Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
5,170 results
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...
1,332 views
5 years ago
We create a C2 extractor for APT malware Kopiluwak. For that we need to unpack two layers of code (JScript, VBA) and remove ...
1,675 views
1 year ago
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...
1,053,384 views
4 years ago
We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...
1,633 views
2 months ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...
30,197 views
Rabbit holes are the arch enemy of reverse engineers. Some simple habits will help you to avoid them. We analyse a sample that ...
4,427 views
We analyse the polymorphic virus Virut. In part 1 we write an API resolver for Ghidra, deal with self-modifying code, custom calling ...
2,779 views
8 months ago
To obtain more IoCs we analyse the second stage DLL that we decrypted in the first 3CX video. With IDA Free we determine the ...
1,477 views
2 years ago
We construct a Binary Refinery pipeline to extract the download URL of a multi-layered loader that uses JScript and PowerShell.
2,331 views
11 months ago
Many applications have thousands of files, making even non-obfuscated malware sometimes challenging. This malware is based ...
1,827 views
3 weeks ago
GooLoad is delivered via SEO poisoning of malicious websites and delivered as JScript in a ZIP archive, often disguised as ...
3,130 views
For more content, subscribe on Twitch! https://twitch.tv/johnhammond010 If you would like to support me, please like, comment ...
106,019 views
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/ Use this coupon for -30% on the courses ...
1,381 views
1 month ago
This talk was performed on 22 August 2020 at Camp++ 0x7e4, MP4 downloads and presentation slides are available at ...
140 views
How I got into malware analysis and what disassemblers I recommend for a newbie 00:16 - How did you get into malware ...
11,112 views
8 years ago
Automatic sandbox systems like Hybrid-Analysis are a great way to speed up malware analysis. We find a file flagged as ...
7,470 views
3 years ago
I found this gem on Virustotal. It crashes and we use Fiddler to make it dance. Malware analysis courses: ...
5,326 views
9 years ago
Learn how to write code based signatures. Become proficient in detecting malware samples that have no plain text strings.
2,941 views
To try everything Brilliant has to offer—free—for a full 30 days, visit https://brilliant.org/GnarCoding/ . You'll also get 20% off an ...
3,560 views
The newest ROKRAT variant injects its shellcode into cmd.exe, which will in turn decrypt a PE image. We debug the injected code ...
2,803 views