Malware Analysis and Development
Buy now
Learn more
Introduction
00-Introduction.mp4
MalwareAnalysisAndDevelopmentLabs.pdf
MalwareAnalysisAndDevelopment.pdf
Labs.zip
Demos.zip
Malware Samples.zip
Malware Samples Zip Password
Windows Internals Overview
1-Processes.mp4
2-Task Manager.mp4
3-Process Explorer.mp4
4-Virtual Memory.mp4
5-Threads.mp4
6-System Architecture.mp4
7-APIs.mp4
8-Objects and Handles.mp4
9-Labs Intro.mp4
Windows Application Development Fundamentals
1-Application Development Fundamentals.mp4
2-Working with Strings.mp4
3-System Information.mp4
4-Working with Handles.mp4
5-Sharing Objects by Name.mp4
6-Duplicating Handles.mp4
7-Object Names and Sessions.mp4
8-Sessions.mp4
9-Private Object Namespace.mp4
Processes, Memory and Threads
1-Process Creation.mp4
2-The CreateProcess API.mp4
3-Process Termination.mp4
4-Labs Solution Walkthrough.mp4
5-DllMain.mp4
6-Process and Thread Attributes.mp4
7-Process Enumeration.mp4
8-PEB and Other Details.mp4
9-Process Memory.mp4
10-Reserving and Committing Memory.mp4
11-Heaps.mp4
12-Threads Basics.mp4
13-Creating Threads.mp4
14-Odds and Ends.mp4
Dynamic Link Libraries
1-Building DLLs.mp4
2-Consuming DLLs.mp4
3-Reducing Dependencies.mp4
4-DLL Injection with a Remote Thread.mp4
5-DLL Injection with an APC.mp4
6-Odds and Ends.mp4
x86/x64 Fundamentals
1-Operating Modes.mp4
2-Assembling with Visual Studio.mp4
3-x86/x64 Basics.mp4
4-Operands and Address Modes.mp4
5-Fundamental Instructions.mp4
6-Calling External Functions.mp4
7-Calling Conventions.mp4
8-Bitwise Operations.mp4
9-Branch Instructions.mp4
10-The Stack.mp4
11-Shellcode.mp4
12-Injecting Shellcode.mp4
13-Odds and Ends.mp4
.NET Fundamentals
.NET Fundamentals.mp4
COM Fundamentals
1-COM Basics.mp4
2-COM Concepts, Clients and Servers.mp4
3-Creating and Using a COM Object.mp4
4-Smart Pointers.mp4
5-OLE/COM Object Viewer.mp4
6-COM Activation in Detail.mp4
The Native API
1-Native API Basics.mp4
2-Object Manager and Native APIs.mp4
3-Registry APIs.mp4
4-Enumertaing Processes and Handles.mp4
Introduction to Malware Analysis and Lab Setup
1 - The Importance of Understanding and Dissecting TTPs.mp4
2 - Introduction to Malware Analysis.mp4
3 - Understanding AV-EDR Vendor Detection Names.mp4
4 - Installing Flare-VM.mp4
5 - PE 101 - Part 1.mp4
6 - PE 101 - Part 2.mp4
7 - Strings.mp4
8 - Packing Detection - Part 1.mp4
9 - Packing Detection - Part 2.mp4
10 - Packing Detection - Part 3.mp4
11 - Detecting Malicious Functionality.mp4
Reverse Engineering .NET, VBA and Shellcode Malware
1 - Introduction to the SolarWinds Sunburst Attack.mp4
2 - Sunburst Backdoor Initial Analysis.mp4
3 - Sunburst Backdoor Backtracking (Function Call Tree Analysis).mp4
4 - Sunburst Backdoor Reverse Engineering - Part 1.mp4
5 - Sunburst Backdoor Reverse Engineering - Part 2.mp4
6 - Sunburst Backdoor Reverse Engineering - Part 3.mp4
7 - Sunburst Backdoor Reverse Engineering - Part 4.mp4
8 - Sunburst Backdoor Reverse Engineering - Part 5.mp4
9 - VBA Macro Shellcode Analysis - Part 1.mp4
10 - VBA Macro Shellcode Analysis - Part 2.mp4
11 - VBA Macro Shellcode Analysis - Part 3.mp4
Reverse Engineering C/C++ Malware
1 - DarkSide Ransomware Initial Analysis.mp4
2 - Runtime Code Unpacking - Part 1.mp4
3 - Runtime Code Unpacking - Part 2.mp4
4 - Runtime Code Unpacking - Part 3.mp4
5 - Dynamic API Resolve.mp4
6 - Rebuilding the IAT (Import Address Table).mp4
7 - DarkSide Ransomware TTPs Dissection - Part 1.mp4
8 - DarkSide Ransomware TTPs Dissection - Part 2.mp4
Malware Development
1-Minimal Executables.mp4
2-DarkSide Malware Techniques.mp4
3-Simple Memory Sharing.mp4
4-Memory Mapped Files.mp4
5-Payload in Resources.mp4
6-More Techniques.mp4
Bonus Content
One Electron to Rule Them All.mp4
Products
Course
Section
Lesson
5-DLL Injection with an APC.mp4
5-DLL Injection with an APC.mp4
