Malware Samples Zip Password

Malware Samples Zip Password

Preview unavailable

You must log in or sign up to view this lesson.

LoginSign up

Malware Analysis and Development

Buy nowLearn more

Introduction

  • 00-Introduction.mp4
  • MalwareAnalysisAndDevelopmentLabs.pdf
  • MalwareAnalysisAndDevelopment.pdf
  • Labs.zip
  • Demos.zip
  • Malware Samples.zip
  • Malware Samples Zip Password

Windows Internals Overview

  • 1-Processes.mp4
  • 2-Task Manager.mp4
  • 3-Process Explorer.mp42
  • 4-Virtual Memory.mp42
  • 5-Threads.mp44
  • 6-System Architecture.mp42
  • 7-APIs.mp4
  • 8-Objects and Handles.mp45
  • 9-Labs Intro.mp4

Windows Application Development Fundamentals

  • 1-Application Development Fundamentals.mp4
  • 2-Working with Strings.mp4
  • 3-System Information.mp4
  • 4-Working with Handles.mp4
  • 5-Sharing Objects by Name.mp42
  • 6-Duplicating Handles.mp4
  • 7-Object Names and Sessions.mp4
  • 8-Sessions.mp4
  • 9-Private Object Namespace.mp4

Processes, Memory and Threads

  • 1-Process Creation.mp4
  • 2-The CreateProcess API.mp4
  • 3-Process Termination.mp4
  • 4-Labs Solution Walkthrough.mp4
  • 5-DllMain.mp4
  • 6-Process and Thread Attributes.mp4
  • 7-Process Enumeration.mp4
  • 8-PEB and Other Details.mp4
  • 9-Process Memory.mp4
  • 10-Reserving and Committing Memory.mp4
  • 11-Heaps.mp4
  • 12-Threads Basics.mp4
  • 13-Creating Threads.mp4
  • 14-Odds and Ends.mp4

Dynamic Link Libraries

  • 1-Building DLLs.mp4
  • 2-Consuming DLLs.mp4
  • 3-Reducing Dependencies.mp4
  • 4-DLL Injection with a Remote Thread.mp42
  • 5-DLL Injection with an APC.mp4
  • 6-Odds and Ends.mp4

x86/x64 Fundamentals

  • 1-Operating Modes.mp4
  • 2-Assembling with Visual Studio.mp4
  • 3-x86/x64 Basics.mp4
  • 4-Operands and Address Modes.mp4
  • 5-Fundamental Instructions.mp4
  • 6-Calling External Functions.mp4
  • 7-Calling Conventions.mp4
  • 8-Bitwise Operations.mp4
  • 9-Branch Instructions.mp4
  • 10-The Stack.mp4
  • 11-Shellcode.mp4
  • 12-Injecting Shellcode.mp4
  • 13-Odds and Ends.mp4

.NET Fundamentals

  • .NET Fundamentals.mp4

COM Fundamentals

  • 1-COM Basics.mp4
  • 2-COM Concepts, Clients and Servers.mp4
  • 3-Creating and Using a COM Object.mp4
  • 4-Smart Pointers.mp4
  • 5-OLE/COM Object Viewer.mp4
  • 6-COM Activation in Detail.mp4

The Native API

  • 1-Native API Basics.mp4
  • 2-Object Manager and Native APIs.mp4
  • 3-Registry APIs.mp4
  • 4-Enumerating Processes and Handles.mp4

Introduction to Malware Analysis and Lab Setup

  • 1 - The Importance of Understanding and Dissecting TTPs.mp4
  • 2 - Introduction to Malware Analysis.mp4
  • 3 - Understanding AV-EDR Vendor Detection Names.mp4
  • 4 - Installing Flare-VM.mp4
  • 5 - PE 101 - Part 1.mp4
  • 6 - PE 101 - Part 2.mp4
  • 7 - Strings.mp4
  • 8 - Packing Detection - Part 1.mp4
  • 9 - Packing Detection - Part 2.mp4
  • 10 - Packing Detection - Part 3.mp4
  • 11 - Detecting Malicious Functionality.mp4

Reverse Engineering .NET, VBA and Shellcode Malware

  • 1 - Introduction to the SolarWinds Sunburst Attack.mp4
  • 2 - Sunburst Backdoor Initial Analysis.mp4
  • 3 - Sunburst Backdoor Backtracking (Function Call Tree Analysis).mp4
  • 4 - Sunburst Backdoor Reverse Engineering - Part 1.mp4
  • 5 - Sunburst Backdoor Reverse Engineering - Part 2.mp4
  • 6 - Sunburst Backdoor Reverse Engineering - Part 3.mp4
  • 7 - Sunburst Backdoor Reverse Engineering - Part 4.mp4
  • 8 - Sunburst Backdoor Reverse Engineering - Part 5.mp4
  • 9 - VBA Macro Shellcode Analysis - Part 1.mp4
  • 10 - VBA Macro Shellcode Analysis - Part 2.mp4
  • 11 - VBA Macro Shellcode Analysis - Part 3.mp4

Reverse Engineering C/C++ Malware

  • 1 - DarkSide Ransomware Initial Analysis.mp4
  • 2 - Runtime Code Unpacking - Part 1.mp4
  • 3 - Runtime Code Unpacking - Part 2.mp4
  • 4 - Runtime Code Unpacking - Part 3.mp4
  • 5 - Dynamic API Resolve.mp4
  • 6 - Rebuilding the IAT (Import Address Table).mp4
  • 7 - DarkSide Ransomware TTPs Dissection - Part 1.mp4
  • 8 - DarkSide Ransomware TTPs Dissection - Part 2.mp4

Malware Development

  • 1-Minimal Executables.mp4
  • 2-DarkSide Malware Techniques.mp4
  • 3-Simple Memory Sharing.mp4
  • 4-Memory Mapped Files.mp4
  • 5-Payload in Resources.mp4
  • 6-More Techniques.mp4

Bonus Content

  • One Electron to Rule Them All.mp4
  • For serious people only - MAoS - Malware Analysis on Steroids.mp4