FileMood

Download Malware Analysis- Identifying and Defeating Code Obfuscation

Malware Analysis Identifying and Defeating Code Obfuscation

Name

Malware Analysis- Identifying and Defeating Code Obfuscation

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

375.1 MB

Total Files

73

Last Seen

2025-07-27 01:08

Hash

455E6292C8C27CF10796C039613CC10A18658F6B

/01. Course Overview/

01. Course Overview.mp4

4.4 MB

01. Course Overview.srt

3.5 KB

/02. How Obfuscation Affects Your Analysis/

01. Module Introduction.mp4

1.3 MB

01. Module Introduction.srt

1.4 KB

02. Understanding Code Obfuscation.mp4

5.3 MB

02. Understanding Code Obfuscation.srt

5.3 KB

03. How Obfuscation Impacts Analysis.mp4

15.0 MB

03. How Obfuscation Impacts Analysis.srt

12.6 KB

04. What You Should Know.mp4

6.7 MB

04. What You Should Know.srt

6.3 KB

05. Conclusion.mp4

1.1 MB

05. Conclusion.srt

1.3 KB

/03. Detecting and Defeating Code Obfuscation in Interpreted Code/

01. Module Introduction.mp4

1.4 MB

01. Module Introduction.srt

1.5 KB

02. Prevalent Obfuscation Techniques.mp4

8.4 MB

02. Prevalent Obfuscation Techniques.srt

7.4 KB

03. Obfuscation in Visual Basic for Applications (VBA).mp4

24.9 MB

03. Obfuscation in Visual Basic for Applications (VBA).srt

15.1 KB

04. Demo- Defeating VBA Obfuscation.mp4

21.8 MB

04. Demo- Defeating VBA Obfuscation.srt

15.3 KB

05. Obfuscation in PowerShell.mp4

4.3 MB

05. Obfuscation in PowerShell.srt

4.1 KB

06. Demo- Defeating PowerShell Obfuscation.mp4

19.9 MB

06. Demo- Defeating PowerShell Obfuscation.srt

11.9 KB

07. Lab- Performing Comprehensive Analysis.mp4

20.3 MB

07. Lab- Performing Comprehensive Analysis.srt

11.6 KB

08. Conclusion.mp4

2.1 MB

08. Conclusion.srt

2.4 KB

/04. Detecting and Defeating String Obfuscation in Native Code/

01. Module Introduction.mp4

1.1 MB

01. Module Introduction.srt

1.0 KB

02. Differences from Interpreted Code.mp4

6.3 MB

02. Differences from Interpreted Code.srt

6.4 KB

03. String Obfuscation.mp4

11.3 MB

03. String Obfuscation.srt

9.7 KB

04. Demo- Identifying String Obfuscation.mp4

20.3 MB

04. Demo- Identifying String Obfuscation.srt

12.7 KB

05. Lab- Defeating String Obfuscation.mp4

23.2 MB

05. Lab- Defeating String Obfuscation.srt

15.0 KB

06. Conclusion.mp4

1.1 MB

06. Conclusion.srt

1.4 KB

/05. Detecting and Defeating Function Obfuscation in Native Code/

01. Module Introduction.mp4

1.6 MB

01. Module Introduction.srt

1.5 KB

02. Constructing an Import Table.mp4

3.0 MB

02. Constructing an Import Table.srt

2.9 KB

03. Walking the PEB, Parsing a PE.mp4

26.3 MB

03. Walking the PEB, Parsing a PE.srt

14.9 KB

04. Demo- Dynamic API Resolution.mp4

29.7 MB

04. Demo- Dynamic API Resolution.srt

13.2 KB

05. Lab- Tracing Import Table Construction.mp4

27.2 MB

05. Lab- Tracing Import Table Construction.srt

14.6 KB

06. Conclusion.mp4

1.1 MB

06. Conclusion.srt

1.1 KB

/06. Identifying Malware Use of Cryptography/

01. Module Introduction.mp4

1.1 MB

01. Module Introduction.srt

1.0 KB

02. Purpose of Cryptography in Malware.mp4

27.2 MB

02. Purpose of Cryptography in Malware.srt

12.9 KB

03. Tools to Help Identify Use of Cryptography.mp4

7.2 MB

03. Tools to Help Identify Use of Cryptography.srt

7.3 KB

04. Demo- Finding Cryptography.mp4

26.1 MB

04. Demo- Finding Cryptography.srt

14.7 KB

05. Lab- Analyzing Malware That Uses Cryptography.mp4

15.5 MB

05. Lab- Analyzing Malware That Uses Cryptography.srt

8.3 KB

06. Conclusion.mp4

1.1 MB

06. Conclusion.srt

1.2 KB

/07. Leveling up Your Skills/

01. Module Introduction.mp4

560.0 KB

01. Module Introduction.srt

0.7 KB

02. What You Learned.mp4

3.6 MB

02. What You Learned.srt

3.7 KB

03. Leveling up Your Skills.mp4

2.2 MB

03. Leveling up Your Skills.srt

2.6 KB

04. Conclusion.mp4

418.5 KB

04. Conclusion.srt

0.6 KB

/

malware-analysis-identifying-defeating-obfuscation.zip

696.7 KB

 

Total files 73


Copyright © 2025 FileMood.com