systems to understand their architecture and functionality. It involves peeling back the layers of code to uncover hidden intricacies, enabling you to comprehend how software operates, regardless of whether it was originally developed by you or others. This skill empowers you to identify vulnerabilities, optimize performance, and enhance software security. Malware analysis, a crucial facet of cybersecurity, is the art of dissecting malicious software to understand its behavior, intent, and potential impact. By analyzing malware, experts gain insights into the techniques employed by cybercriminals, enabling them to develop effective countermeasures and safeguard digital assets. Understanding malware analysis equips you to identify, neutralize, and prevent cyber threats, making it an essential skill in today's interconnected world
Get This Torrent
1. Disassembly and Disassembler/1. The Disassembly Theory.mp4
35.3 MB
1. Disassembly and Disassembler/2. Disassembly - What.mp4
69.7 MB
10. Writing our second 64Bit Assembly Program/1. Coding ASM file.mp4
66.0 MB
10. Writing our second 64Bit Assembly Program/2. Analyzing Output with GDB and creating makefile.mp4
131.4 MB
11. OR XOR AND/1. The OR.mp4
15.3 MB
11. OR XOR AND/2. NOT.mp4
10.0 MB
11. OR XOR AND/3. XOR.mp4
14.2 MB
11. OR XOR AND/4. AND.mp4
20.5 MB
12. Data Display Debugger - DDD/1. Developing another Assembly Program to Analyze with DDD.mp4
87.0 MB
12. Data Display Debugger - DDD/2. Analyzing Previously Written Code.mp4
61.1 MB
12. Data Display Debugger - DDD/3. Using DDD and Analyzing RAX Values.mp4
96.3 MB
13. Jump and Loop/1. Using Conditions and Jumping.mp4
116.1 MB
13. Jump and Loop/1.1 A1 - code.txt
1.5 KB
13. Jump and Loop/10. Jump if below.mp4
33.3 MB
13. Jump and Loop/10.1 A10.txt
394 bytes
13. Jump and Loop/11. Jump if below or equal.mp4
30.5 MB
13. Jump and Loop/11.1 A11.txt
427 bytes
13. Jump and Loop/2. Jump if equal.mp4
36.3 MB
13. Jump and Loop/2.1 A2.txt
391 bytes
13. Jump and Loop/3. Jump if Not Equal.mp4
14.2 MB
13. Jump and Loop/3.1 A3.txt
431 bytes
13. Jump and Loop/4. Jump if Greater.mp4
29.0 MB
13. Jump and Loop/4.1 A4.txt
479 bytes
13. Jump and Loop/5. Greater than or Equal to.mp4
28.1 MB
13. Jump and Loop/5.1 A5.txt
516 bytes
13. Jump and Loop/6. Jump if Less.mp4
26.4 MB
13. Jump and Loop/6.1 A6.txt
400 bytes
13. Jump and Loop/7. Jump if less or equal.mp4
35.4 MB
13. Jump and Loop/7.1 A7.txt
483 bytes
13. Jump and Loop/8. Jump if Above.mp4
41.2 MB
13. Jump and Loop/8.1 A8.txt
500 bytes
13. Jump and Loop/9. Jump if Above or Equal.mp4
32.1 MB
13. Jump and Loop/9.1 A9.txt
452 bytes
14. Assembly Project using Jump and Loop/1. Developing Loop and Calculator Project with Assembly.mp4
26.9 MB
14. Assembly Project using Jump and Loop/1.1 a1.txt
507 bytes
14. Assembly Project using Jump and Loop/2. Testing our Project.mp4
65.3 MB
14. Assembly Project using Jump and Loop/2.1 a2.txt
521 bytes
15. Memory Manipulation/1. Project EXABYTE.mp4
201.6 MB
15. Memory Manipulation/1.1 a1.txt
1.7 KB
15. Memory Manipulation/2. Testing and Analyzing Project with Readelf and GDB.mp4
221.9 MB
16. Calculator with Assembly/1. Defining variables.mp4
63.5 MB
16. Calculator with Assembly/2. Addition and Subtraction.mp4
57.7 MB
16. Calculator with Assembly/2.1 a2.txt
1.6 KB
16. Calculator with Assembly/3. Last Decorations.mp4
84.1 MB
16. Calculator with Assembly/3.1 a3 - fixed.txt
3.5 KB
16. Calculator with Assembly/4. Explaining Registers in Practice.mp4
81.9 MB
16. Calculator with Assembly/4.1 a4.txt
13.5 KB
