zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+
magnet:?xt=urn:btih:185a2fb8d707be2c01b3190d02e8296253b86a9e&dn=[FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+
磁力链接详情
文件列表详情
185a2fb8d707be2c01b3190d02e8296253b86a9e
infohash:
156
文件数量
9.07 GB
文件大小
2024-1-16 01:01
创建日期
2025-1-3 09:15
最后访问
相关分词
FreeCourseSite
com
Udemy
-
Reverse
Engineering
&
Malware
Analysis
in
21
Hours
REMAC
1. Introduction/1. The Disassembly Theory.mp4 35.33 MB
1. Introduction/2. Disassembly - What.mp4 69.85 MB
10. Linux for Reverse Engineering and Malware Analysis/1. Understanding Linux Commands and Pipes.mp4 75.44 MB
10. Linux for Reverse Engineering and Malware Analysis/2. What is a Command.mp4 47.63 MB
10. Linux for Reverse Engineering and Malware Analysis/3. Weird LS Command.mp4 27.99 MB
10. Linux for Reverse Engineering and Malware Analysis/4. Different Linux Commands using with Pipe.mp4 58.52 MB
11. Starting with Linux Terminal/1. Understanding key concepts.mp4 77.35 MB
11. Starting with Linux Terminal/2. Finding Helpful manuals.mp4 77.45 MB
11. Starting with Linux Terminal/3. Linux Directories.mp4 62.07 MB
11. Starting with Linux Terminal/4. Linux Directories - Part 2.mp4 65 MB
12. Starting with Linux Shell and Exploring Linux System/1. A1 - The bridge between You and Shell.mp4 52.36 MB
12. Starting with Linux Shell and Exploring Linux System/10. Arithmetic Expressions with Shell.mp4 17.57 MB
12. Starting with Linux Shell and Exploring Linux System/11. Automating Folder Creation with Shell.mp4 53.27 MB
12. Starting with Linux Shell and Exploring Linux System/12. Quoting in Shell.mp4 60.25 MB
12. Starting with Linux Shell and Exploring Linux System/2. LS Command.mp4 15.89 MB
12. Starting with Linux Shell and Exploring Linux System/3. RD vs APD.mp4 47.18 MB
12. Starting with Linux Shell and Exploring Linux System/4. Filtering LS.mp4 61.99 MB
12. Starting with Linux Shell and Exploring Linux System/5. CP Command.mp4 41.08 MB
12. Starting with Linux Shell and Exploring Linux System/6. Tab Auto-completion.mp4 28.89 MB
12. Starting with Linux Shell and Exploring Linux System/7. SYM AND HRD Link Files.mp4 79.91 MB
12. Starting with Linux Shell and Exploring Linux System/8. Manipulating Files.mp4 32 MB
12. Starting with Linux Shell and Exploring Linux System/9. Introduction to Shell and Expansion.mp4 35.26 MB
13. Permissions/1. Introduction to Permissions in Linux.mp4 20.24 MB
13. Permissions/2. Differences between UID, GID and Shadow.mp4 37 MB
13. Permissions/3. File and Dir Permissions.mp4 86.78 MB
13. Permissions/4. Examples with File Permissions.mp4 17.74 MB
13. Permissions/5. After this video you'll understand all LINUX Permissions.mp4 140.93 MB
13. Permissions/6. Chmod.mp4 93.14 MB
14. Managing Processes and Packages in Linux/1. Fundamentals of Processes in System.mp4 62.66 MB
14. Managing Processes and Packages in Linux/10. Trcrt command.mp4 60.73 MB
14. Managing Processes and Packages in Linux/11. Networking with Linux.mp4 49.13 MB
14. Managing Processes and Packages in Linux/2. The Magic with PS Aux Command.mp4 82.38 MB
14. Managing Processes and Packages in Linux/3. The Magic with TOP Command.mp4 93.72 MB
14. Managing Processes and Packages in Linux/4. Foreground and Background Processes.mp4 44.87 MB
14. Managing Processes and Packages in Linux/5. From Background to Foreground.mp4 24.56 MB
