Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
6,299 results
We look at two techniques for MS Office files to load and execute malicious code without Macros, namely VSTO Add-ins and ...
3,226 views
2 weeks ago
https://www.nsec.io/2016/01/applying-devops-principles-for-better-malware-analysis/ The malware battle online is far from being ...
1,462 views
9 years ago
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...
1,053,956 views
4 years ago
We analyse the polymorphic virus Virut. In part 1 we write an API resolver for Ghidra, deal with self-modifying code, custom calling ...
2,871 views
9 months ago
This video has a newer, updated version here: https://youtu.be/k2gzFV2-czc I tried three free disassemblers and decompilers and ...
22,553 views
3 years ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...
30,490 views
Rabbit holes are the arch enemy of reverse engineers. Some simple habits will help you to avoid them. We analyse a sample that ...
4,436 views
5 years ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Follow me on Twitter: ...
5,959 views
2 years ago
8,942 views
We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...
1,697 views
3 months ago
Endpoint detection and response (EDR) software has gained significant market share due to its ability to examine system state for ...
9,318 views
1 year ago
I answer the question whether malware writing is necessary or beneficial to learning malware analysis. Do antivirus companies ...
4,260 views
A mostly live demo of base concepts of malware analysis using a multitude of tools on a Dridex sample pulled from a phishing ...
14,431 views
6 years ago
We create a C2 extractor for APT malware Kopiluwak. For that we need to unpack two layers of code (JScript, VBA) and remove ...
1,682 views
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/ Use this coupon for -30% on the courses ...
1,478 views
2 months ago
We construct a Binary Refinery pipeline to extract the download URL of a multi-layered loader that uses JScript and PowerShell.
2,351 views
141,805 views
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...
1,337 views
We discuss how to become a malware analyst and how to balance family and work. Malware analysis courses: ...
6,286 views
8 years ago
This talk was performed on 22 August 2020 at Camp++ 0x7e4, MP4 downloads and presentation slides are available at ...
141 views