Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
5,180 results
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...
1,055,448 views
5 years ago
Rabbit holes are the arch enemy of reverse engineers. Some simple habits will help you to avoid them. We analyse a sample that ...
4,457 views
Automatic sandbox systems like Hybrid-Analysis are a great way to speed up malware analysis. We find a file flagged as ...
7,941 views
3 years ago
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...
1,380 views
Learn how to write code based signatures. Become proficient in detecting malware samples that have no plain text strings.
3,059 views
1 year ago
This is a step by step tutorial for building your own malware analysis lab with Remnux MCP. Discord: ...
3,891 views
1 month ago
For more content, subscribe on Twitch! https://twitch.tv/johnhammond010 If you would like to support me, please like, comment ...
106,750 views
Connecting With Us --------------------------------------------------- + Hire Us For A Project: https://lawrencesystems.com/hire-us/ + Tom ...
11,428 views
385,748 views
We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...
1,837 views
6 months ago
How I got into malware analysis and what disassemblers I recommend for a newbie 00:16 - How did you get into malware ...
11,131 views
8 years ago
This video has a newer, updated version here: https://youtu.be/k2gzFV2-czc I tried three free disassemblers and decompilers and ...
22,999 views
Volatility is a very powerful memory forensics tool. It is used to extract information from memory images (memory dumps) of ...
97,366 views
4 years ago
This video shows how to debloat samples that have been bloated in the most typical way: appending zero bytes. Udemy course: ...
9,009 views
Many applications have thousands of files, making even non-obfuscated malware sometimes challenging. This malware is based ...
3,295 views
4 months ago
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: ...
7,702 views
6 years ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...
9,376 views
We look at two techniques for MS Office files to load and execute malicious code without Macros, namely VSTO Add-ins and ...
4,183 views
3 months ago
To obtain more IoCs we analyse the second stage DLL that we decrypted in the first 3CX video. With IDA Free we determine the ...
1,497 views
We create a C2 extractor for APT malware Kopiluwak. For that we need to unpack two layers of code (JScript, VBA) and remove ...
1,727 views
2 years ago