Malware Analysis and Development
Buy now
Learn more
Introduction
00-Introduction.mp4
MalwareAnalysisAndDevelopmentLabs.pdf
MalwareAnalysisAndDevelopment.pdf
Labs.zip
Demos.zip
Malware Samples.zip
Malware Samples Zip Password
Windows Internals Overview
1-Processes.mp4
2-Task Manager.mp4
3-Process Explorer.mp4
4-Virtual Memory.mp4
5-Threads.mp4
6-System Architecture.mp4
7-APIs.mp4
8-Objects and Handles.mp4
9-Labs Intro.mp4
Windows Application Development Fundamentals
1-Application Development Fundamentals.mp4
2-Working with Strings.mp4
3-System Information.mp4
4-Working with Handles.mp4
5-Sharing Objects by Name.mp4
6-Duplicating Handles.mp4
7-Object Names and Sessions.mp4
8-Sessions.mp4
9-Private Object Namespace.mp4
Processes, Memory and Threads
1-Process Creation.mp4
2-The CreateProcess API.mp4
3-Process Termination.mp4
4-Labs Solution Walkthrough.mp4
5-DllMain.mp4
6-Process and Thread Attributes.mp4
7-Process Enumeration.mp4
8-PEB and Other Details.mp4
9-Process Memory.mp4
10-Reserving and Committing Memory.mp4
11-Heaps.mp4
12-Threads Basics.mp4
13-Creating Threads.mp4
14-Odds and Ends.mp4
Dynamic Link Libraries
1-Building DLLs.mp4
2-Consuming DLLs.mp4
3-Reducing Dependencies.mp4
4-DLL Injection with a Remote Thread.mp4
5-DLL Injection with an APC.mp4
6-Odds and Ends.mp4
x86/x64 Fundamentals
1-Operating Modes.mp4
2-Assembling with Visual Studio.mp4
3-x86/x64 Basics.mp4
4-Operands and Address Modes.mp4
5-Fundamental Instructions.mp4
6-Calling External Functions.mp4
7-Calling Conventions.mp4
8-Bitwise Operations.mp4
9-Branch Instructions.mp4
10-The Stack.mp4
11-Shellcode.mp4
12-Injecting Shellcode.mp4
13-Odds and Ends.mp4
.NET Fundamentals
.NET Fundamentals.mp4
COM Fundamentals
1-COM Basics.mp4
2-COM Concepts, Clients and Servers.mp4
3-Creating and Using a COM Object.mp4
4-Smart Pointers.mp4
5-OLE/COM Object Viewer.mp4
6-COM Activation in Detail.mp4
The Native API
1-Native API Basics.mp4
2-Object Manager and Native APIs.mp4
3-Registry APIs.mp4
4-Enumertaing Processes and Handles.mp4
Introduction to Malware Analysis and Lab Setup
1 - The Importance of Understanding and Dissecting TTPs.mp4
2 - Introduction to Malware Analysis.mp4
3 - Understanding AV-EDR Vendor Detection Names.mp4
4 - Installing Flare-VM.mp4
5 - PE 101 - Part 1.mp4
6 - PE 101 - Part 2.mp4
7 - Strings.mp4
8 - Packing Detection - Part 1.mp4
9 - Packing Detection - Part 2.mp4
10 - Packing Detection - Part 3.mp4
11 - Detecting Malicious Functionality.mp4
Reverse Engineering .NET, VBA and Shellcode Malware
1 - Introduction to the SolarWinds Sunburst Attack.mp4
2 - Sunburst Backdoor Initial Analysis.mp4
3 - Sunburst Backdoor Backtracking (Function Call Tree Analysis).mp4
4 - Sunburst Backdoor Reverse Engineering - Part 1.mp4
5 - Sunburst Backdoor Reverse Engineering - Part 2.mp4
6 - Sunburst Backdoor Reverse Engineering - Part 3.mp4
7 - Sunburst Backdoor Reverse Engineering - Part 4.mp4
8 - Sunburst Backdoor Reverse Engineering - Part 5.mp4
9 - VBA Macro Shellcode Analysis - Part 1.mp4
10 - VBA Macro Shellcode Analysis - Part 2.mp4
11 - VBA Macro Shellcode Analysis - Part 3.mp4
Reverse Engineering C/C++ Malware
1 - DarkSide Ransomware Initial Analysis.mp4
2 - Runtime Code Unpacking - Part 1.mp4
3 - Runtime Code Unpacking - Part 2.mp4
4 - Runtime Code Unpacking - Part 3.mp4
5 - Dynamic API Resolve.mp4
6 - Rebuilding the IAT (Import Address Table).mp4
7 - DarkSide Ransomware TTPs Dissection - Part 1.mp4
8 - DarkSide Ransomware TTPs Dissection - Part 2.mp4
Malware Development
1-Minimal Executables.mp4
2-DarkSide Malware Techniques.mp4
3-Simple Memory Sharing.mp4
4-Memory Mapped Files.mp4
5-Payload in Resources.mp4
6-More Techniques.mp4
Bonus Content
One Electron to Rule Them All.mp4
Lesson unavailable
Please
login to your account
or
buy the course
.