[FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+

File Type Create Time File Size Seeders Leechers Updated
Movie 2023-08-24 9.07GB 6 5 22 hours ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
FreeCourseSite  com  Udemy  Reverse  Engineering  Malware  Analysis  Hours  REMAC  
Related Torrents
  1. FOR610 - Reverse-Engineering Malware: Malware Analysis Tools and Techniques 14.57GB
  2. FOR710 - Reverse-Engineering Malware: Advanced Code Analysis 17.01GB
  3. [FreeCourseSite.com] Udemy - Cypress with Cucumber BDD - Beginner to Expert in 9 Hours! 5.96GB
  4. [FreeCourseSite.com] Udemy - Learn Python 3.9 Start your Programming Career in 4 Hours 1.10GB
  5. FreeCourseSite.com-Udemy - 100 Days Of Code - 2023 Web Development Bootcamp.torrent 270.56KB
  6. [FreeCourseSite.com] Udemy - Build Responsive Real-World Websites with HTML and CSS 15.38GB
  7. [FreeCourseSite.com] Udemy - Complete Guide to Freelancing in 2023 Zero to Mastery 4.07GB
  8. [FreeCourseSite.com] Udemy - Spring Boot Microservices and Spring Cloud. Build & Deploy 11.72GB
  9. [FreeCourseSite.com] Udemy - How To Write Your Business Plan (in One Day} With ChatGPT 1.11GB
  10. [FreeCourseSite.com] Udemy - Complete AWS Certified Cloud Practitioner CLF-C02 3.81GB
Files
  1. 0. Websites you may like/[CourseClub.Me].url 122B
  2. 0. Websites you may like/[FreeCourseSite.com].url 127B
  3. 0. Websites you may like/[GigaCourse.Com].url 49B
  4. 1. Introduction/1. The Disassembly Theory.mp4 35.33MB
  5. 1. Introduction/2. Disassembly - What.mp4 69.85MB
  6. 10. Linux for Reverse Engineering and Malware Analysis/1. Understanding Linux Commands and Pipes.mp4 75.44MB
  7. 10. Linux for Reverse Engineering and Malware Analysis/2. What is a Command.mp4 47.63MB
  8. 10. Linux for Reverse Engineering and Malware Analysis/3. Weird LS Command.mp4 27.99MB
  9. 10. Linux for Reverse Engineering and Malware Analysis/4. Different Linux Commands using with Pipe.mp4 58.52MB
  10. 11. Starting with Linux Terminal/1. Understanding key concepts.mp4 77.35MB
  11. 11. Starting with Linux Terminal/2. Finding Helpful manuals.mp4 77.45MB
  12. 11. Starting with Linux Terminal/3. Linux Directories.mp4 62.07MB
  13. 11. Starting with Linux Terminal/4. Linux Directories - Part 2.mp4 65.00MB
  14. 12. Starting with Linux Shell and Exploring Linux System/1. A1 - The bridge between You and Shell.mp4 52.36MB
  15. 12. Starting with Linux Shell and Exploring Linux System/10. Arithmetic Expressions with Shell.mp4 17.57MB
  16. 12. Starting with Linux Shell and Exploring Linux System/11. Automating Folder Creation with Shell.mp4 53.27MB
  17. 12. Starting with Linux Shell and Exploring Linux System/12. Quoting in Shell.mp4 60.25MB
  18. 12. Starting with Linux Shell and Exploring Linux System/2. LS Command.mp4 15.89MB
  19. 12. Starting with Linux Shell and Exploring Linux System/3. RD vs APD.mp4 47.18MB
  20. 12. Starting with Linux Shell and Exploring Linux System/4. Filtering LS.mp4 61.99MB
  21. 12. Starting with Linux Shell and Exploring Linux System/5. CP Command.mp4 41.08MB
  22. 12. Starting with Linux Shell and Exploring Linux System/6. Tab Auto-completion.mp4 28.89MB
  23. 12. Starting with Linux Shell and Exploring Linux System/7. SYM AND HRD Link Files.mp4 79.91MB
  24. 12. Starting with Linux Shell and Exploring Linux System/8. Manipulating Files.mp4 32.00MB
  25. 12. Starting with Linux Shell and Exploring Linux System/9. Introduction to Shell and Expansion.mp4 35.26MB
