FreeCourseSite com Udemy Reverse Engineering Malware Analysis in 21 Hours REMAC |
||
Name |
[FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+ |
DOWNLOAD
Copy Link
Trouble downloading? see How To |
Total Size |
9.7 GB |
|
Total Files |
254 |
|
Last Seen |
2025-07-20 23:48 |
|
Hash |
185A2FB8D707BE2C01B3190D02E8296253B86A9E |
/0. Websites you may like/ |
|
|
0.1 KB |
|
0.1 KB |
|
0.0 KB |
/1. Introduction/ |
|
|
37.0 MB |
|
73.2 MB |
/10. Linux for Reverse Engineering and Malware Analysis/ |
|
|
79.1 MB |
|
49.9 MB |
|
29.3 MB |
|
61.4 MB |
/11. Starting with Linux Terminal/ |
|
|
81.1 MB |
|
81.2 MB |
|
65.1 MB |
|
68.2 MB |
/12. Starting with Linux Shell and Exploring Linux System/ |
|
|
54.9 MB |
|
18.4 MB |
|
55.9 MB |
|
63.2 MB |
|
16.7 MB |
|
49.5 MB |
|
65.0 MB |
|
43.1 MB |
|
30.3 MB |
|
83.8 MB |
|
33.6 MB |
|
37.0 MB |
/.../0. Websites you may like/ |
|
|
0.1 KB |
|
0.1 KB |
|
0.0 KB |
/13. Permissions/ |
|
|
21.2 MB |
|
38.8 MB |
|
91.0 MB |
|
18.6 MB |
|
0.7 KB |
5. After this video you'll understand all LINUX Permissions.mp4 |
147.8 MB |
|
0.7 KB |
|
97.7 MB |
/14. Managing Processes and Packages in Linux/ |
|
|
65.7 MB |
|
63.7 MB |
|
51.5 MB |
|
86.4 MB |
|
98.3 MB |
|
47.0 MB |
|
25.7 MB |
|
81.7 MB |
|
50.3 MB |
|
22.9 MB |
|
72.8 MB |
/15. C++ for Reverse Engineering - Section 1/ |
|
|
43.3 MB |
|
0.5 KB |
|
30.1 MB |
|
0.5 KB |
|
88.1 MB |
|
1.2 KB |
|
132.6 MB |
|
1.8 KB |
|
64.3 MB |
|
63.1 MB |
|
0.6 KB |
|
47.8 MB |
|
1.2 KB |
|
60.0 MB |
|
0.5 KB |
|
28.4 MB |
|
0.3 KB |
|
76.0 MB |
|
0.5 KB |
|
29.8 MB |
|
0.5 KB |
|
36.6 MB |
|
0.4 KB |
|
23.5 MB |
|
0.3 KB |
/16. Variable Types in Programming CC++/ |
|
|
74.8 MB |
|
0.4 KB |
2. Floating Point types in CPP - Float, Double, Long Double.mp4 |
87.5 MB |
2.1 A2 - Floating Point types in CPP - Float, Double, Long Double.txt |
0.7 KB |
|
97.3 MB |
|
1.0 KB |
|
64.5 MB |
|
1.0 KB |
|
0.5 KB |
|
97.1 MB |
|
0.7 KB |
|
18.0 MB |
|
0.2 KB |
|
101.9 MB |
|
0.4 KB |
|
50.1 MB |
|
0.6 KB |
/17. How Conditional Statements work Reverse Engineering and C/ |
|
|
96.9 MB |
|
1.2 KB |
|
115.4 MB |
|
0.9 KB |
|
50.9 MB |
|
0.3 KB |
|
15.1 MB |
|
0.3 KB |
|
0.3 KB |
|
22.0 MB |
|
0.3 KB |
|
14.3 MB |
|
0.3 KB |
/18. Introduction to CPP Classes/ |
|
|
46.6 MB |
|
0.5 KB |
|
30.5 MB |
|
0.4 KB |
|
50.6 MB |
|
0.6 KB |
|
32.7 MB |
|
0.6 KB |
|
26.1 MB |
|
11.8 MB |
|
63.1 MB |
/.../0. Websites you may like/ |
|
|
0.1 KB |
|
0.1 KB |
|
0.0 KB |
/19. Introduction to Pointers/ |
|
|
104.6 MB |
|
0.4 KB |
|
18.9 MB |
|
0.3 KB |
|
23.9 MB |
|
0.3 KB |
|
43.0 MB |
|
0.3 KB |
|
65.7 MB |
|
0.9 KB |
|
65.9 MB |
|
0.4 KB |
|
19.3 MB |