14. Managing Processes and Packages in Linux/6. The Tutorial with Linux Process Signals.mp4 77.88 MB
14. Managing Processes and Packages in Linux/7. Introduction to Packet Management Systems.mp4 48.01 MB
14. Managing Processes and Packages in Linux/8. Why we need package management tools.mp4 21.89 MB
14. Managing Processes and Packages in Linux/9. Package Management in Linux - Final.mp4 69.4 MB
15. C++ for Reverse Engineering - Section 1/1. CPP Newlines,Tabs and Spaces.mp4 41.27 MB
15. C++ for Reverse Engineering - Section 1/10. Beginning to Pointers.mp4 28.75 MB
15. C++ for Reverse Engineering - Section 1/11. Namespaces in CPP.mp4 83.98 MB
15. C++ for Reverse Engineering - Section 1/12. Scoping Variables and Static Keyword.mp4 126.44 MB
15. C++ for Reverse Engineering - Section 1/13. Conditional Statements.mp4 61.32 MB
15. C++ for Reverse Engineering - Section 1/2. Initializers in CPP.mp4 60.22 MB
15. C++ for Reverse Engineering - Section 1/3. CPP Writing Styles.mp4 45.55 MB
15. C++ for Reverse Engineering - Section 1/4. Statements and Expressions, RVALUE and LVALUE.mp4 57.18 MB
15. C++ for Reverse Engineering - Section 1/5. Comma.mp4 27.06 MB
15. C++ for Reverse Engineering - Section 1/6. Types and Variables.mp4 72.5 MB
15. C++ for Reverse Engineering - Section 1/7. Literals in CPP.mp4 28.42 MB
15. C++ for Reverse Engineering - Section 1/8. Defining Constants.mp4 34.95 MB
15. C++ for Reverse Engineering - Section 1/9. Const Expressions.mp4 22.44 MB
16. Variable Types in Programming CC++/1. Types in CPP - Binary,Octal and Hex.mp4 71.32 MB
16. Variable Types in Programming CC++/2. Floating Point types in CPP - Float, Double, Long Double.mp4 83.48 MB
16. Variable Types in Programming CC++/3. Char types in C.mp4 92.76 MB
16. Variable Types in Programming CC++/4. Enum Types.mp4 61.47 MB
16. Variable Types in Programming CC++/5. Boolean Types and Comparison Operators.mp4 92.57 MB
16. Variable Types in Programming CC++/6. Void Type and Void Function.mp4 17.18 MB
16. Variable Types in Programming CC++/7. Operators 101.mp4 97.19 MB
16. Variable Types in Programming CC++/8. Default Values in CPP.mp4 47.75 MB
17. How Conditional Statements work Reverse Engineering and C/1. Switch Statement with ENUM.mp4 92.38 MB
17. How Conditional Statements work Reverse Engineering and C/2. Conditional Statements in CPP.mp4 110.09 MB
17. How Conditional Statements work Reverse Engineering and C/3. For Loop.mp4 48.58 MB
17. How Conditional Statements work Reverse Engineering and C/4. Continue Keyword.mp4 14.35 MB
17. How Conditional Statements work Reverse Engineering and C/5. Do-While Loop.mp4 20.96 MB
17. How Conditional Statements work Reverse Engineering and C/6. Goto.mp4 13.59 MB
18. Introduction to CPP Classes/1. Unions in CPP.mp4 44.44 MB
18. Introduction to CPP Classes/2. Methods in Struct.mp4 29.09 MB
18. Introduction to CPP Classes/3. Access Controls in CPP.mp4 48.26 MB
18. Introduction to CPP Classes/4. Classes and Initializing Class Member.mp4 31.15 MB
18. Introduction to CPP Classes/5. Constructors.mp4 24.85 MB
18. Introduction to CPP Classes/6. Destructors in CPP.mp4 11.21 MB
18. Introduction to CPP Classes/7. Initializers in CPP.mp4 60.22 MB
19. Introduction to Pointers/1. Pointers in CPP.mp4 99.78 MB