16. Calculator with Assembly/5. Completing Section.mp4
76.4 MB
16. Calculator with Assembly/5.1 a5.txt
3.5 KB
17. Starting with Ghidra/1. Opening project in Ghidra.mp4
84.6 MB
17. Starting with Ghidra/2. Discovering Ghidra.mp4
61.2 MB
18. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4
116.7 MB
18. Malware Analysis and Reverse Engineering with Ghidra/1.1 A1 M4lware Sample 1.zip
228.6 KB
18. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4
103.2 MB
18. Malware Analysis and Reverse Engineering with Ghidra/3. OSINT for Reverse Engineering.mp4
52.6 MB
18. Malware Analysis and Reverse Engineering with Ghidra/4. Analyzing Libraries that Malware Uses.mp4
23.1 MB
18. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4
121.5 MB
18. Malware Analysis and Reverse Engineering with Ghidra/6. Finding Entry Points and Changing Undefined Function Names.mp4
46.4 MB
19. IDA Pro IDA Freeware/1. Downloading and Installing IDA Pro _ IDA Freeware.mp4
66.9 MB
19. IDA Pro IDA Freeware/2. Being friends with IDA.mp4
55.5 MB
19. IDA Pro IDA Freeware/3. Useful Tabs in IDA.mp4
63.0 MB
2. Binary Analysis/1. Analysis of Binary and 4 Stages of Compilation.mp4
33.5 MB
2. Binary Analysis/2. Preprocessing.mp4
59.5 MB
2. Binary Analysis/3. Compilation Phase.mp4
38.7 MB
2. Binary Analysis/4. Assembly Phase.mp4
38.2 MB
2. Binary Analysis/5. Linking Phase.mp4
93.9 MB
3. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4
147.1 MB
3. Linux - ELF Format/2. Learning ELF Fields.mp4
128.8 MB
3. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4
155.5 MB
4. Windows - PE Format/1. Fundamentals of Windows PE Format.mp4
197.2 MB
5. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4
103.9 MB
5. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4
156.7 MB
5. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4
106.6 MB
5. Symbols, Stripped and Not Stripped Binaries/4. How binary loads and executes in theory.mp4
64.5 MB
6. Reverse Engineering and Malware Analysis - Installing Ghidra/1. Downloading Ghidra and File Structure.mp4
80.0 MB
6. Reverse Engineering and Malware Analysis - Installing Ghidra/2. Installing JDK in Linux.mp4
48.5 MB
6. Reverse Engineering and Malware Analysis - Installing Ghidra/3. Installing JDK in Windows or MacOS.mp4
32.1 MB
6. Reverse Engineering and Malware Analysis - Installing Ghidra/4. Installing SASM.mp4
82.1 MB
7. Writing our first 64Bit Assembly Program/1. Hello world with makefile.mp4
87.8 MB
7. Writing our first 64Bit Assembly Program/2. Why nasm is best and compare assemblers.mp4
18.4 MB
7. Writing our first 64Bit Assembly Program/3. Sticking to traditions - Hello world program without makefile.mp4
64.7 MB
8. Understanding Data Types/1. Understanding CPU architectures and Binaries.mp4
10.7 MB
8. Understanding Data Types/2. Converting Decimal to Binary with Basic Math.mp4
24.3 MB
9. Debugging x86-64/1. Starting gdb and setting flavors.mp4
97.6 MB
9. Debugging x86-64/2. Debugging and Finding Variables in Memory addresses.mp4
142.8 MB
9. Debugging x86-64/3. Learning more with GDB.mp4
109.9 MB
Similar Posts:
Category
Name
Uploaded
Other
Reverse Engineering: Cutter for Beginners
Jan. 29, 2023, 11:59 a.m.
Other
Reverse Engineering and Malware Analysis x64/32: CRMA+ 2022
Jan. 29, 2023, 5:49 p.m.
Other
Introduction to Android Reverse Engineering
Jan. 29, 2023, 7:34 p.m.
Other
Udemy - Learn Ethical Hacking and Reverse Engineering
Feb. 1, 2023, 12:11 a.m.
E-books
Gabhane C. Reverse Engineering with Terraform. An Introduction...2024
Jan. 23, 2024, 2:35 p.m.