本站已收录 番号和无损神作磁力链接/BT种子 

[FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+

种子简介

种子名称: [FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+
文件类型: 视频
文件数目: 156个文件
文件大小: 9.07 GB
收录时间: 2024-1-16 01:01
已经下载: 3
资源热度: 57
最近下载: 2024-5-4 04:26

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:185a2fb8d707be2c01b3190d02e8296253b86a9e&dn=[FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+ 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+.torrent
  • 1. Introduction/1. The Disassembly Theory.mp435.33MB
  • 1. Introduction/2. Disassembly - What.mp469.85MB
  • 10. Linux for Reverse Engineering and Malware Analysis/1. Understanding Linux Commands and Pipes.mp475.44MB
  • 10. Linux for Reverse Engineering and Malware Analysis/2. What is a Command.mp447.63MB
  • 10. Linux for Reverse Engineering and Malware Analysis/3. Weird LS Command.mp427.99MB
  • 10. Linux for Reverse Engineering and Malware Analysis/4. Different Linux Commands using with Pipe.mp458.52MB
  • 11. Starting with Linux Terminal/1. Understanding key concepts.mp477.35MB
  • 11. Starting with Linux Terminal/2. Finding Helpful manuals.mp477.45MB
  • 11. Starting with Linux Terminal/3. Linux Directories.mp462.07MB
  • 11. Starting with Linux Terminal/4. Linux Directories - Part 2.mp465MB
  • 12. Starting with Linux Shell and Exploring Linux System/1. A1 - The bridge between You and Shell.mp452.36MB
  • 12. Starting with Linux Shell and Exploring Linux System/10. Arithmetic Expressions with Shell.mp417.57MB
  • 12. Starting with Linux Shell and Exploring Linux System/11. Automating Folder Creation with Shell.mp453.27MB
  • 12. Starting with Linux Shell and Exploring Linux System/12. Quoting in Shell.mp460.25MB
  • 12. Starting with Linux Shell and Exploring Linux System/2. LS Command.mp415.89MB
  • 12. Starting with Linux Shell and Exploring Linux System/3. RD vs APD.mp447.18MB
  • 12. Starting with Linux Shell and Exploring Linux System/4. Filtering LS.mp461.99MB
  • 12. Starting with Linux Shell and Exploring Linux System/5. CP Command.mp441.08MB
  • 12. Starting with Linux Shell and Exploring Linux System/6. Tab Auto-completion.mp428.89MB
  • 12. Starting with Linux Shell and Exploring Linux System/7. SYM AND HRD Link Files.mp479.91MB
  • 12. Starting with Linux Shell and Exploring Linux System/8. Manipulating Files.mp432MB
  • 12. Starting with Linux Shell and Exploring Linux System/9. Introduction to Shell and Expansion.mp435.26MB
  • 13. Permissions/1. Introduction to Permissions in Linux.mp420.24MB
  • 13. Permissions/2. Differences between UID, GID and Shadow.mp437MB
  • 13. Permissions/3. File and Dir Permissions.mp486.78MB
  • 13. Permissions/4. Examples with File Permissions.mp417.74MB
  • 13. Permissions/5. After this video you'll understand all LINUX Permissions.mp4140.93MB
  • 13. Permissions/6. Chmod.mp493.14MB
  • 14. Managing Processes and Packages in Linux/1. Fundamentals of Processes in System.mp462.66MB
  • 14. Managing Processes and Packages in Linux/10. Trcrt command.mp460.73MB
  • 14. Managing Processes and Packages in Linux/11. Networking with Linux.mp449.13MB
  • 14. Managing Processes and Packages in Linux/2. The Magic with PS Aux Command.mp482.38MB
  • 14. Managing Processes and Packages in Linux/3. The Magic with TOP Command.mp493.72MB
  • 14. Managing Processes and Packages in Linux/4. Foreground and Background Processes.mp444.87MB
  • 14. Managing Processes and Packages in Linux/5. From Background to Foreground.mp424.56MB
  • 14. Managing Processes and Packages in Linux/6. The Tutorial with Linux Process Signals.mp477.88MB
  • 14. Managing Processes and Packages in Linux/7. Introduction to Packet Management Systems.mp448.01MB
  • 14. Managing Processes and Packages in Linux/8. Why we need package management tools.mp421.89MB
  • 14. Managing Processes and Packages in Linux/9. Package Management in Linux - Final.mp469.4MB
  • 15. C++ for Reverse Engineering - Section 1/1. CPP Newlines,Tabs and Spaces.mp441.27MB
  • 15. C++ for Reverse Engineering - Section 1/10. Beginning to Pointers.mp428.75MB
  • 15. C++ for Reverse Engineering - Section 1/11. Namespaces in CPP.mp483.98MB
  • 15. C++ for Reverse Engineering - Section 1/12. Scoping Variables and Static Keyword.mp4126.44MB
  • 15. C++ for Reverse Engineering - Section 1/13. Conditional Statements.mp461.32MB
  • 15. C++ for Reverse Engineering - Section 1/2. Initializers in CPP.mp460.22MB
  • 15. C++ for Reverse Engineering - Section 1/3. CPP Writing Styles.mp445.55MB
  • 15. C++ for Reverse Engineering - Section 1/4. Statements and Expressions, RVALUE and LVALUE.mp457.18MB
