|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585б |
| 0 |
4б |
| 001 Dynamic Analysis of .NET Trojan - Part 1.en.srt |
7.65Кб |
| 001 Dynamic Analysis of .NET Trojan - Part 1.mp4 |
50.61Мб |
| 001 Installing dnSpy.en.srt |
4.82Кб |
| 001 Installing dnSpy.mp4 |
32.12Мб |
| 001 Installing ILDASM and ILASM.en.srt |
5.01Кб |
| 001 Installing ILDASM and ILASM.mp4 |
39.16Мб |
| 001 Introduction.en.srt |
3.28Кб |
| 001 Introduction.mp4 |
40.79Мб |
| 001 Lab Demo Instructions on Reverse Engineering .NET executables.en.srt |
2.14Кб |
| 001 Lab Demo Instructions on Reverse Engineering .NET executables.mp4 |
8.03Мб |
| 001 Lab Exercise_ Principles of Analyzing a .NET Ransomware.en.srt |
6.18Кб |
| 001 Lab Exercise_ Principles of Analyzing a .NET Ransomware.mp4 |
23.68Мб |
| 001 Principles of .NET Analysis.en.srt |
8.47Кб |
| 001 Principles of .NET Analysis.mp4 |
35.20Мб |
| 001 Principles of .NET and Java Malware Analysis.en.srt |
7.24Кб |
| 001 Principles of .NET and Java Malware Analysis.mp4 |
31.85Мб |
| 001 Principles of Analyzing a Java RAT.en.srt |
1.96Кб |
| 001 Principles of Analyzing a Java RAT.mp4 |
7.12Мб |
| 001 Principles of Java Bytecodes.en.srt |
7.22Кб |
| 001 Principles of Java Bytecodes.mp4 |
28.60Мб |
| 001 Reverse Engineering Java Binary Using ByteCode Viewer.en.srt |
2.84Кб |
| 001 Reverse Engineering Java Binary Using ByteCode Viewer.mp4 |
18.03Мб |
| 001 Using dnSpy for the first time.en.srt |
13.13Кб |
| 001 Using dnSpy for the first time.mp4 |
90.44Мб |
| 001 Where to Download Malware Samples to Practice Malware Analysis.en.srt |
1.25Кб |
| 001 Where to Download Malware Samples to Practice Malware Analysis.mp4 |
12.25Мб |
| 002 Analyzing Java ByteCodes by Disassembling.en.srt |
4.44Кб |
| 002 Analyzing Java ByteCodes by Disassembling.mp4 |
24.39Мб |
| 002 Bonus Lecture.en.srt |
1.61Кб |
| 002 Bonus Lecture.mp4 |
10.61Мб |
| 002 Dynamic Analysis of .NET Trojan - Part 2.en.srt |
6.55Кб |
| 002 Dynamic Analysis of .NET Trojan - Part 2.mp4 |
74.75Мб |
| 002 Install a Virtual Machine.en.srt |
9.08Кб |
| 002 Install a Virtual Machine.mp4 |
77.62Мб |
| 002 Lab_ Reverse Engineering .NET Ransomware - Part 1.en.srt |
12.43Кб |
| 002 Lab_ Reverse Engineering .NET Ransomware - Part 1.mp4 |
102.31Мб |
| 002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.en.srt |
7.95Кб |
| 002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.mp4 |
49.16Мб |
| 002 Lab Demo Walkthrough_ Reverse Engineering .NET.en.srt |
13.26Кб |
| 002 Lab Demo Walkthrough_ Reverse Engineering .NET.mp4 |
102.67Мб |
| 002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).en.srt |
8.72Кб |
| 002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).mp4 |
58.78Мб |
| 002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.en.srt |
9.96Кб |
| 002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.mp4 |
97.63Мб |
| 002 Lab Setup-v3.pdf |
56.73Кб |
| 002 windows 7 download links - v3.txt |
373б |
| 003 Configuring the Virtual Machine.en.srt |
12.65Кб |
| 003 Configuring the Virtual Machine.mp4 |
152.36Мб |
| 003 Lab_ Reverse Engineering .NET Ransomware - Part 2.en.srt |
6.70Кб |
| 003 Lab_ Reverse Engineering .NET Ransomware - Part 2.mp4 |
70.75Мб |
| 003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.en.srt |
11.20Кб |
| 003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.mp4 |
94.54Мб |
| 004 flarevm.txt |
55б |
| 004 Installing Tools_ FlareVM.en.srt |
3.94Кб |
| 004 Installing Tools_ FlareVM.mp4 |
59.63Мб |
| 005 principles of dotnet and java malware analysis.pdf |
728.32Кб |
| 006 download link for visual studio.txt |
109б |
| 007 List of CIL Instructions.txt |
83б |
| 007 Principles of .NET Analysis-v2.pdf |
510.86Кб |
| 008 dotnet_demo1.zip |
2.13Кб |
| 008 password.txt |
61б |
| 009 dnSpy link.txt |
196б |
| 010 dotnet_demo1.zip |
2.13Кб |
| 010 password.txt |
61б |
| 011 Lab Demo - reversing dotnet binary.pdf |
465.26Кб |
| 011 password.txt |
66б |
| 011 PS_DotNet_Lab1.zip |
5.79Кб |
| 013 password.txt |
145б |
| 013 Principles of Analyzing dotNet Ransomware.pdf |
539.44Кб |
| 013 PS_DotNet_RealWorld_Ransomware.zip |
16.72Кб |
| 016 lab1-dotnet-trojan.zip |
455.55Кб |
| 016 password.txt |
70б |
| 018 hello-earth-proj.zip |
462б |
| 018 password.txt |
79б |
| 018 principles of java bytecode.pdf |
753.59Кб |
| 021 password.txt |
74б |
| 021 PS_Java_Demo1_Jar.zip |
3.50Кб |
| 022 password.txt |
75б |
| 022 PS_Java_Lab_01_Jar.zip |
203.35Кб |
| 023 Java_RealWorld-CrossRAT.zip |
211.27Кб |
| 023 password.txt |
85б |
| 023 Principles of Analyzing Java RAT.pdf |
430.76Кб |
| 025 malware samples urls.txt |
594б |
| 026 useful-resources-for-further-study-2021.pdf |
668.72Кб |
| 1 |
5б |
| 10 |
227.24Кб |
| 11 |
397.71Кб |
| 12 |
346.14Кб |
| 13 |
214.57Кб |
| 14 |
347.45Кб |
| 15 |
302.84Кб |
| 16 |
389.05Кб |
| 17 |
158.45Кб |
| 18 |
408.65Кб |
| 19 |
112.56Кб |
| 2 |
186.62Кб |
| 20 |
331.70Кб |
| 21 |
23.97Кб |
| 22 |
255.20Кб |
| 23 |
397.69Кб |
| 24 |
47.29Кб |
| 25 |
389.35Кб |
| 26 |
270.41Кб |
| 27 |
295.68Кб |
| 28 |
355.28Кб |
| 29 |
484.56Кб |
| 3 |
173.44Кб |
| 4 |
6.99Кб |
| 5 |
63.29Кб |
| 6 |
389.70Кб |
| 7 |
253.49Кб |
| 8 |
251.23Кб |
| 9 |
383.71Кб |
| TutsNode.com.txt |
63б |