Malware Analysis and Development
Buy now
Learn more
Introduction
00-Introduction.mp4
MalwareAnalysisAndDevelopmentLabs.pdf
MalwareAnalysisAndDevelopment.pdf
Labs.zip
Demos.zip
Malware Samples.zip
Malware Samples Zip Password
Windows Internals Overview
1-Processes.mp4
2-Task Manager.mp4
3-Process Explorer.mp4
4-Virtual Memory.mp4
5-Threads.mp4
6-System Architecture.mp4
7-APIs.mp4
8-Objects and Handles.mp4
9-Labs Intro.mp4
Windows Application Development Fundamentals
1-Application Development Fundamentals.mp4
2-Working with Strings.mp4
3-System Information.mp4
4-Working with Handles.mp4
5-Sharing Objects by Name.mp4
6-Duplicating Handles.mp4
7-Object Names and Sessions.mp4
8-Sessions.mp4
9-Private Object Namespace.mp4
Processes, Memory and Threads
1-Process Creation.mp4
2-The CreateProcess API.mp4
3-Process Termination.mp4
4-Labs Solution Walkthrough.mp4
5-DllMain.mp4
6-Process and Thread Attributes.mp4
7-Process Enumeration.mp4
8-PEB and Other Details.mp4
9-Process Memory.mp4
10-Reserving and Committing Memory.mp4
11-Heaps.mp4
12-Threads Basics.mp4
13-Creating Threads.mp4
14-Odds and Ends.mp4
Dynamic Link Libraries
1-Building DLLs.mp4
2-Consuming DLLs.mp4
3-Reducing Dependencies.mp4
4-DLL Injection with a Remote Thread.mp4
5-DLL Injection with an APC.mp4
6-Odds and Ends.mp4
x86/x64 Fundamentals
1-Operating Modes.mp4
2-Assembling with Visual Studio.mp4
3-x86/x64 Basics.mp4
4-Operands and Address Modes.mp4
5-Fundamental Instructions.mp4
6-Calling External Functions.mp4
7-Calling Conventions.mp4
8-Bitwise Operations.mp4
9-Branch Instructions.mp4
10-The Stack.mp4
11-Shellcode.mp4
12-Injecting Shellcode.mp4
13-Odds and Ends.mp4
.NET Fundamentals
.NET Fundamentals.mp4
COM Fundamentals
1-COM Basics.mp4
2-COM Concepts, Clients and Servers.mp4
3-Creating and Using a COM Object.mp4
4-Smart Pointers.mp4
5-OLE/COM Object Viewer.mp4
6-COM Activation in Detail.mp4
The Native API
1-Native API Basics.mp4
2-Object Manager and Native APIs.mp4
3-Registry APIs.mp4
4-Enumertaing Processes and Handles.mp4
Introduction to Malware Analysis and Lab Setup
1 - The Importance of Understanding and Dissecting TTPs.mp4
2 - Introduction to Malware Analysis.mp4
3 - Understanding AV-EDR Vendor Detection Names.mp4
4 - Installing Flare-VM.mp4
5 - PE 101 - Part 1.mp4
6 - PE 101 - Part 2.mp4
7 - Strings.mp4
8 - Packing Detection - Part 1.mp4
9 - Packing Detection - Part 2.mp4
10 - Packing Detection - Part 3.mp4
11 - Detecting Malicious Functionality.mp4
Reverse Engineering .NET, VBA and Shellcode Malware
1 - Introduction to the SolarWinds Sunburst Attack.mp4
2 - Sunburst Backdoor Initial Analysis.mp4
3 - Sunburst Backdoor Backtracking (Function Call Tree Analysis).mp4
4 - Sunburst Backdoor Reverse Engineering - Part 1.mp4
5 - Sunburst Backdoor Reverse Engineering - Part 2.mp4
6 - Sunburst Backdoor Reverse Engineering - Part 3.mp4
7 - Sunburst Backdoor Reverse Engineering - Part 4.mp4
8 - Sunburst Backdoor Reverse Engineering - Part 5.mp4
9 - VBA Macro Shellcode Analysis - Part 1.mp4
10 - VBA Macro Shellcode Analysis - Part 2.mp4
11 - VBA Macro Shellcode Analysis - Part 3.mp4
Reverse Engineering C/C++ Malware
1 - DarkSide Ransomware Initial Analysis.mp4
2 - Runtime Code Unpacking - Part 1.mp4
3 - Runtime Code Unpacking - Part 2.mp4
4 - Runtime Code Unpacking - Part 3.mp4
5 - Dynamic API Resolve.mp4
6 - Rebuilding the IAT (Import Address Table).mp4
7 - DarkSide Ransomware TTPs Dissection - Part 1.mp4
8 - DarkSide Ransomware TTPs Dissection - Part 2.mp4
Malware Development
1-Minimal Executables.mp4
2-DarkSide Malware Techniques.mp4
3-Simple Memory Sharing.mp4
4-Memory Mapped Files.mp4
5-Payload in Resources.mp4
6-More Techniques.mp4
Bonus Content
One Electron to Rule Them All.mp4
Products
Course
Section
Introduction to Malware Analysis and Lab Setup
Introduction to Malware Analysis and Lab Setup
Malware Analysis and Development
Buy now
Learn more
Introduction
00-Introduction.mp4
MalwareAnalysisAndDevelopmentLabs.pdf
MalwareAnalysisAndDevelopment.pdf