  26. 13. Permissions/0. Websites you may like/[CourseClub.Me].url 122B
  27. 13. Permissions/0. Websites you may like/[FreeCourseSite.com].url 127B
  28. 13. Permissions/0. Websites you may like/[GigaCourse.Com].url 49B
  29. 13. Permissions/1. Introduction to Permissions in Linux.mp4 20.24MB
  30. 13. Permissions/2. Differences between UID, GID and Shadow.mp4 37.00MB
  31. 13. Permissions/3. File and Dir Permissions.mp4 86.78MB
  32. 13. Permissions/4. Examples with File Permissions.mp4 17.74MB
  33. 13. Permissions/4.1 A4.txt 669B
  34. 13. Permissions/5. After this video you'll understand all LINUX Permissions.mp4 140.93MB
  35. 13. Permissions/5.1 A5.txt 669B
  36. 13. Permissions/6. Chmod.mp4 93.14MB
  37. 14. Managing Processes and Packages in Linux/1. Fundamentals of Processes in System.mp4 62.66MB
  38. 14. Managing Processes and Packages in Linux/10. Trcrt command.mp4 60.73MB
  39. 14. Managing Processes and Packages in Linux/11. Networking with Linux.mp4 49.13MB
  40. 14. Managing Processes and Packages in Linux/2. The Magic with PS Aux Command.mp4 82.38MB
  41. 14. Managing Processes and Packages in Linux/3. The Magic with TOP Command.mp4 93.72MB
  42. 14. Managing Processes and Packages in Linux/4. Foreground and Background Processes.mp4 44.87MB
  43. 14. Managing Processes and Packages in Linux/5. From Background to Foreground.mp4 24.56MB
  44. 14. Managing Processes and Packages in Linux/6. The Tutorial with Linux Process Signals.mp4 77.88MB
  45. 14. Managing Processes and Packages in Linux/7. Introduction to Packet Management Systems.mp4 48.01MB
  46. 14. Managing Processes and Packages in Linux/8. Why we need package management tools.mp4 21.89MB
  47. 14. Managing Processes and Packages in Linux/9. Package Management in Linux - Final.mp4 69.40MB
  48. 15. C++ for Reverse Engineering - Section 1/1. CPP Newlines,Tabs and Spaces.mp4 41.27MB
  49. 15. C++ for Reverse Engineering - Section 1/1.1 A1 - CPP Newlines,Tabs and Spaces.txt 501B
  50. 15. C++ for Reverse Engineering - Section 1/10. Beginning to Pointers.mp4 28.75MB
  51. 15. C++ for Reverse Engineering - Section 1/10.1 A10 - Beginning to Pointers.txt 464B
  52. 15. C++ for Reverse Engineering - Section 1/11. Namespaces in CPP.mp4 83.98MB
  53. 15. C++ for Reverse Engineering - Section 1/11.1 A11 - Namespaces in CPP.txt 1.20KB
  54. 15. C++ for Reverse Engineering - Section 1/12. Scoping Variables and Static Keyword.mp4 126.44MB
  55. 15. C++ for Reverse Engineering - Section 1/12.1 A12.zip 1.78KB
  56. 15. C++ for Reverse Engineering - Section 1/13. Conditional Statements.mp4 61.32MB
  57. 15. C++ for Reverse Engineering - Section 1/2. Initializers in CPP.mp4 60.22MB
  58. 15. C++ for Reverse Engineering - Section 1/2.1 A1 - Initializers in CPP.txt 598B
  59. 15. C++ for Reverse Engineering - Section 1/3. CPP Writing Styles.mp4 45.55MB
  60. 15. C++ for Reverse Engineering - Section 1/3.1 A2 - CPP Writing Styles.txt 1.15KB
  61. 15. C++ for Reverse Engineering - Section 1/4. Statements and Expressions, RVALUE and LVALUE.mp4 57.18MB
  62. 15. C++ for Reverse Engineering - Section 1/4.1 A3 - Statements and Expressions, RVALUE and LVALUE.txt 509B
  63. 15. C++ for Reverse Engineering - Section 1/5. Comma.mp4 27.06MB
  64. 15. C++ for Reverse Engineering - Section 1/5.1 A4 - Comma.txt 257B
  65. 15. C++ for Reverse Engineering - Section 1/6. Types and Variables.mp4 72.50MB
