filmov
tv
Все публикации
0:02:09
00 - Welcome to Creating Shellcode and Prerequisistes
1:13:04
Malware Mondays #09 - File Identification and Hashing Algorithms
1:04:14
Network Analysis & Packet Capture with Arkime's Creator Andy Wick
0:10:29
05 - The Basics of Creating Custom Rules
0:08:31
04 - Using Fakenet-NG for Network Emulation and PCAP Generation
0:08:59
03 - Processing PCAPs in Offline Mode
0:04:47
02 - Manually Updating the Ruleset with Emerging Threats Open
0:04:10
01 - Installing Suricata into the FLARE-VM
0:09:21
08 - Using ZwSetInformationThread to Detach Debuggers
1:25:25
Explore Command-Line Driven Binary Transformations with Binary Refinery and its Jesko Huttenhain
1:09:21
Going Old School – Malware Sharing and Large-Scale Detection in the Early 2000s with Danny Quist
1:28:54
Mac Malware with L0Psec – Triage, reversing and ARM64
0:29:46
07 - Creating Trampolines and Re-Obfuscating Function Pointers
1:10:36
What’s New in Security Onion? Join Creator Doug Burks to Learn the Latest!
1:17:32
Malware Analysis with The Cyber Yeti
1:54:54
Learn About Evasive Malware with Threat Researcher and Author Kyle Cucci
0:10:42
Enabling Rule Profiling in Suricata - Compiling from Source
1:47:27
Learn How to Dissect Binary Files with the Creator of Malcat!
0:15:34
06 - Finding Functions from the Export Directory and Using Seeds to Compute Checksums
0:58:11
Ask Me Anything: Education, Training, and Certifications
0:14:12
05 - How Lockbit Uses the DLL Name as a Seed for API Hashing
0:16:29
04 - Walking the PEB, Enhancing IDA's Output w/ Structures, and Unlocking the Key to Runtime-Linking
0:16:25
03 - Identifying Signs of Runtime-Linking and Building Context for API Hashes
0:20:30
02 - Performing Basic Triage Analysis and Unpacking with x64dbg
Вперёд