Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
6,352 results
https://www.nsec.io/2016/01/applying-devops-principles-for-better-malware-analysis/ The malware battle online is far from being ...
1,462 views
9 years ago
We analyse the polymorphic virus Virut. In part 1 we write an API resolver for Ghidra, deal with self-modifying code, custom calling ...
2,846 views
9 months ago
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...
1,053,746 views
4 years ago
This video has a newer, updated version here: https://youtu.be/k2gzFV2-czc I tried three free disassemblers and decompilers and ...
22,498 views
3 years ago
We look at two techniques for MS Office files to load and execute malicious code without Macros, namely VSTO Add-ins and ...
2,603 views
6 days ago
We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...
1,682 views
3 months ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Follow me on Twitter: ...
5,956 views
2 years ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...
8,879 views
How I got into malware analysis and what disassemblers I recommend for a newbie 00:16 - How did you get into malware ...
11,117 views
8 years ago
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...
1,337 views
5 years ago
141,724 views
This talk was performed on 22 August 2020 at Camp++ 0x7e4, MP4 downloads and presentation slides are available at ...
140 views
Rabbit holes are the arch enemy of reverse engineers. Some simple habits will help you to avoid them. We analyse a sample that ...
4,432 views
Thanks to Brad Duncan for providing the pcap for this video! https://www.malware-traffic-analysis.net/2021/08/05/index.html If ...
11,224 views
30,386 views
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/ Use this coupon for -30% on the courses ...
1,451 views
2 months ago
We create a C2 extractor for APT malware Kopiluwak. For that we need to unpack two layers of code (JScript, VBA) and remove ...
1,678 views
I answer the question whether malware writing is necessary or beneficial to learning malware analysis. Do antivirus companies ...
4,254 views
We construct a Binary Refinery pipeline to extract the download URL of a multi-layered loader that uses JScript and PowerShell.
2,344 views
1 year ago
Connecting With Us --------------------------------------------------- + Hire Us For A Project: https://lawrencesystems.com/hire-us/ + Tom ...
11,364 views
My opinion about the book "Malware Analysis and Detection Engineering" by Abhijit Mohanta and Anoop Saldanha. Malware ...
4,721 views
A mostly live demo of base concepts of malware analysis using a multitude of tools on a Dridex sample pulled from a phishing ...
14,425 views
6 years ago
383,730 views
Many applications have thousands of files, making even non-obfuscated malware sometimes challenging. This malware is based ...
2,032 views
1 month ago
This presentation was streamed at #BSidesBUD2020 Online IT Security Conference. All rights reserved. https://bsidesbud.com.
43 views