  66. 15. C++ for Reverse Engineering - Section 1/6.1 A5 - Types and Variables.txt 461B
  67. 15. C++ for Reverse Engineering - Section 1/7. Literals in CPP.mp4 28.42MB
  68. 15. C++ for Reverse Engineering - Section 1/7.1 A6 - Literals in CPP.txt 517B
  69. 15. C++ for Reverse Engineering - Section 1/8. Defining Constants.mp4 34.95MB
  70. 15. C++ for Reverse Engineering - Section 1/8.1 A7 - Defining Constants.txt 413B
  71. 15. C++ for Reverse Engineering - Section 1/9. Const Expressions.mp4 22.44MB
  72. 15. C++ for Reverse Engineering - Section 1/9.1 A8 - Const Expressions.txt 332B
  73. 16. Variable Types in Programming CC++/1. Types in CPP - Binary,Octal and Hex.mp4 71.32MB
  74. 16. Variable Types in Programming CC++/1.1 A1 - Types in CPP - Binary,Octal and Hex.txt 373B
  75. 16. Variable Types in Programming CC++/2. Floating Point types in CPP - Float, Double, Long Double.mp4 83.48MB
  76. 16. Variable Types in Programming CC++/2.1 A2 - Floating Point types in CPP - Float, Double, Long Double.txt 733B
  77. 16. Variable Types in Programming CC++/3. Char types in C.mp4 92.76MB
  78. 16. Variable Types in Programming CC++/3.1 A3 - Char types in CPP.txt 1011B
  79. 16. Variable Types in Programming CC++/4. Enum Types.mp4 61.47MB
  80. 16. Variable Types in Programming CC++/4.1 A3 - Char types in CPP.txt 1011B
  81. 16. Variable Types in Programming CC++/4.2 A4 - aEnum Types.txt 514B
  82. 16. Variable Types in Programming CC++/5. Boolean Types and Comparison Operators.mp4 92.57MB
  83. 16. Variable Types in Programming CC++/5.1 A4 - Boolean Types and Comparison Operators.txt 656B
  84. 16. Variable Types in Programming CC++/6. Void Type and Void Function.mp4 17.18MB
  85. 16. Variable Types in Programming CC++/6.1 A5 - Void Type and Void Function.txt 209B
  86. 16. Variable Types in Programming CC++/7. Operators 101.mp4 97.19MB
  87. 16. Variable Types in Programming CC++/7.1 A5-1 Operators 101.txt 369B
  88. 16. Variable Types in Programming CC++/8. Default Values in CPP.mp4 47.75MB
  89. 16. Variable Types in Programming CC++/8.1 A7 - Default Values in CPP.txt 601B
  90. 17. How Conditional Statements work Reverse Engineering and C/1. Switch Statement with ENUM.mp4 92.38MB
  91. 17. How Conditional Statements work Reverse Engineering and C/1.1 A1 - Switch Statement with ENUM.txt 1.16KB
  92. 17. How Conditional Statements work Reverse Engineering and C/2. Conditional Statements in CPP.mp4 110.09MB
  93. 17. How Conditional Statements work Reverse Engineering and C/2.1 A2 - Conditional Statements in CPP.txt 853B
  94. 17. How Conditional Statements work Reverse Engineering and C/3. For Loop.mp4 48.58MB
  95. 17. How Conditional Statements work Reverse Engineering and C/3.1 A3 - For Loop.txt 279B
  96. 17. How Conditional Statements work Reverse Engineering and C/4. Continue Keyword.mp4 14.35MB
  97. 17. How Conditional Statements work Reverse Engineering and C/4.1 A4 - Continue Keyword.txt 313B
  98. 17. How Conditional Statements work Reverse Engineering and C/4.2 A4 - Continue Keyword.txt 313B
  99. 17. How Conditional Statements work Reverse Engineering and C/5. Do-While Loop.mp4 20.96MB
  100. 17. How Conditional Statements work Reverse Engineering and C/5.1 A5 - Do-While Loop.txt 295B
  101. 17. How Conditional Statements work Reverse Engineering and C/6. Goto.mp4 13.59MB
  102. 17. How Conditional Statements work Reverse Engineering and C/6.1 A6 - Goto .txt 263B
