Details for:

Type:
Files:
Size:

Uploaded On:
Added By:
Not Trusted

Seeders:
Leechers:
Info Hash:
BC06BBAAB5E407DCFF3735BF5CEC85CA28296DD9
  1. 1. Disassembly and Disassembler/1. The Disassembly Theory.mp4 35.3 MB
  2. 1. Disassembly and Disassembler/2. Disassembly - What.mp4 69.7 MB
  3. 10. Writing our second 64Bit Assembly Program/1. Coding ASM file.mp4 66.0 MB
  4. 10. Writing our second 64Bit Assembly Program/2. Analyzing Output with GDB and creating makefile.mp4 131.4 MB
  5. 11. OR XOR AND/1. The OR.mp4 15.3 MB
  6. 11. OR XOR AND/2. NOT.mp4 10.0 MB
  7. 11. OR XOR AND/3. XOR.mp4 14.2 MB
  8. 11. OR XOR AND/4. AND.mp4 20.5 MB
  9. 12. Data Display Debugger - DDD/1. Developing another Assembly Program to Analyze with DDD.mp4 87.0 MB
  10. 12. Data Display Debugger - DDD/2. Analyzing Previously Written Code.mp4 61.1 MB
  11. 12. Data Display Debugger - DDD/3. Using DDD and Analyzing RAX Values.mp4 96.3 MB
  12. 13. Jump and Loop/1. Using Conditions and Jumping.mp4 116.1 MB
  13. 13. Jump and Loop/1.1 A1 - code.txt 1.5 KB
  14. 13. Jump and Loop/10. Jump if below.mp4 33.3 MB
  15. 13. Jump and Loop/10.1 A10.txt 394 bytes
  16. 13. Jump and Loop/11. Jump if below or equal.mp4 30.5 MB
  17. 13. Jump and Loop/11.1 A11.txt 427 bytes
  18. 13. Jump and Loop/2. Jump if equal.mp4 36.3 MB
  19. 13. Jump and Loop/2.1 A2.txt 391 bytes
  20. 13. Jump and Loop/3. Jump if Not Equal.mp4 14.2 MB
  21. 13. Jump and Loop/3.1 A3.txt 431 bytes
  22. 13. Jump and Loop/4. Jump if Greater.mp4 29.0 MB
  23. 13. Jump and Loop/4.1 A4.txt 479 bytes
  24. 13. Jump and Loop/5. Greater than or Equal to.mp4 28.1 MB
  25. 13. Jump and Loop/5.1 A5.txt 516 bytes
  26. 13. Jump and Loop/6. Jump if Less.mp4 26.4 MB
  27. 13. Jump and Loop/6.1 A6.txt 400 bytes
  28. 13. Jump and Loop/7. Jump if less or equal.mp4 35.4 MB
  29. 13. Jump and Loop/7.1 A7.txt 483 bytes
  30. 13. Jump and Loop/8. Jump if Above.mp4 41.2 MB
  31. 13. Jump and Loop/8.1 A8.txt 500 bytes
  32. 13. Jump and Loop/9. Jump if Above or Equal.mp4 32.1 MB
  33. 13. Jump and Loop/9.1 A9.txt 452 bytes
  34. 14. Assembly Project using Jump and Loop/1. Developing Loop and Calculator Project with Assembly.mp4 26.9 MB
  35. 14. Assembly Project using Jump and Loop/1.1 a1.txt 507 bytes
  36. 14. Assembly Project using Jump and Loop/2. Testing our Project.mp4 65.3 MB
  37. 14. Assembly Project using Jump and Loop/2.1 a2.txt 521 bytes
  38. 15. Memory Manipulation/1. Project EXABYTE.mp4 201.6 MB
  39. 15. Memory Manipulation/1.1 a1.txt 1.7 KB
  40. 15. Memory Manipulation/2. Testing and Analyzing Project with Readelf and GDB.mp4 221.9 MB
  41. 16. Calculator with Assembly/1. Defining variables.mp4 63.5 MB
  42. 16. Calculator with Assembly/2. Addition and Subtraction.mp4 57.7 MB
  43. 16. Calculator with Assembly/2.1 a2.txt 1.6 KB
  44. 16. Calculator with Assembly/3. Last Decorations.mp4 84.1 MB
  45. 16. Calculator with Assembly/3.1 a3 - fixed.txt 3.5 KB
  46. 16. Calculator with Assembly/4. Explaining Registers in Practice.mp4 81.9 MB
  47. 16. Calculator with Assembly/4.1 a4.txt 13.5 KB
  48. 16. Calculator with Assembly/5. Completing Section.mp4 76.4 MB
  49. 16. Calculator with Assembly/5.1 a5.txt 3.5 KB
  50. 17. Starting with Ghidra/1. Opening project in Ghidra.mp4 84.6 MB
  51. 17. Starting with Ghidra/2. Discovering Ghidra.mp4 61.2 MB
  52. 18. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4 116.7 MB