  • 15. C++ for Reverse Engineering - Section 1/5. Comma.mp427.06MB
  • 15. C++ for Reverse Engineering - Section 1/6. Types and Variables.mp472.5MB
  • 15. C++ for Reverse Engineering - Section 1/7. Literals in CPP.mp428.42MB
  • 15. C++ for Reverse Engineering - Section 1/8. Defining Constants.mp434.95MB
  • 15. C++ for Reverse Engineering - Section 1/9. Const Expressions.mp422.44MB
  • 16. Variable Types in Programming CC++/1. Types in CPP - Binary,Octal and Hex.mp471.32MB
  • 16. Variable Types in Programming CC++/2. Floating Point types in CPP - Float, Double, Long Double.mp483.48MB
  • 16. Variable Types in Programming CC++/3. Char types in C.mp492.76MB
  • 16. Variable Types in Programming CC++/4. Enum Types.mp461.47MB
  • 16. Variable Types in Programming CC++/5. Boolean Types and Comparison Operators.mp492.57MB
  • 16. Variable Types in Programming CC++/6. Void Type and Void Function.mp417.18MB
  • 16. Variable Types in Programming CC++/7. Operators 101.mp497.19MB
  • 16. Variable Types in Programming CC++/8. Default Values in CPP.mp447.75MB
  • 17. How Conditional Statements work Reverse Engineering and C/1. Switch Statement with ENUM.mp492.38MB
  • 17. How Conditional Statements work Reverse Engineering and C/2. Conditional Statements in CPP.mp4110.09MB
  • 17. How Conditional Statements work Reverse Engineering and C/3. For Loop.mp448.58MB
  • 17. How Conditional Statements work Reverse Engineering and C/4. Continue Keyword.mp414.35MB
  • 17. How Conditional Statements work Reverse Engineering and C/5. Do-While Loop.mp420.96MB
  • 17. How Conditional Statements work Reverse Engineering and C/6. Goto.mp413.59MB
  • 18. Introduction to CPP Classes/1. Unions in CPP.mp444.44MB
  • 18. Introduction to CPP Classes/2. Methods in Struct.mp429.09MB
  • 18. Introduction to CPP Classes/3. Access Controls in CPP.mp448.26MB
  • 18. Introduction to CPP Classes/4. Classes and Initializing Class Member.mp431.15MB
  • 18. Introduction to CPP Classes/5. Constructors.mp424.85MB
  • 18. Introduction to CPP Classes/6. Destructors in CPP.mp411.21MB
  • 18. Introduction to CPP Classes/7. Initializers in CPP.mp460.22MB
  • 19. Introduction to Pointers/1. Pointers in CPP.mp499.78MB
  • 19. Introduction to Pointers/10. Allocating memory as arrays.mp418.04MB
  • 19. Introduction to Pointers/11. Lifetime of Memory.mp422.83MB
  • 19. Introduction to Pointers/2. C++ Beginning to Pointers.mp440.96MB
  • 19. Introduction to Pointers/3. Dereference Operator in CPP.mp462.67MB
  • 19. Introduction to Pointers/4. Pointers and Arrays.mp462.83MB
  • 19. Introduction to Pointers/5. nullptr.mp418.42MB
  • 19. Introduction to Pointers/6. Pointer arithmetic in CPP.mp449.82MB
  • 19. Introduction to Pointers/7. Arrays out of bounds and Deallocating Pointers=.mp429.72MB
  • 19. Introduction to Pointers/8. Consts and Casts with Pointers=.mp445.24MB
  • 19. Introduction to Pointers/9. Allocating Memory.mp422.71MB
  • 2. Installing Ghidra for Reverse Engineering and Malware Analysis/1. Downloading Ghidra and File Structure.mp480.09MB
  • 2. Installing Ghidra for Reverse Engineering and Malware Analysis/2. Installing JDK in Linux.mp448.53MB
  • 2. Installing Ghidra for Reverse Engineering and Malware Analysis/3. Installing JDK in Windows or MacOS.mp432.11MB
  • 20. STL and References in C++/1. STL,Vectors and Arrays.mp457.09MB
  • 20. STL and References in C++/2. References.mp433.68MB
  • 20. STL and References in C++/3. Example Project With References.mp432.07MB
  • 20. STL and References in C++/4. Code Example with AUTO, TUPLE and FOR LOOP.mp489.92MB
  • 20. STL and References in C++/5. Range Based for Loop.mp451.26MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/1. Pointers in Practice.mp424.34MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/10. Functions - Part 5.mp439.24MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/11. Functions - Part 7.mp416.79MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/2. Pointers in Practice - Part 2.mp457.72MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/3. Pointers in Practice - Part 3.mp425.71MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/4. Pointers in Practice - Part 4.mp435.01MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/5. Introduction to Functions.mp435.2MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/6. Functions - Part 1.mp425.74MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/7. Functions - Part 2.mp444.75MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/8. Functions - Part 3.mp441.68MB
  • 21. Pointer and Functions Reverse Engineering and Malware Analysis/9. Functions - Part 4.mp449.13MB