  103. 18. Introduction to CPP Classes/1. Unions in CPP.mp4 44.44MB
  104. 18. Introduction to CPP Classes/1.1 A2 - Unions in CPP.txt 529B
  105. 18. Introduction to CPP Classes/2. Methods in Struct.mp4 29.09MB
  106. 18. Introduction to CPP Classes/2.1 A3 - Methods in Struct.txt 355B
  107. 18. Introduction to CPP Classes/3. Access Controls in CPP.mp4 48.26MB
  108. 18. Introduction to CPP Classes/3.1 A4 - Access Controls in CPP.txt 608B
  109. 18. Introduction to CPP Classes/4. Classes and Initializing Class Member.mp4 31.15MB
  110. 18. Introduction to CPP Classes/4.1 A5 - Classes and Initializing Class Member.txt 620B
  111. 18. Introduction to CPP Classes/5. Constructors.mp4 24.85MB
  112. 18. Introduction to CPP Classes/6. Destructors in CPP.mp4 11.21MB
  113. 18. Introduction to CPP Classes/7. Initializers in CPP.mp4 60.22MB
  114. 19. Introduction to Pointers/0. Websites you may like/[CourseClub.Me].url 122B
  115. 19. Introduction to Pointers/0. Websites you may like/[FreeCourseSite.com].url 127B
  116. 19. Introduction to Pointers/0. Websites you may like/[GigaCourse.Com].url 49B
  117. 19. Introduction to Pointers/1. Pointers in CPP.mp4 99.78MB
  118. 19. Introduction to Pointers/1.1 11 - Pointers in CPP.txt 410B
  119. 19. Introduction to Pointers/10. Allocating memory as arrays.mp4 18.04MB
  120. 19. Introduction to Pointers/10.1 C4 - Allocating memory as arrays=.txt 294B
  121. 19. Introduction to Pointers/11. Lifetime of Memory.mp4 22.83MB
  122. 19. Introduction to Pointers/11.1 C5 - Lifetime of Memory=.txt 299B
  123. 19. Introduction to Pointers/2. C++ Beginning to Pointers.mp4 40.96MB
  124. 19. Introduction to Pointers/2.1 A1 - C++ Beginning to Pointers.txt 341B
  125. 19. Introduction to Pointers/3. Dereference Operator in CPP.mp4 62.67MB
  126. 19. Introduction to Pointers/3.1 A2 - Dereference Operator in CPP.txt 852B
  127. 19. Introduction to Pointers/4. Pointers and Arrays.mp4 62.83MB
  128. 19. Introduction to Pointers/4.1 A3 - Pointers and Arrays.txt 442B
  129. 19. Introduction to Pointers/5. nullptr.mp4 18.42MB
  130. 19. Introduction to Pointers/6. Pointer arithmetic in CPP.mp4 49.82MB
  131. 19. Introduction to Pointers/6.1 B3 - Pointer arithmetic in CPP.txt 456B
  132. 19. Introduction to Pointers/7. Arrays out of bounds and Deallocating Pointers=.mp4 29.72MB
  133. 19. Introduction to Pointers/7.1 C1 - Arrays out of bounds and Deallocating Pointers=.txt 302B
  134. 19. Introduction to Pointers/8. Consts and Casts with Pointers=.mp4 45.24MB
  135. 19. Introduction to Pointers/8.1 C2 - Consts and Casts with Pointers=.txt 811B
  136. 19. Introduction to Pointers/9. Allocating Memory.mp4 22.71MB
  137. 2. Installing Ghidra for Reverse Engineering and Malware Analysis/0. Websites you may like/[CourseClub.Me].url 122B
  138. 2. Installing Ghidra for Reverse Engineering and Malware Analysis/0. Websites you may like/[FreeCourseSite.com].url 127B
  139. 2. Installing Ghidra for Reverse Engineering and Malware Analysis/0. Websites you may like/[GigaCourse.Com].url 49B
  140. 2. Installing Ghidra for Reverse Engineering and Malware Analysis/1. Downloading Ghidra and File Structure.mp4 80.09MB
  141. 2. Installing Ghidra for Reverse Engineering and Malware Analysis/2. Installing JDK in Linux.mp4 48.53MB
  142. 2. Installing Ghidra for Reverse Engineering and Malware Analysis/3. Installing JDK in Windows or MacOS.mp4 32.11MB
  143. 20. STL and References in C++/1. STL,Vectors and Arrays.mp4 57.09MB
