[FreeCourseLab.com] Udemy - Reverse Engineering, Debugging and Malware Analysis - 2021

File Type Create Time File Size Seeders Leechers Updated
Movie 2021-07-11 3.61GB 0 2 3 months ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
FreeCourseLab  com  Udemy  Reverse  Engineering  Debugging  and  Malware  Analysis  2021  
Related Torrents
  1. [ DevCourseWeb.com ] Udemy - Armv8 Architecture - Exception And Crash Debugging 1.26GB
  2. [ CourseWikia.com ] Udemy - Bjt Transistors Bias Circuits , Dc Analysis And Design 1.23GB
  3. [ CourseWikia.com ] Udemy - Process Engineering Career - Design Documents and Activities 503.17MB
  4. [FreeCourseLab.com] Udemy - Graph Theory Algorithms 3.25GB
  5. [ FreeCourseWeb.com ] Udemy - Prompt Engineering with ChatGPT Plus and Custom GPT's Course 1.55GB
  6. [ DevCourseWeb.com ] Udemy - Automotive Engineering - Automobile Systems and Components 1.29GB
  7. [ DevCourseWeb.com ] Udemy - Prompt Engineering with DALL-E, ChatGPT, and Adobe AI Course 1.12GB
  8. [ DevCourseWeb.com ] Udemy - Piping Engineering Master Class - Understanding ASME B31 957.10MB
  9. [FreeCourseLab.com] Udemy - Python Programming Bible Networking, GUI, Email, XML, CGI 2.58GB
  10. Domas S., Domas C. - x86 Software Reverse-Engineering, Cracking.and, Counter-Measures - 2024 55.24MB
Files
  1. 1. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.mp4 117.24MB
  2. 1. Reverse Engineering Fundamentals/1. Reverse Engineering Fundamentals.srt 8.27KB
  3. 1. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.mp4 70.04MB
  4. 1. Reverse Engineering Fundamentals/2. Reverse Engineering Tools.srt 5.36KB
  5. 1. Reverse Engineering Fundamentals/2.1 patrick.gif 16.23KB
  6. 1. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.mp4 39.80MB
  7. 1. Reverse Engineering Fundamentals/3. Analysis Types and Reporting.srt 3.23KB
  8. 1. Reverse Engineering Fundamentals/3.1 patrick.gif 16.23KB
  9. 2. Operating System Components/1. Filesystem.mp4 22.87MB
  10. 2. Operating System Components/1. Filesystem.srt 2.82KB
  11. 2. Operating System Components/1.1 malware.png 15.26KB
  12. 2. Operating System Components/2. Non-Volatile Memory.mp4 32.04MB
  13. 2. Operating System Components/2. Non-Volatile Memory.srt 3.18KB
  14. 2. Operating System Components/3. The Windows Registry.mp4 27.46MB
  15. 2. Operating System Components/3. The Windows Registry.srt 2.36KB
  16. 2. Operating System Components/4. Volatile Memory.mp4 34.30MB
  17. 2. Operating System Components/4. Volatile Memory.srt 2.35KB
  18. 2. Operating System Components/5. Operating System Components.html 166B
  19. 3. Malware Behavior/1. Analysis Tools.mp4 34.71MB
  20. 3. Malware Behavior/1. Analysis Tools.srt 4.87KB
  21. 3. Malware Behavior/2. Malware Identification.mp4 60.24MB
  22. 3. Malware Behavior/2. Malware Identification.srt 4.27KB
  23. 3. Malware Behavior/3. Presistence.mp4 45.69MB
  24. 3. Malware Behavior/3. Presistence.srt 2.88KB
  25. 3. Malware Behavior/4. Malware Presistence.html 3.52KB
  26. 4. Malware and Memory Analysis/1. Volatility Cridex.mp4 153.53MB
  27. 4. Malware and Memory Analysis/1. Volatility Cridex.srt 9.91KB
  28. 4. Malware and Memory Analysis/2. Volatility R2D2.mp4 90.62MB
  29. 4. Malware and Memory Analysis/2. Volatility R2D2.srt 6.25KB
  30. 4. Malware and Memory Analysis/3. Cridex Malware Analysis.mp4 153.49MB
  31. 4. Malware and Memory Analysis/3. Cridex Malware Analysis.srt 9.91KB
  32. 5. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.mp4 261.22MB
  33. 5. Debugging/1. Low Level (Assembly) Debugging With Immunity Debugger.srt 25.83KB
  34. 6. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.mp4 158.71MB
  35. 6. Software Exploitation/1. Software Exploitation Intro and Stack Frames in Memory.srt 38.37KB
  36. 6. Software Exploitation/2. Low-Level View and Managing Stacks.mp4 176.18MB
  37. 6. Software Exploitation/2. Low-Level View and Managing Stacks.srt 40.86KB
  38. 6. Software Exploitation/3. Stack Reliability and GCC Example.mp4 181.44MB
  39. 6. Software Exploitation/3. Stack Reliability and GCC Example.srt 30.11KB
  40. 6. Software Exploitation/4. Methods Exploitation.mp4 512.65MB
  41. 6. Software Exploitation/4. Methods Exploitation.srt 59.34KB
  42. 6. Software Exploitation/5. Stack Guards Bypass.mp4 386.50MB
  43. 6. Software Exploitation/5. Stack Guards Bypass.srt 34.61KB
  44. 6. Software Exploitation/6. Stack Guards Bypass - Part 2.mp4 633.66MB
  45. 6. Software Exploitation/6. Stack Guards Bypass - Part 2.srt 47.46KB
  46. 6. Software Exploitation/7. Evil Server.mp4 499.21MB
  47. 6. Software Exploitation/7. Evil Server.srt 73.15KB
  48. 6. Software Exploitation/8. Test 1.html 166B
  49. [FreeCourseLab.com].url 126B