Reverse Engineering Malware with Ghidra
    
    File List
    
        
            
                
                    - 03. Enhancing Your Reversing Workflow/03. Demo- Function Analysis.mp4  63.1 MB
- 02. Working with Ghidra’s Core Components/05. Demo- Analyzing a Trojan.mp4  38.7 MB
- 04. Harnessing Ghidra’s Superpowers/01. Working with the Decompiler.mp4  29.7 MB
- 04. Harnessing Ghidra’s Superpowers/05. Demo- Scripting Example.mp4  24.6 MB
- 01. Software Reverse Engineering with Ghidra/04. Demo- Getting Started with Ghidra.mp4  21.8 MB
- 04. Harnessing Ghidra’s Superpowers/03. Demo- Headless Analyzer.mp4  17.4 MB
- 03. Enhancing Your Reversing Workflow/01. Enhancing the CodeBrowser.mp4  14.3 MB
- 03. Enhancing Your Reversing Workflow/02. Function Analysis Tools and Techniques.mp4  12.0 MB
- 02. Working with Ghidra’s Core Components/03. Exploring the Main User Interface.mp4  10.6 MB
- 02. Working with Ghidra’s Core Components/04. Ghidra’s Decompiler.mp4  10.2 MB
- 01. Software Reverse Engineering with Ghidra/01. Reverse Engineering and the Ghidra Software Reverse Engineering (SRE) Tools.mp4  9.3 MB
- 01. Software Reverse Engineering with Ghidra/03. What You Should Know.mp4  6.3 MB
- 02. Working with Ghidra’s Core Components/02. Projects and Auto-analysis.mp4  6.3 MB
- 04. Harnessing Ghidra’s Superpowers/04. Ghidra Scripts.mp4  4.2 MB
- 02. Working with Ghidra’s Core Components/01. Exploring Ghidra’s Main Components and Features.mp4  4.2 MB
- 04. Harnessing Ghidra’s Superpowers/06. Conclusion and Course Wrap-up.mp4  4.0 MB
- 04. Harnessing Ghidra’s Superpowers/02. Headless Analyzer.mp4  3.9 MB
- 01. Software Reverse Engineering with Ghidra/02. Malware Packing, Obfuscation, and Other Mayhem.mp4  3.8 MB
- 00. Course Overview/00. Course Overview.mp4  3.6 MB
- 01. Software Reverse Engineering with Ghidra/00. Module Introduction.mp4  1.5 MB
- 04. Harnessing Ghidra’s Superpowers/00. Module Introduction.mp4  1.1 MB
- 02. Working with Ghidra’s Core Components/00. Module Introduction.mp4  1.0 MB
- 01. Software Reverse Engineering with Ghidra/05. Conclusion.mp4  1.0 MB
- 02. Working with Ghidra’s Core Components/06. Conclusion.mp4  819.1 KB
- 03. Enhancing Your Reversing Workflow/00. Module Introduction.mp4  721.0 KB
- 03. Enhancing Your Reversing Workflow/04. Conclusion.mp4  663.5 KB
- 03. Enhancing Your Reversing Workflow/03. Demo- Function Analysis.srt  20.6 KB
- 02. Working with Ghidra’s Core Components/05. Demo- Analyzing a Trojan.srt  16.5 KB
- 01. Software Reverse Engineering with Ghidra/04. Demo- Getting Started with Ghidra.srt  14.0 KB
- 04. Harnessing Ghidra’s Superpowers/01. Working with the Decompiler.srt  13.3 KB
- 03. Enhancing Your Reversing Workflow/01. Enhancing the CodeBrowser.srt  12.7 KB
- 04. Harnessing Ghidra’s Superpowers/05. Demo- Scripting Example.srt  10.6 KB
- 04. Harnessing Ghidra’s Superpowers/03. Demo- Headless Analyzer.srt  8.9 KB
- 03. Enhancing Your Reversing Workflow/02. Function Analysis Tools and Techniques.srt  8.9 KB
- 01. Software Reverse Engineering with Ghidra/01. Reverse Engineering and the Ghidra Software Reverse Engineering (SRE) Tools.srt  8.8 KB
- 02. Working with Ghidra’s Core Components/03. Exploring the Main User Interface.srt  8.4 KB
- 02. Working with Ghidra’s Core Components/04. Ghidra’s Decompiler.srt  7.4 KB
- 02. Working with Ghidra’s Core Components/02. Projects and Auto-analysis.srt  5.8 KB
- 01. Software Reverse Engineering with Ghidra/03. What You Should Know.srt  5.3 KB
- 02. Working with Ghidra’s Core Components/01. Exploring Ghidra’s Main Components and Features.srt  4.3 KB
- 04. Harnessing Ghidra’s Superpowers/06. Conclusion and Course Wrap-up.srt  4.3 KB
- 01. Software Reverse Engineering with Ghidra/02. Malware Packing, Obfuscation, and Other Mayhem.srt  3.3 KB
- 00. Course Overview/00. Course Overview.srt  2.8 KB
- 04. Harnessing Ghidra’s Superpowers/02. Headless Analyzer.srt  2.4 KB
- 04. Harnessing Ghidra’s Superpowers/04. Ghidra Scripts.srt  2.3 KB
- 01. Software Reverse Engineering with Ghidra/00. Module Introduction.srt  1.7 KB
- 04. Harnessing Ghidra’s Superpowers/00. Module Introduction.srt  1.3 KB
- 01. Software Reverse Engineering with Ghidra/05. Conclusion.srt  1.2 KB
- 02. Working with Ghidra’s Core Components/00. Module Introduction.srt  1.0 KB
- 02. Working with Ghidra’s Core Components/06. Conclusion.srt  991 bytes
- 03. Enhancing Your Reversing Workflow/04. Conclusion.srt  838 bytes
- 03. Enhancing Your Reversing Workflow/00. Module Introduction.srt  786 bytes
- 00. Course Overview/6 Simple Memory Techniques - All hacker use it.html  98 bytes
- 02. Working with Ghidra’s Core Components/Linux Tails Operating System.html  84 bytes
- 02. Working with Ghidra’s Core Components/USB Rubber Ducky Deluxe.html  84 bytes
- 02. Working with Ghidra’s Core Components/Yubico - YubiKey 5 NFC.html  84 bytes
- 04. Harnessing Ghidra’s Superpowers/Echo Dot (3rd Gen) - Smart speaker with Alexa - Charcoal.html  84 bytes
- 04. Harnessing Ghidra’s Superpowers/Raspberry Pi 4.html  84 bytes
- 04. Harnessing Ghidra’s Superpowers/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html  84 bytes
 
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.