ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

5,180 results

John Hammond
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

42:23
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

1,055,448 views

5 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Simple Habits to Stop Going Down the Rabbit Hole

Rabbit holes are the arch enemy of reverse engineers. Some simple habits will help you to avoid them. We analyse a sample that ...

33:43
Malware Analysis - Simple Habits to Stop Going Down the Rabbit Hole

4,457 views

5 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Hybrid Analysis for Malware Assessment

Automatic sandbox systems like Hybrid-Analysis are a great way to speed up malware analysis. We find a file flagged as ...

37:28
Malware Analysis - Hybrid Analysis for Malware Assessment

7,941 views

3 years ago

Z. Cliffe Schreuders
Reverse Engineering and Malware Analysis: Part 1 Static Analysis

This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...

27:21
Reverse Engineering and Malware Analysis: Part 1 Static Analysis

1,380 views

5 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Writing Code Signatures

Learn how to write code based signatures. Become proficient in detecting malware samples that have no plain text strings.

40:54
Malware Analysis - Writing Code Signatures

3,059 views

1 year ago

MalwareAnalysisForHedgehogs
Build your own AI Malware Analysis Lab with Remnux

This is a step by step tutorial for building your own malware analysis lab with Remnux MCP. Discord: ...

32:56
Build your own AI Malware Analysis Lab with Remnux

3,891 views

1 month ago

John Hammond
HTA JScript to PowerShell - Novter Malware Analysis

For more content, subscribe on Twitch! https://twitch.tv/johnhammond010 If you would like to support me, please like, comment ...

1:24:19
HTA JScript to PowerShell - Novter Malware Analysis

106,750 views

5 years ago

Lawrence Systems
Digital Forensics: How Malware Can Hide In Plain Sight

Connecting With Us --------------------------------------------------- + Hire Us For A Project: https://lawrencesystems.com/hire-us/ + Tom ...

14:55
Digital Forensics: How Malware Can Hide In Plain Sight

11,428 views

5 years ago

John Hammond
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

1:12:12
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis

385,748 views

5 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Malicious NordVPN Setup, Beginner Sample

We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...

23:11
Malware Analysis - Malicious NordVPN Setup, Beginner Sample

1,837 views

6 months ago

MalwareAnalysisForHedgehogs
Ask An Analyst - How did I get Into Malware Analysis?

How I got into malware analysis and what disassemblers I recommend for a newbie 00:16 - How did you get into malware ...

6:57
Ask An Analyst - How did I get Into Malware Analysis?

11,131 views

8 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

This video has a newer, updated version here: https://youtu.be/k2gzFV2-czc I tried three free disassemblers and decompilers and ...

26:47
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

22,999 views

3 years ago

DFIRScience
Introduction to Memory Forensics with Volatility 3

Volatility is a very powerful memory forensics tool. It is used to extract information from memory images (memory dumps) of ...

32:00
Introduction to Memory Forensics with Volatility 3

97,366 views

4 years ago

MalwareAnalysisForHedgehogs
How to deal with bloated malware  #malwareanalysis #debloat #shorts

This video shows how to debloat samples that have been bloated in the most typical way: appending zero bytes. Udemy course: ...

0:38
How to deal with bloated malware #malwareanalysis #debloat #shorts

9,009 views

1 year ago

MalwareAnalysisForHedgehogs
Malware Analysis - RenPy game, finding malware code in 2956 files, Beginner friendly

Many applications have thousands of files, making even non-obfuscated malware sometimes challenging. This malware is based ...

36:17
Malware Analysis - RenPy game, finding malware code in 2956 files, Beginner friendly

3,295 views

4 months ago

John Hammond
Beginner Malware Analysis Course - GIVEAWAY

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: ...

4:08
Beginner Malware Analysis Course - GIVEAWAY

7,702 views

6 years ago

MalwareAnalysisForHedgehogs
Malware Theory - How Packers Work, Polymorphism and Misconceptions

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...

14:00
Malware Theory - How Packers Work, Polymorphism and Misconceptions

9,376 views

3 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Malicious MS Office files without Macros

We look at two techniques for MS Office files to load and execute malicious code without Macros, namely VSTO Add-ins and ...

19:53
Malware Analysis - Malicious MS Office files without Macros

4,183 views

3 months ago

MalwareAnalysisForHedgehogs
Malware Analysis - 3CX SmoothOperator C2 extraction with x64dbg and CyberChef

To obtain more IoCs we analyse the second stage DLL that we decrypted in the first 3CX video. With IDA Free we determine the ...

45:37
Malware Analysis - 3CX SmoothOperator C2 extraction with x64dbg and CyberChef

1,497 views

3 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - C2 extractor for Turla's Kopiluwak using Binary Refinery

We create a C2 extractor for APT malware Kopiluwak. For that we need to unpack two layers of code (JScript, VBA) and remove ...

27:09
Malware Analysis - C2 extractor for Turla's Kopiluwak using Binary Refinery

1,727 views

2 years ago