  • 22. Data Structures in CC++/1. Introduction to Basic CPP Programming.mp457.54MB
  • 22. Data Structures in CC++/10. Introduction to STL.mp419.89MB
  • 22. Data Structures in CC++/11. Algorithm Analysis.mp467.79MB
  • 22. Data Structures in CC++/12. Scenario Analysis.mp453.18MB
  • 22. Data Structures in CC++/13. Developing Main.mp416.07MB
  • 22. Data Structures in CC++/14. Factorial Method.mp426.99MB
  • 22. Data Structures in CC++/2. Creating Random Card Generator Using Enum and rand.mp4102.69MB
  • 22. Data Structures in CC++/3. Developing main Function and using static_cast.mp471.68MB
  • 22. Data Structures in CC++/4. Introduction to ADT.mp416.17MB
  • 22. Data Structures in CC++/5. Creating ADT Class and using Constructors.mp467.58MB
  • 22. Data Structures in CC++/6. Virtual Methods and Overriding from Class.mp457.23MB
  • 22. Data Structures in CC++/7. Controlling Copy Operations with ADT.mp438.7MB
  • 22. Data Structures in CC++/8. Starting with Templates.mp453.54MB
  • 22. Data Structures in CC++/9. Class Templates in CPP.mp4116.78MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/1. Creating List ADT.mp466.94MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/10. Developing Search Operation.mp450.03MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/11. Removing Items.mp4120.44MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/2. Developing Get and Insert Methods.mp451.36MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/3. Developing Search and Remove Methods.mp468.46MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/4. Testing ADT List.mp4121.34MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/5. Node and Chaining Example.mp4102.88MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/6. Creating and Chaining nodes with Different data types.mp473.07MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/7. Creating Custom Linked List.mp487.2MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/8. Get Method.mp445.94MB
  • 23. ADT and Nodes in C++ for Reverse Engineering/9. Developing InsertHead, InsertTail and Insert Methods.mp4148.68MB
  • 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/1. Understanding Arrays.mp447.49MB
  • 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/2. Manipulating Arrays.mp460.83MB
  • 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/3. Starting with Array Pointers.mp460.27MB
  • 24. Learning ARRAYS for Reverse Engineering and Malware Analysis/4. Pointer Increment vs Array Indexing.mp449.19MB
  • 3. Starting with Ghidra/1. Opening project in Ghidra.mp484.49MB
  • 3. Starting with Ghidra/2. Discovering Ghidra.mp461.21MB
  • 4. Malware Analysis and Reverse Engineering with Ghidra/1. Starting Real Malware Analysis with Ghidra.mp4116.68MB
  • 4. Malware Analysis and Reverse Engineering with Ghidra/2. Analyzing Suspicious String using Ghidra.mp4103.17MB
  • 4. Malware Analysis and Reverse Engineering with Ghidra/3. OSINT for Reverse Engineering.mp452.56MB
  • 4. Malware Analysis and Reverse Engineering with Ghidra/4. Analyzing Libraries that Malware Uses.mp423.05MB
  • 4. Malware Analysis and Reverse Engineering with Ghidra/5. Extracting SYS file from Malware.mp4121.56MB
  • 4. Malware Analysis and Reverse Engineering with Ghidra/6. Finding Entry Points and Changing Undefined Function Names.mp446.4MB
  • 5. Binary Analysis/1. Analysis of Binary and 4 Stages of Compilation.mp433.5MB
  • 5. Binary Analysis/2. Preprocessing.mp459.44MB
  • 5. Binary Analysis/3. Compilation Phase.mp438.68MB
  • 5. Binary Analysis/4. Assembly Phase.mp438.19MB
  • 5. Binary Analysis/5. Linking Phase.mp493.96MB
  • 6. Symbols, Stripped and Not Stripped Binaries/1. Using READELF for Viewing Symbolic Information.mp4103.79MB
  • 6. Symbols, Stripped and Not Stripped Binaries/2. Revealing Contents of Object File.mp4156.64MB
  • 6. Symbols, Stripped and Not Stripped Binaries/3. Trying to Analyze Binary Executable.mp4106.83MB
  • 6. Symbols, Stripped and Not Stripped Binaries/4. How binary loads and executes in theory.mp464.48MB
  • 7. Linux - ELF Format/1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4147.16MB
  • 7. Linux - ELF Format/2. Learning ELF Fields.mp4128.73MB
  • 7. Linux - ELF Format/3. Learning ELF Program Header Fields.mp4155.48MB
  • 8. Windows - PE Format/1. Learning Windows PE Format.mp4197.19MB
  • 9. IDA Pro IDA Freeware/1. Downloading and Installing IDA Pro IDA Freeware.mp466.93MB
  • 9. IDA Pro IDA Freeware/2. Being friends with IDA.mp455.49MB
  • 9. IDA Pro IDA Freeware/3. Useful Tabs in IDA.mp463.02MB