  144. 20. STL and References in C++/2. References.mp4 33.68MB
  145. 20. STL and References in C++/2.1 A1 - References.txt 529B
  146. 20. STL and References in C++/3. Example Project With References.mp4 32.07MB
  147. 20. STL and References in C++/4. Code Example with AUTO, TUPLE and FOR LOOP.mp4 89.92MB
  148. 20. STL and References in C++/4.1 A3 - Code Example with AUTO, TUPLE and FOR LOOP.txt 993B
  149. 20. STL and References in C++/5. Range Based for Loop.mp4 51.26MB
  150. 20. STL and References in C++/5.1 A4 - Range Based for Loop.txt 676B
  151. 21. Pointer and Functions Reverse Engineering and Malware Analysis/1. Pointers in Practice.mp4 24.34MB
  152. 21. Pointer and Functions Reverse Engineering and Malware Analysis/1.1 A1 - Pointers in Practice.txt 400B
  153. 21. Pointer and Functions Reverse Engineering and Malware Analysis/10. Functions - Part 5.mp4 39.24MB
  154. 21. Pointer and Functions Reverse Engineering and Malware Analysis/10.1 A6 - Functions - Part 5.txt 499B
  155. 21. Pointer and Functions Reverse Engineering and Malware Analysis/10.2 A6 - Functions - Part 5.txt 499B
  156. 21. Pointer and Functions Reverse Engineering and Malware Analysis/11. Functions - Part 7.mp4 16.79MB
  157. 21. Pointer and Functions Reverse Engineering and Malware Analysis/2. Pointers in Practice - Part 2.mp4 57.72MB
  158. 21. Pointer and Functions Reverse Engineering and Malware Analysis/2.1 A2 - Pointers in Practice - Part 2.txt 680B
  159. 21. Pointer and Functions Reverse Engineering and Malware Analysis/3. Pointers in Practice - Part 3.mp4 25.71MB
  160. 21. Pointer and Functions Reverse Engineering and Malware Analysis/3.1 A3 - Pointers in Practice - Part 3.txt 959B
  161. 21. Pointer and Functions Reverse Engineering and Malware Analysis/4. Pointers in Practice - Part 4.mp4 35.01MB
  162. 21. Pointer and Functions Reverse Engineering and Malware Analysis/4.1 A4 - Pointers in Practice - Part 4.txt 1.27KB
  163. 21. Pointer and Functions Reverse Engineering and Malware Analysis/5. Introduction to Functions.mp4 35.20MB
  164. 21. Pointer and Functions Reverse Engineering and Malware Analysis/5.1 A1 - Introduction to Functions.txt 238B
  165. 21. Pointer and Functions Reverse Engineering and Malware Analysis/6. Functions - Part 1.mp4 25.74MB
  166. 21. Pointer and Functions Reverse Engineering and Malware Analysis/6.1 A2 - Functiosn - Part 1.txt 211B
  167. 21. Pointer and Functions Reverse Engineering and Malware Analysis/7. Functions - Part 2.mp4 44.75MB
  168. 21. Pointer and Functions Reverse Engineering and Malware Analysis/7.1 A3 - Functions - Part 2.txt 512B
  169. 21. Pointer and Functions Reverse Engineering and Malware Analysis/8. Functions - Part 3.mp4 41.68MB
  170. 21. Pointer and Functions Reverse Engineering and Malware Analysis/8.1 A4 - Functions - Part 3.txt 247B
  171. 21. Pointer and Functions Reverse Engineering and Malware Analysis/9. Functions - Part 4.mp4 49.13MB
  172. 21. Pointer and Functions Reverse Engineering and Malware Analysis/9.1 A5 - Functions - Part 4.txt 501B
  173. 22. Data Structures in CC++/1. Introduction to Basic CPP Programming.mp4 57.54MB
  174. 22. Data Structures in CC++/1.1 A1 - Introduction to Basic CPP Programming.txt 316B
  175. 22. Data Structures in CC++/10. Introduction to STL.mp4 19.89MB
  176. 22. Data Structures in CC++/11. Algorithm Analysis.mp4 67.79MB
  177. 22. Data Structures in CC++/11.1 A2 - Algorithm Analysis.txt 561B