19. Introduction to Pointers/10. Allocating memory as arrays.mp4 18.04 MB
19. Introduction to Pointers/11. Lifetime of Memory.mp4 22.83 MB
19. Introduction to Pointers/2. C++ Beginning to Pointers.mp4 40.96 MB
19. Introduction to Pointers/3. Dereference Operator in CPP.mp4 62.67 MB
19. Introduction to Pointers/4. Pointers and Arrays.mp4 62.83 MB
19. Introduction to Pointers/5. nullptr.mp4 18.42 MB
19. Introduction to Pointers/6. Pointer arithmetic in CPP.mp4 49.82 MB
19. Introduction to Pointers/7. Arrays out of bounds and Deallocating Pointers=.mp4 29.72 MB
19. Introduction to Pointers/8. Consts and Casts with Pointers=.mp4 45.24 MB
19. Introduction to Pointers/9. Allocating Memory.mp4 22.71 MB
2. Installing Ghidra for Reverse Engineering and Malware Analysis/1. Downloading Ghidra and File Structure.mp4 80.09 MB
2. Installing Ghidra for Reverse Engineering and Malware Analysis/2. Installing JDK in Linux.mp4 48.53 MB
2. Installing Ghidra for Reverse Engineering and Malware Analysis/3. Installing JDK in Windows or MacOS.mp4 32.11 MB
20. STL and References in C++/1. STL,Vectors and Arrays.mp4 57.09 MB
20. STL and References in C++/2. References.mp4 33.68 MB
20. STL and References in C++/3. Example Project With References.mp4 32.07 MB
20. STL and References in C++/4. Code Example with AUTO, TUPLE and FOR LOOP.mp4 89.92 MB
20. STL and References in C++/5. Range Based for Loop.mp4 51.26 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/1. Pointers in Practice.mp4 24.34 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/10. Functions - Part 5.mp4 39.24 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/11. Functions - Part 7.mp4 16.79 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/2. Pointers in Practice - Part 2.mp4 57.72 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/3. Pointers in Practice - Part 3.mp4 25.71 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/4. Pointers in Practice - Part 4.mp4 35.01 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/5. Introduction to Functions.mp4 35.2 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/6. Functions - Part 1.mp4 25.74 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/7. Functions - Part 2.mp4 44.75 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/8. Functions - Part 3.mp4 41.68 MB
21. Pointer and Functions Reverse Engineering and Malware Analysis/9. Functions - Part 4.mp4 49.13 MB
22. Data Structures in CC++/1. Introduction to Basic CPP Programming.mp4 57.54 MB
22. Data Structures in CC++/10. Introduction to STL.mp4 19.89 MB
22. Data Structures in CC++/11. Algorithm Analysis.mp4 67.79 MB
22. Data Structures in CC++/12. Scenario Analysis.mp4 53.18 MB
22. Data Structures in CC++/13. Developing Main.mp4 16.07 MB
22. Data Structures in CC++/14. Factorial Method.mp4 26.99 MB
22. Data Structures in CC++/2. Creating Random Card Generator Using Enum and rand.mp4 102.69 MB
22. Data Structures in CC++/3. Developing main Function and using static_cast.mp4 71.68 MB
22. Data Structures in CC++/4. Introduction to ADT.mp4 16.17 MB
22. Data Structures in CC++/5. Creating ADT Class and using Constructors.mp4 67.58 MB
22. Data Structures in CC++/6. Virtual Methods and Overriding from Class.mp4 57.23 MB
22. Data Structures in CC++/7. Controlling Copy Operations with ADT.mp4 38.7 MB
