ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

7,036 results

MalwareAnalysisForHedgehogs
Malware Analysis - Malicious MS Office files without Macros

We look at two techniques for MS Office files to load and execute malicious code without Macros, namely VSTO Add-ins and ...

19:53
Malware Analysis - Malicious MS Office files without Macros

2,491 views

4 days ago

NorthSec
Olivier Bilodeau & Hugo Genesse - Applying DevOps Principles for Better Malware Analysis

https://www.nsec.io/2016/01/applying-devops-principles-for-better-malware-analysis/ The malware battle online is far from being ...

26:33
Olivier Bilodeau & Hugo Genesse - Applying DevOps Principles for Better Malware Analysis

1,459 views

9 years ago

John Hammond
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

42:23
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

1,053,718 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

This video has a newer, updated version here: https://youtu.be/k2gzFV2-czc I tried three free disassemblers and decompilers and ...

26:47
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

22,479 views

3 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Virut, Unpacking a Polymorphic File Infector, Part I

We analyse the polymorphic virus Virut. In part 1 we write an API resolver for Ghidra, deal with self-modifying code, custom calling ...

54:36
Malware Analysis - Virut, Unpacking a Polymorphic File Infector, Part I

2,837 views

8 months ago

MalwareAnalysisForHedgehogs
Malware Analysis Course for Hedgehogs is out

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Follow me on Twitter: ...

4:47
Malware Analysis Course for Hedgehogs is out

5,953 views

2 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Process Injection

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...

9:26
Malware Theory - Process Injection

30,357 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Malicious NordVPN Setup, Beginner Sample

We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...

23:11
Malware Analysis - Malicious NordVPN Setup, Beginner Sample

1,673 views

3 months ago

MalwareAnalysisForHedgehogs
Malware Analysis - Simple Habits to Stop Going Down the Rabbit Hole

Rabbit holes are the arch enemy of reverse engineers. Some simple habits will help you to avoid them. We analyse a sample that ...

33:43
Malware Analysis - Simple Habits to Stop Going Down the Rabbit Hole

4,431 views

5 years ago

MalwareAnalysisForHedgehogs
Ask An Analyst - How did I get Into Malware Analysis?

How I got into malware analysis and what disassemblers I recommend for a newbie 00:16 - How did you get into malware ...

6:57
Ask An Analyst - How did I get Into Malware Analysis?

11,117 views

8 years ago

John Hammond
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

59:28
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis

141,704 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Defeating ConfuserEx Anti-Analysis with Hooking

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/ Use this coupon for -30% on the courses ...

29:44
Malware Analysis - Defeating ConfuserEx Anti-Analysis with Hooking

1,442 views

1 month ago

MalwareAnalysisForHedgehogs
Does Writing Malware Help With Malware Analysis?

I answer the question whether malware writing is necessary or beneficial to learning malware analysis. Do antivirus companies ...

14:57
Does Writing Malware Help With Malware Analysis?

4,253 views

3 years ago

MalwareAnalysisForHedgehogs
Malware Theory - How Packers Work, Polymorphism and Misconceptions

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...

14:00
Malware Theory - How Packers Work, Polymorphism and Misconceptions

8,861 views

3 years ago

Budapest Hackerspace
Camp++ 0x7e4 // Malware analysis: Why and How - an introduction by a2b2c2

This talk was performed on 22 August 2020 at Camp++ 0x7e4, MP4 downloads and presentation slides are available at ...

57:38
Camp++ 0x7e4 // Malware analysis: Why and How - an introduction by a2b2c2

140 views

5 years ago

Z. Cliffe Schreuders
Reverse Engineering and Malware Analysis: Part 1 Static Analysis

This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...

27:21
Reverse Engineering and Malware Analysis: Part 1 Static Analysis

1,337 views

5 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - C2 extractor for Turla's Kopiluwak using Binary Refinery

We create a C2 extractor for APT malware Kopiluwak. For that we need to unpack two layers of code (JScript, VBA) and remove ...

27:09
Malware Analysis - C2 extractor for Turla's Kopiluwak using Binary Refinery

1,677 views

2 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Binary Refinery URL extraction of Multi-Layered PoshLoader for LummaStealer

We construct a Binary Refinery pipeline to extract the download URL of a multi-layered loader that uses JScript and PowerShell.

21:29
Malware Analysis - Binary Refinery URL extraction of Multi-Layered PoshLoader for LummaStealer

2,344 views

1 year ago

MalwareAnalysisForHedgehogs
Book Review - Malware Analysis and Detection Engineering

My opinion about the book "Malware Analysis and Detection Engineering" by Abhijit Mohanta and Anoop Saldanha. Malware ...

14:54
Book Review - Malware Analysis and Detection Engineering

4,721 views

3 years ago

Lawrence Systems
Digital Forensics: How Malware Can Hide In Plain Sight

Connecting With Us --------------------------------------------------- + Hire Us For A Project: https://lawrencesystems.com/hire-us/ + Tom ...

14:55
Digital Forensics: How Malware Can Hide In Plain Sight

11,363 views

5 years ago