  178. 22. Data Structures in CC++/12. Scenario Analysis.mp4 53.18MB
  179. 22. Data Structures in CC++/12.1 A3 - Scenario Analysis.txt 969B
  180. 22. Data Structures in CC++/13. Developing Main.mp4 16.07MB
  181. 22. Data Structures in CC++/13.1 A4 - Developing Main.txt 1.38KB
  182. 22. Data Structures in CC++/14. Factorial Method.mp4 26.99MB
  183. 22. Data Structures in CC++/14.1 A5 - Factorial Method.txt 1.38KB
  184. 22. Data Structures in CC++/2. Creating Random Card Generator Using Enum and rand.mp4 102.69MB
  185. 22. Data Structures in CC++/2.1 A2 - Creating Random Card Generator Using Enum and rand.txt 1.84KB
  186. 22. Data Structures in CC++/3. Developing main Function and using static_cast.mp4 71.68MB
  187. 22. Data Structures in CC++/3.1 A3 - Developing main Function and using static_cast.txt 2.18KB
  188. 22. Data Structures in CC++/4. Introduction to ADT.mp4 16.17MB
  189. 22. Data Structures in CC++/5. Creating ADT Class and using Constructors.mp4 67.58MB
  190. 22. Data Structures in CC++/5.1 A2 - Creating ADT Class and using Constructors.txt 437B
  191. 22. Data Structures in CC++/6. Virtual Methods and Overriding from Class.mp4 57.23MB
  192. 22. Data Structures in CC++/6.1 A3 - Virtual Methods and Overriding from Class.txt 599B
  193. 22. Data Structures in CC++/7. Controlling Copy Operations with ADT.mp4 38.70MB
  194. 22. Data Structures in CC++/8. Starting with Templates.mp4 53.54MB
  195. 22. Data Structures in CC++/8.1 A1 - Starting with Templates.txt 1.22KB
  196. 22. Data Structures in CC++/9. Class Templates in CPP.mp4 116.78MB
  197. 22. Data Structures in CC++/9.1 A2 - Class Templates in CPP.txt 1.41KB
  198. 23. ADT and Nodes in C++ for Reverse Engineering/1. Creating List ADT.mp4 66.94MB
  199. 23. ADT and Nodes in C++ for Reverse Engineering/1.1 A1 - Creating List ADT.txt 339B
  200. 23. ADT and Nodes in C++ for Reverse Engineering/10. Developing Search Operation.mp4 50.03MB
  201. 23. ADT and Nodes in C++ for Reverse Engineering/10.1 A4 - Developing Search Operation.txt 2.78KB
  202. 23. ADT and Nodes in C++ for Reverse Engineering/11. Removing Items.mp4 120.44MB
  203. 23. ADT and Nodes in C++ for Reverse Engineering/11.1 A4 - Removing Items.txt 4.04KB
  204. 23. ADT and Nodes in C++ for Reverse Engineering/2. Developing Get and Insert Methods.mp4 51.36MB
  205. 23. ADT and Nodes in C++ for Reverse Engineering/2.1 A2 - Developing Get and Insert Methods.txt 344B
  206. 23. ADT and Nodes in C++ for Reverse Engineering/3. Developing Search and Remove Methods.mp4 68.46MB
  207. 23. ADT and Nodes in C++ for Reverse Engineering/3.1 A3 - Developing Search and Remove Methods.txt 1.20KB
  208. 23. ADT and Nodes in C++ for Reverse Engineering/4. Testing ADT List.mp4 121.34MB
  209. 23. ADT and Nodes in C++ for Reverse Engineering/5. Node and Chaining Example.mp4 102.88MB
  210. 23. ADT and Nodes in C++ for Reverse Engineering/5.1 A1 - Node and Chaining Example.txt 575B
  211. 23. ADT and Nodes in C++ for Reverse Engineering/6. Creating and Chaining nodes with Different data types.mp4 73.07MB
  212. 23. ADT and Nodes in C++ for Reverse Engineering/6.1 A2 - Creating and Chaining nodes with Different data types.txt 637B
  213. 23. ADT and Nodes in C++ for Reverse Engineering/7. Creating Custom Linked List.mp4 87.20MB
  214. 23. ADT and Nodes in C++ for Reverse Engineering/7.1 A1 - Creating Custom Linked List.txt 1.14KB