  53. 18. Malware Analysis and Reverse Engineering with Ghidra/1.1 A1 M4lware Sample 1.zip 228.6 KB
  54. 18. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4 103.2 MB
  55. 18. Malware Analysis and Reverse Engineering with Ghidra/3. OSINT for Reverse Engineering.mp4 52.6 MB
  56. 18. Malware Analysis and Reverse Engineering with Ghidra/4. Analyzing Libraries that Malware Uses.mp4 23.1 MB
  57. 18. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4 121.5 MB
  58. 18. Malware Analysis and Reverse Engineering with Ghidra/6. Finding Entry Points and Changing Undefined Function Names.mp4 46.4 MB
  59. 19. IDA Pro IDA Freeware/1. Downloading and Installing IDA Pro _ IDA Freeware.mp4 66.9 MB
  60. 19. IDA Pro IDA Freeware/2. Being friends with IDA.mp4 55.5 MB
  61. 19. IDA Pro IDA Freeware/3. Useful Tabs in IDA.mp4 63.0 MB
  62. 2. Binary Analysis/1. Analysis of Binary and 4 Stages of Compilation.mp4 33.5 MB
  63. 2. Binary Analysis/2. Preprocessing.mp4 59.5 MB
  64. 2. Binary Analysis/3. Compilation Phase.mp4 38.7 MB
  65. 2. Binary Analysis/4. Assembly Phase.mp4 38.2 MB
  66. 2. Binary Analysis/5. Linking Phase.mp4 93.9 MB
  67. 3. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 147.1 MB
  68. 3. Linux - ELF Format/2. Learning ELF Fields.mp4 128.8 MB
  69. 3. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4 155.5 MB
  70. 4. Windows - PE Format/1. Fundamentals of Windows PE Format.mp4 197.2 MB
  71. 5. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4 103.9 MB
  72. 5. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4 156.7 MB
  73. 5. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4 106.6 MB
  74. 5. Symbols, Stripped and Not Stripped Binaries/4. How binary loads and executes in theory.mp4 64.5 MB
  75. 6. Reverse Engineering and Malware Analysis - Installing Ghidra/1. Downloading Ghidra and File Structure.mp4 80.0 MB
  76. 6. Reverse Engineering and Malware Analysis - Installing Ghidra/2. Installing JDK in Linux.mp4 48.5 MB
  77. 6. Reverse Engineering and Malware Analysis - Installing Ghidra/3. Installing JDK in Windows or MacOS.mp4 32.1 MB
  78. 6. Reverse Engineering and Malware Analysis - Installing Ghidra/4. Installing SASM.mp4 82.1 MB
  79. 7. Writing our first 64Bit Assembly Program/1. Hello world with makefile.mp4 87.8 MB
  80. 7. Writing our first 64Bit Assembly Program/2. Why nasm is best and compare assemblers.mp4 18.4 MB
  81. 7. Writing our first 64Bit Assembly Program/3. Sticking to traditions - Hello world program without makefile.mp4 64.7 MB
  82. 8. Understanding Data Types/1. Understanding CPU architectures and Binaries.mp4 10.7 MB
  83. 8. Understanding Data Types/2. Converting Decimal to Binary with Basic Math.mp4 24.3 MB
  84. 9. Debugging x86-64/1. Starting gdb and setting flavors.mp4 97.6 MB
  85. 9. Debugging x86-64/2. Debugging and Finding Variables in Memory addresses.mp4 142.8 MB
  86. 9. Debugging x86-64/3. Learning more with GDB.mp4 109.9 MB

Similar Posts:

  1. Other Reverse Engineering: Cutter for Beginners Jan. 29, 2023, 11:59 a.m.
  2. Other Reverse Engineering and Malware Analysis x64/32: CRMA+ 2022 Jan. 29, 2023, 5:49 p.m.
  3. Other Introduction to Android Reverse Engineering Jan. 29, 2023, 7:34 p.m.
  4. Other Udemy - Learn Ethical Hacking and Reverse Engineering Feb. 1, 2023, 12:11 a.m.
  5. E-books Gabhane C. Reverse Engineering with Terraform. An Introduction...2024 Jan. 23, 2024, 2:35 p.m.