Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
4б |
001 Dynamic Analysis of .NET Trojan - Part 1.en.srt |
7.65Кб |
001 Dynamic Analysis of .NET Trojan - Part 1.mp4 |
50.61Мб |
001 Installing dnSpy.en.srt |
4.82Кб |
001 Installing dnSpy.mp4 |
32.12Мб |
001 Installing ILDASM and ILASM.en.srt |
5.01Кб |
001 Installing ILDASM and ILASM.mp4 |
39.16Мб |
001 Introduction.en.srt |
3.28Кб |
001 Introduction.mp4 |
40.79Мб |
001 Lab Demo Instructions on Reverse Engineering .NET executables.en.srt |
2.14Кб |
001 Lab Demo Instructions on Reverse Engineering .NET executables.mp4 |
8.03Мб |
001 Lab Exercise_ Principles of Analyzing a .NET Ransomware.en.srt |
6.18Кб |
001 Lab Exercise_ Principles of Analyzing a .NET Ransomware.mp4 |
23.68Мб |
001 Principles of .NET Analysis.en.srt |
8.47Кб |
001 Principles of .NET Analysis.mp4 |
35.20Мб |
001 Principles of .NET and Java Malware Analysis.en.srt |
7.24Кб |
001 Principles of .NET and Java Malware Analysis.mp4 |
31.85Мб |
001 Principles of Analyzing a Java RAT.en.srt |
1.96Кб |
001 Principles of Analyzing a Java RAT.mp4 |
7.12Мб |
001 Principles of Java Bytecodes.en.srt |
7.22Кб |
001 Principles of Java Bytecodes.mp4 |
28.60Мб |
001 Reverse Engineering Java Binary Using ByteCode Viewer.en.srt |
2.84Кб |
001 Reverse Engineering Java Binary Using ByteCode Viewer.mp4 |
18.03Мб |
001 Using dnSpy for the first time.en.srt |
13.13Кб |
001 Using dnSpy for the first time.mp4 |
90.44Мб |
001 Where to Download Malware Samples to Practice Malware Analysis.en.srt |
1.25Кб |
001 Where to Download Malware Samples to Practice Malware Analysis.mp4 |
12.25Мб |
002 Analyzing Java ByteCodes by Disassembling.en.srt |
4.44Кб |
002 Analyzing Java ByteCodes by Disassembling.mp4 |
24.39Мб |
002 Bonus Lecture.en.srt |
1.61Кб |
002 Bonus Lecture.mp4 |
10.61Мб |
002 Dynamic Analysis of .NET Trojan - Part 2.en.srt |
6.55Кб |
002 Dynamic Analysis of .NET Trojan - Part 2.mp4 |
74.75Мб |
002 Install a Virtual Machine.en.srt |
9.08Кб |
002 Install a Virtual Machine.mp4 |
77.62Мб |
002 Lab_ Reverse Engineering .NET Ransomware - Part 1.en.srt |
12.43Кб |
002 Lab_ Reverse Engineering .NET Ransomware - Part 1.mp4 |
102.31Мб |
002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.en.srt |
7.95Кб |
002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.mp4 |
49.16Мб |
002 Lab Demo Walkthrough_ Reverse Engineering .NET.en.srt |
13.26Кб |
002 Lab Demo Walkthrough_ Reverse Engineering .NET.mp4 |
102.67Мб |
002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).en.srt |
8.72Кб |
002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).mp4 |
58.78Мб |
002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.en.srt |
9.96Кб |
002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.mp4 |
97.63Мб |
002 Lab Setup-v3.pdf |
56.73Кб |
002 windows 7 download links - v3.txt |
373б |
003 Configuring the Virtual Machine.en.srt |
12.65Кб |
003 Configuring the Virtual Machine.mp4 |
152.36Мб |
003 Lab_ Reverse Engineering .NET Ransomware - Part 2.en.srt |
6.70Кб |
003 Lab_ Reverse Engineering .NET Ransomware - Part 2.mp4 |
70.75Мб |
003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.en.srt |
11.20Кб |
003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.mp4 |
94.54Мб |
004 flarevm.txt |
55б |
004 Installing Tools_ FlareVM.en.srt |
3.94Кб |
004 Installing Tools_ FlareVM.mp4 |
59.63Мб |
005 principles of dotnet and java malware analysis.pdf |
728.32Кб |
006 download link for visual studio.txt |
109б |
007 List of CIL Instructions.txt |
83б |
007 Principles of .NET Analysis-v2.pdf |
510.86Кб |
008 dotnet_demo1.zip |
2.13Кб |
008 password.txt |
61б |
009 dnSpy link.txt |
196б |
010 dotnet_demo1.zip |
2.13Кб |
010 password.txt |
61б |
011 Lab Demo - reversing dotnet binary.pdf |
465.26Кб |
011 password.txt |
66б |
011 PS_DotNet_Lab1.zip |
5.79Кб |
013 password.txt |
145б |
013 Principles of Analyzing dotNet Ransomware.pdf |
539.44Кб |
013 PS_DotNet_RealWorld_Ransomware.zip |
16.72Кб |
016 lab1-dotnet-trojan.zip |
455.55Кб |
016 password.txt |
70б |
018 hello-earth-proj.zip |
462б |
018 password.txt |
79б |
018 principles of java bytecode.pdf |
753.59Кб |
021 password.txt |
74б |
021 PS_Java_Demo1_Jar.zip |
3.50Кб |
022 password.txt |
75б |
022 PS_Java_Lab_01_Jar.zip |
203.35Кб |
023 Java_RealWorld-CrossRAT.zip |
211.27Кб |
023 password.txt |
85б |
023 Principles of Analyzing Java RAT.pdf |
430.76Кб |
025 malware samples urls.txt |
594б |
026 useful-resources-for-further-study-2021.pdf |
668.72Кб |
1 |
5б |
10 |
227.24Кб |
11 |
397.71Кб |
12 |
346.14Кб |
13 |
214.57Кб |
14 |
347.45Кб |
15 |
302.84Кб |
16 |
389.05Кб |
17 |
158.45Кб |
18 |
408.65Кб |
19 |
112.56Кб |
2 |
186.62Кб |
20 |
331.70Кб |
21 |
23.97Кб |
22 |
255.20Кб |
23 |
397.69Кб |
24 |
47.29Кб |
25 |
389.35Кб |
26 |
270.41Кб |
27 |
295.68Кб |
28 |
355.28Кб |
29 |
484.56Кб |
3 |
173.44Кб |
4 |
6.99Кб |
5 |
63.29Кб |
6 |
389.70Кб |
7 |
253.49Кб |
8 |
251.23Кб |
9 |
383.71Кб |
TutsNode.com.txt |
63б |