22. Data Structures in CC++/8. Starting with Templates.mp4 53.54 MB
22. Data Structures in CC++/9. Class Templates in CPP.mp4 116.78 MB
23. ADT and Nodes in C++ for Reverse Engineering/1. Creating List ADT.mp4 66.94 MB
23. ADT and Nodes in C++ for Reverse Engineering/10. Developing Search Operation.mp4 50.03 MB
23. ADT and Nodes in C++ for Reverse Engineering/11. Removing Items.mp4 120.44 MB
23. ADT and Nodes in C++ for Reverse Engineering/2. Developing Get and Insert Methods.mp4 51.36 MB
23. ADT and Nodes in C++ for Reverse Engineering/3. Developing Search and Remove Methods.mp4 68.46 MB
23. ADT and Nodes in C++ for Reverse Engineering/4. Testing ADT List.mp4 121.34 MB
23. ADT and Nodes in C++ for Reverse Engineering/5. Node and Chaining Example.mp4 102.88 MB
23. ADT and Nodes in C++ for Reverse Engineering/6. Creating and Chaining nodes with Different data types.mp4 73.07 MB
23. ADT and Nodes in C++ for Reverse Engineering/7. Creating Custom Linked List.mp4 87.2 MB
23. ADT and Nodes in C++ for Reverse Engineering/8. Get Method.mp4 45.94 MB
23. ADT and Nodes in C++ for Reverse Engineering/9. Developing InsertHead, InsertTail and Insert Methods.mp4 148.68 MB
24. Learning ARRAYS for Reverse Engineering and Malware Analysis/1. Understanding Arrays.mp4 47.49 MB
24. Learning ARRAYS for Reverse Engineering and Malware Analysis/2. Manipulating Arrays.mp4 60.83 MB
24. Learning ARRAYS for Reverse Engineering and Malware Analysis/3. Starting with Array Pointers.mp4 60.27 MB
24. Learning ARRAYS for Reverse Engineering and Malware Analysis/4. Pointer Increment vs Array Indexing.mp4 49.19 MB
3. Starting with Ghidra/1. Opening project in Ghidra.mp4 84.49 MB
3. Starting with Ghidra/2. Discovering Ghidra.mp4 61.21 MB
4. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4 116.68 MB
4. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4 103.17 MB
4. Malware Analysis and Reverse Engineering with Ghidra/3. OSINT for Reverse Engineering.mp4 52.56 MB
4. Malware Analysis and Reverse Engineering with Ghidra/4. Analyzing Libraries that Malware Uses.mp4 23.05 MB
4. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4 121.56 MB
4. Malware Analysis and Reverse Engineering with Ghidra/6. Finding Entry Points and Changing Undefined Function Names.mp4 46.4 MB
5. Binary Analysis/1. Analysis of Binary and 4 Stages of Compilation.mp4 33.5 MB
5. Binary Analysis/2. Preprocessing.mp4 59.44 MB
5. Binary Analysis/3. Compilation Phase.mp4 38.68 MB
5. Binary Analysis/4. Assembly Phase.mp4 38.19 MB
5. Binary Analysis/5. Linking Phase.mp4 93.96 MB
6. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4 103.79 MB
6. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4 156.64 MB
6. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4 106.83 MB
6. Symbols, Stripped and Not Stripped Binaries/4. How binary loads and executes in theory.mp4 64.48 MB
7. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4 147.16 MB
7. Linux - ELF Format/2. Learning ELF Fields.mp4 128.73 MB
7. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4 155.48 MB
8. Windows - PE Format/1. Learning Windows PE Format.mp4 197.19 MB
9. IDA Pro IDA Freeware/1. Downloading and Installing IDA Pro IDA Freeware.mp4 66.93 MB
9. IDA Pro IDA Freeware/2. Being friends with IDA.mp4 55.49 MB
9. IDA Pro IDA Freeware/3. Useful Tabs in IDA.mp4 63.02 MB
其他位置