Labs.zip
Demos.zip
Malware Samples.zip
Malware Samples Zip Password
Windows Internals Overview
1-Processes.mp4
2-Task Manager.mp4
3-Process Explorer.mp4
4-Virtual Memory.mp4
5-Threads.mp4
6-System Architecture.mp4
7-APIs.mp4
8-Objects and Handles.mp4
9-Labs Intro.mp4
Windows Application Development Fundamentals
1-Application Development Fundamentals.mp4
2-Working with Strings.mp4
3-System Information.mp4
4-Working with Handles.mp4
5-Sharing Objects by Name.mp4
6-Duplicating Handles.mp4
7-Object Names and Sessions.mp4
8-Sessions.mp4
9-Private Object Namespace.mp4
Processes, Memory and Threads
1-Process Creation.mp4
2-The CreateProcess API.mp4
3-Process Termination.mp4
4-Labs Solution Walkthrough.mp4
5-DllMain.mp4
6-Process and Thread Attributes.mp4
7-Process Enumeration.mp4
8-PEB and Other Details.mp4
9-Process Memory.mp4
10-Reserving and Committing Memory.mp4
11-Heaps.mp4
12-Threads Basics.mp4
13-Creating Threads.mp4
14-Odds and Ends.mp4
Dynamic Link Libraries
1-Building DLLs.mp4
2-Consuming DLLs.mp4
3-Reducing Dependencies.mp4
4-DLL Injection with a Remote Thread.mp4
5-DLL Injection with an APC.mp4
6-Odds and Ends.mp4
x86/x64 Fundamentals
1-Operating Modes.mp4
2-Assembling with Visual Studio.mp4
3-x86/x64 Basics.mp4
4-Operands and Address Modes.mp4
5-Fundamental Instructions.mp4
6-Calling External Functions.mp4
7-Calling Conventions.mp4
8-Bitwise Operations.mp4
9-Branch Instructions.mp4
10-The Stack.mp4
11-Shellcode.mp4
12-Injecting Shellcode.mp4
13-Odds and Ends.mp4
.NET Fundamentals
.NET Fundamentals.mp4
COM Fundamentals
1-COM Basics.mp4
2-COM Concepts, Clients and Servers.mp4
3-Creating and Using a COM Object.mp4
4-Smart Pointers.mp4
5-OLE/COM Object Viewer.mp4
6-COM Activation in Detail.mp4
The Native API
1-Native API Basics.mp4
2-Object Manager and Native APIs.mp4
3-Registry APIs.mp4
4-Enumertaing Processes and Handles.mp4
Introduction to Malware Analysis and Lab Setup
1 - The Importance of Understanding and Dissecting TTPs.mp4
2 - Introduction to Malware Analysis.mp4
3 - Understanding AV-EDR Vendor Detection Names.mp4
4 - Installing Flare-VM.mp4
5 - PE 101 - Part 1.mp4
6 - PE 101 - Part 2.mp4
7 - Strings.mp4
8 - Packing Detection - Part 1.mp4
9 - Packing Detection - Part 2.mp4
10 - Packing Detection - Part 3.mp4
11 - Detecting Malicious Functionality.mp4
Reverse Engineering .NET, VBA and Shellcode Malware
1 - Introduction to the SolarWinds Sunburst Attack.mp4
2 - Sunburst Backdoor Initial Analysis.mp4
3 - Sunburst Backdoor Backtracking (Function Call Tree Analysis).mp4
4 - Sunburst Backdoor Reverse Engineering - Part 1.mp4
5 - Sunburst Backdoor Reverse Engineering - Part 2.mp4
6 - Sunburst Backdoor Reverse Engineering - Part 3.mp4
7 - Sunburst Backdoor Reverse Engineering - Part 4.mp4
8 - Sunburst Backdoor Reverse Engineering - Part 5.mp4
9 - VBA Macro Shellcode Analysis - Part 1.mp4
10 - VBA Macro Shellcode Analysis - Part 2.mp4
11 - VBA Macro Shellcode Analysis - Part 3.mp4
Reverse Engineering C/C++ Malware
1 - DarkSide Ransomware Initial Analysis.mp4
2 - Runtime Code Unpacking - Part 1.mp4
3 - Runtime Code Unpacking - Part 2.mp4
4 - Runtime Code Unpacking - Part 3.mp4
5 - Dynamic API Resolve.mp4
6 - Rebuilding the IAT (Import Address Table).mp4
7 - DarkSide Ransomware TTPs Dissection - Part 1.mp4
8 - DarkSide Ransomware TTPs Dissection - Part 2.mp4
Malware Development
1-Minimal Executables.mp4
2-DarkSide Malware Techniques.mp4
3-Simple Memory Sharing.mp4
4-Memory Mapped Files.mp4
5-Payload in Resources.mp4
6-More Techniques.mp4
Bonus Content
One Electron to Rule Them All.mp4
11 Lessons
1 - The Importance of Understanding and Dissecting TTPs.mp4
2 - Introduction to Malware Analysis.mp4
3 - Understanding AV-EDR Vendor Detection Names.mp4
4 - Installing Flare-VM.mp4
5 - PE 101 - Part 1.mp4
6 - PE 101 - Part 2.mp4
7 - Strings.mp4
8 - Packing Detection - Part 1.mp4
9 - Packing Detection - Part 2.mp4
10 - Packing Detection - Part 3.mp4
11 - Detecting Malicious Functionality.mp4