  215. 23. ADT and Nodes in C++ for Reverse Engineering/8. Get Method.mp4 45.94MB
  216. 23. ADT and Nodes in C++ for Reverse Engineering/8.1 A2 - Get Method.txt 1.14KB
  217. 23. ADT and Nodes in C++ for Reverse Engineering/9. Developing InsertHead, InsertTail and Insert Methods.mp4 148.68MB
  218. 23. ADT and Nodes in C++ for Reverse Engineering/9.1 A3 - Developing InsertHead, InsertTail and Insert Methods.txt 2.45KB
  219. 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/1. Understanding Arrays.mp4 47.49MB
  220. 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/1.1 A1 - Understanding Arrays.txt 286B
  221. 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/2. Manipulating Arrays.mp4 60.83MB
  222. 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/2.1 A2 - Manipluating Arrays.txt 538B
  223. 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/3. Starting with Array Pointers.mp4 60.27MB
  224. 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/3.1 A3 - Starting with Array Pointers.txt 326B
  225. 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/4. Pointer Increment vs Array Indexing.mp4 49.19MB
  226. 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/4.1 A4 - Pointer Increment vs Array Indexing.txt 326B
  227. 3. Starting with Ghidra/1. Opening project in Ghidra.mp4 84.49MB
  228. 3. Starting with Ghidra/2. Discovering Ghidra.mp4 61.21MB
  229. 4. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4 116.68MB
  230. 4. Malware Analysis and Reverse Engineering with Ghidra/1.1 Download Samples.txt 108B
  231. 4. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4 103.17MB
  232. 4. Malware Analysis and Reverse Engineering with Ghidra/3. OSINT for Reverse Engineering.mp4 52.56MB
  233. 4. Malware Analysis and Reverse Engineering with Ghidra/4. Analyzing Libraries that Malware Uses.mp4 23.05MB
  234. 4. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4 121.56MB
  235. 4. Malware Analysis and Reverse Engineering with Ghidra/6. Finding Entry Points and Changing Undefined Function Names.mp4 46.40MB
  236. 5. Binary Analysis/1. Analysis of Binary and 4 Stages of Compilation.mp4 33.50MB
  237. 5. Binary Analysis/2. Preprocessing.mp4 59.44MB
  238. 5. Binary Analysis/3. Compilation Phase.mp4 38.68MB
  239. 5. Binary Analysis/4. Assembly Phase.mp4 38.19MB
  240. 5. Binary Analysis/5. Linking Phase.mp4 93.96MB
  241. 6. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4 103.79MB
  242. 6. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4 156.64MB
  243. 6. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4 106.83MB
  244. 6. Symbols, Stripped and Not Stripped Binaries/4. How binary loads and executes in theory.mp4 64.48MB
  245. 7. Linux - ELF Format/0. Websites you may like/[CourseClub.Me].url 122B
  246. 7. Linux - ELF Format/0. Websites you may like/[FreeCourseSite.com].url 127B
  247. 7. Linux - ELF Format/0. Websites you may like/[GigaCourse.Com].url 49B
  248. 7. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 147.16MB
  249. 7. Linux - ELF Format/2. Learning ELF Fields.mp4 128.73MB
  250. 7. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4 155.48MB
  251. 8. Windows - PE Format/1. Learning Windows PE Format.mp4 197.19MB
  252. 9. IDA Pro IDA Freeware/1. Downloading and Installing IDA Pro IDA Freeware.mp4 66.93MB
  253. 9. IDA Pro IDA Freeware/2. Being friends with IDA.mp4 55.49MB
  254. 9. IDA Pro IDA Freeware/3. Useful Tabs in IDA.mp4 63.02MB