|
52.2 MB |
|
0.5 KB |
|
31.2 MB |
7.1 C1 - Arrays out of bounds and Deallocating Pointers=.txt |
0.3 KB |
|
47.4 MB |
|
0.8 KB |
|
23.8 MB |
/.../0. Websites you may like/ |
|
|
0.1 KB |
|
0.1 KB |
|
0.0 KB |
/2. Installing Ghidra for Reverse Engineering and Malware Analysis/ |
|
|
84.0 MB |
|
50.9 MB |
|
33.7 MB |
/20. STL and References in C++/ |
|
|
59.9 MB |
|
35.3 MB |
|
0.5 KB |
|
33.6 MB |
|
94.3 MB |
|
1.0 KB |
|
53.7 MB |
|
0.7 KB |
/21. Pointer and Functions Reverse Engineering and Malware Analysis/ |
|
|
25.5 MB |
|
0.4 KB |
|
41.1 MB |
|
0.5 KB |
|
0.5 KB |
|
17.6 MB |
|
60.5 MB |
|
0.7 KB |
|
27.0 MB |
|
1.0 KB |
|
36.7 MB |
|
1.3 KB |
|
36.9 MB |
|
0.2 KB |
|
27.0 MB |
|
0.2 KB |
|
46.9 MB |
|
0.5 KB |
|
43.7 MB |
|
0.2 KB |
|
51.5 MB |
|
0.5 KB |
/22. Data Structures in CC++/ |
|
|
60.3 MB |
|
0.3 KB |
|
20.9 MB |
|
71.1 MB |
|
0.6 KB |
|
55.8 MB |
|
1.0 KB |
|
16.8 MB |
|
1.4 KB |
|
28.3 MB |
|
1.4 KB |
|
107.7 MB |
2.1 A2 - Creating Random Card Generator Using Enum and rand.txt |
1.9 KB |
|
75.2 MB |
|
2.2 KB |
|
17.0 MB |
|
70.9 MB |
|
0.4 KB |
|
60.0 MB |
|
0.6 KB |
|
40.6 MB |
|
56.1 MB |
|
1.2 KB |
|
122.4 MB |
|
1.4 KB |
/23. ADT and Nodes in C++ for Reverse Engineering/ |
|
|
70.2 MB |
|
0.3 KB |
|
52.5 MB |
|
2.8 KB |
|
126.3 MB |
|
4.1 KB |
|
53.9 MB |
|
0.3 KB |
|
71.8 MB |
|
1.2 KB |
|
127.2 MB |
|
107.9 MB |
|
0.6 KB |
6. Creating and Chaining nodes with Different data types.mp4 |
76.6 MB |
6.1 A2 - Creating and Chaining nodes with Different data types.txt |
0.6 KB |
|
91.4 MB |
|
1.2 KB |
|
48.2 MB |
|
1.2 KB |
|
155.9 MB |
9.1 A3 - Developing InsertHead, InsertTail and Insert Methods.txt |
2.5 KB |
/24. Learning ARRAYS for Reverse Engineering and Malware Analysis/ |
|
|
49.8 MB |
|
0.3 KB |
|
63.8 MB |
|
0.5 KB |
|
63.2 MB |
|
0.3 KB |
|
51.6 MB |
|
0.3 KB |
/3. Starting with Ghidra/ |
|
|
88.6 MB |
|
64.2 MB |
/4. Malware Analysis and Reverse Engineering with Ghidra/ |
|
|
122.3 MB |
|
0.1 KB |
|
108.2 MB |
|
55.1 MB |
|
24.2 MB |
|
127.5 MB |
6. Finding Entry Points and Changing Undefined Function Names.mp4 |
48.7 MB |
/5. Binary Analysis/ |
|
|
35.1 MB |
|
62.3 MB |
|
40.6 MB |
|
40.0 MB |
|
98.5 MB |
/6. Symbols, Stripped and Not Stripped Binaries/ |
|
|
108.8 MB |
|
164.3 MB |
|
112.0 MB |
|
67.6 MB |
/.../0. Websites you may like/ |
|
|
0.1 KB |
|
0.1 KB |
|
0.0 KB |
/7. Linux - ELF Format/ |
|
1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 |
154.3 MB |
|
135.0 MB |
|
163.0 MB |
/8. Windows - PE Format/ |
|
|
206.8 MB |
/9. IDA Pro IDA Freeware/ |
|
|
70.2 MB |
|
58.2 MB |
|
66.1 MB |
Total files 254 |
Copyright © 2025 FileMood.com