|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
4B |
| 001 Dynamic Analysis of .NET Trojan - Part 1.en.srt |
7.65KB |
| 001 Dynamic Analysis of .NET Trojan - Part 1.mp4 |
50.61MB |
| 001 Installing dnSpy.en.srt |
4.82KB |
| 001 Installing dnSpy.mp4 |
32.12MB |
| 001 Installing ILDASM and ILASM.en.srt |
5.01KB |
| 001 Installing ILDASM and ILASM.mp4 |
39.16MB |
| 001 Introduction.en.srt |
3.28KB |
| 001 Introduction.mp4 |
40.79MB |
| 001 Lab Demo Instructions on Reverse Engineering .NET executables.en.srt |
2.14KB |
| 001 Lab Demo Instructions on Reverse Engineering .NET executables.mp4 |
8.03MB |
| 001 Lab Exercise_ Principles of Analyzing a .NET Ransomware.en.srt |
6.18KB |
| 001 Lab Exercise_ Principles of Analyzing a .NET Ransomware.mp4 |
23.68MB |
| 001 Principles of .NET Analysis.en.srt |
8.47KB |
| 001 Principles of .NET Analysis.mp4 |
35.20MB |
| 001 Principles of .NET and Java Malware Analysis.en.srt |
7.24KB |
| 001 Principles of .NET and Java Malware Analysis.mp4 |
31.85MB |
| 001 Principles of Analyzing a Java RAT.en.srt |
1.96KB |
| 001 Principles of Analyzing a Java RAT.mp4 |
7.12MB |
| 001 Principles of Java Bytecodes.en.srt |
7.22KB |
| 001 Principles of Java Bytecodes.mp4 |
28.60MB |
| 001 Reverse Engineering Java Binary Using ByteCode Viewer.en.srt |
2.84KB |
| 001 Reverse Engineering Java Binary Using ByteCode Viewer.mp4 |
18.03MB |
| 001 Using dnSpy for the first time.en.srt |
13.13KB |
| 001 Using dnSpy for the first time.mp4 |
90.44MB |
| 001 Where to Download Malware Samples to Practice Malware Analysis.en.srt |
1.25KB |
| 001 Where to Download Malware Samples to Practice Malware Analysis.mp4 |
12.25MB |
| 002 Analyzing Java ByteCodes by Disassembling.en.srt |
4.44KB |
| 002 Analyzing Java ByteCodes by Disassembling.mp4 |
24.39MB |
| 002 Bonus Lecture.en.srt |
1.61KB |
| 002 Bonus Lecture.mp4 |
10.61MB |
| 002 Dynamic Analysis of .NET Trojan - Part 2.en.srt |
6.55KB |
| 002 Dynamic Analysis of .NET Trojan - Part 2.mp4 |
74.75MB |
| 002 Install a Virtual Machine.en.srt |
9.08KB |
| 002 Install a Virtual Machine.mp4 |
77.62MB |
| 002 Lab_ Reverse Engineering .NET Ransomware - Part 1.en.srt |
12.43KB |
| 002 Lab_ Reverse Engineering .NET Ransomware - Part 1.mp4 |
102.31MB |
| 002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.en.srt |
7.95KB |
| 002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.mp4 |
49.16MB |
| 002 Lab Demo Walkthrough_ Reverse Engineering .NET.en.srt |
13.26KB |
| 002 Lab Demo Walkthrough_ Reverse Engineering .NET.mp4 |
102.67MB |
| 002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).en.srt |
8.72KB |
| 002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).mp4 |
58.78MB |
| 002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.en.srt |
9.96KB |
| 002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.mp4 |
97.63MB |
| 002 Lab Setup-v3.pdf |
56.73KB |
| 002 windows 7 download links - v3.txt |
373B |
| 003 Configuring the Virtual Machine.en.srt |
12.65KB |
| 003 Configuring the Virtual Machine.mp4 |
152.36MB |
| 003 Lab_ Reverse Engineering .NET Ransomware - Part 2.en.srt |
6.70KB |
| 003 Lab_ Reverse Engineering .NET Ransomware - Part 2.mp4 |
70.75MB |
| 003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.en.srt |
11.20KB |
| 003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.mp4 |
94.54MB |
| 004 flarevm.txt |
55B |
| 004 Installing Tools_ FlareVM.en.srt |
3.94KB |
| 004 Installing Tools_ FlareVM.mp4 |
59.63MB |
| 005 principles of dotnet and java malware analysis.pdf |
728.32KB |
| 006 download link for visual studio.txt |
109B |
| 007 List of CIL Instructions.txt |
83B |
| 007 Principles of .NET Analysis-v2.pdf |
510.86KB |
| 008 dotnet_demo1.zip |
2.13KB |
| 008 password.txt |
61B |
| 009 dnSpy link.txt |
196B |
| 010 dotnet_demo1.zip |
2.13KB |
| 010 password.txt |
61B |
| 011 Lab Demo - reversing dotnet binary.pdf |
465.26KB |
| 011 password.txt |
66B |
| 011 PS_DotNet_Lab1.zip |
5.79KB |
| 013 password.txt |
145B |
| 013 Principles of Analyzing dotNet Ransomware.pdf |
539.44KB |
| 013 PS_DotNet_RealWorld_Ransomware.zip |
16.72KB |
| 016 lab1-dotnet-trojan.zip |
455.55KB |
| 016 password.txt |
70B |
| 018 hello-earth-proj.zip |
462B |
| 018 password.txt |
79B |
| 018 principles of java bytecode.pdf |
753.59KB |
| 021 password.txt |
74B |
| 021 PS_Java_Demo1_Jar.zip |
3.50KB |
| 022 password.txt |
75B |
| 022 PS_Java_Lab_01_Jar.zip |
203.35KB |
| 023 Java_RealWorld-CrossRAT.zip |
211.27KB |
| 023 password.txt |
85B |
| 023 Principles of Analyzing Java RAT.pdf |
430.76KB |
| 025 malware samples urls.txt |
594B |
| 026 useful-resources-for-further-study-2021.pdf |
668.72KB |
| 1 |
5B |
| 10 |
227.24KB |
| 11 |
397.71KB |
| 12 |
346.14KB |
| 13 |
214.57KB |
| 14 |
347.45KB |
| 15 |
302.84KB |
| 16 |
389.05KB |
| 17 |
158.45KB |
| 18 |
408.65KB |
| 19 |
112.56KB |
| 2 |
186.62KB |
| 20 |
331.70KB |
| 21 |
23.97KB |
| 22 |
255.20KB |
| 23 |
397.69KB |
| 24 |
47.29KB |
| 25 |
389.35KB |
| 26 |
270.41KB |
| 27 |
295.68KB |
| 28 |
355.28KB |
| 29 |
484.56KB |
| 3 |
173.44KB |
| 4 |
6.99KB |
| 5 |
63.29KB |
| 6 |
389.70KB |
| 7 |
253.49KB |
| 8 |
251.23KB |
| 9 |
383.71KB |
| TutsNode.com.txt |
63B |