ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

506 results

VideoLecturesChannel
Robust Android Malware Detection Against Adversarial Example Attacks

Authors: Heng Li, Shiyao Zhou, Wei Yuan, Xiapu Luo, Cuiying Gao, Shuiyan Chen.

7:57
Robust Android Malware Detection Against Adversarial Example Attacks

209 views

4 years ago

Rushi Mehta
How to Extract an Android APK || Simple Malware Analysis

Short video tutorial on how to extract the Android Package from the installed Application. Tools needed : APK Extractor Caution: ...

4:35
How to Extract an Android APK || Simple Malware Analysis

450 views

3 years ago

DFIRScience
Fast Android forensic triage with ALEAPP

Android forensics can take a long time to process. But if you just need a quick overview of the most common artifacts, check out ...

3:21
Fast Android forensic triage with ALEAPP

6,595 views

4 years ago

Coleman Kane
CS6038 2020: Week 13 Lec. 2 - Static Android Malware Analysis in Ghidra

https://class.malware.re/2020/04/22/android-analysis-part2.html A follow-up video lecture covering more advanced topics in ...

45:00
CS6038 2020: Week 13 Lec. 2 - Static Android Malware Analysis in Ghidra

4,696 views

5 years ago

aafortinet
LIVE: unpacking an Android malware packed with "JsonPacker"

The sample we unpack is SHA256: 9dd56596bfabc9c717c3d6141354768dc396b2199e3f5301a2c037026b980703 It is on ...

6:39
LIVE: unpacking an Android malware packed with "JsonPacker"

370 views

2 years ago

Engineering Community
Android APK Decompile and Analyze by Serhii Malofeiev (Eng)

We discussed the Reverse Engineering process and tools, and ways to protect our APKs. Was covered: adb shell; Apk Analyzer; ...

45:08
Android APK Decompile and Analyze by Serhii Malofeiev (Eng)

787 views

5 years ago

NorthSec
Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development

The first commercially-available Android device was released in 2008. Despite its nearly 10-year public lifespan, the OS still ...

51:49
Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development

826 views

7 years ago

Coleman Kane
CS6038 2020: Week 13 Lec. 1 - Introduction to Android APK Apps and Simple Analysis

https://class.malware.re/2020/04/18/android-intro-and-tools.html This lecture reviews the Android app structure, and also ...

36:45
CS6038 2020: Week 13 Lec. 1 - Introduction to Android APK Apps and Simple Analysis

1,397 views

5 years ago

DEFCONConference
DEF CON Safe Mode Demo Labs - Ajin Abraham - Mobile App Security Testing with MobSF

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware ...

30:37
DEF CON Safe Mode Demo Labs - Ajin Abraham - Mobile App Security Testing with MobSF

49,602 views

5 years ago

BSides Oslo
BSides Oslo Digital Edition 2021 – Axelle Aprville – Live reverse engineering of Android malware

Have you ever wanted to see how Android malware work? How they are implemented? Which tools to use? This session is for ...

26:11
BSides Oslo Digital Edition 2021 – Axelle Aprville – Live reverse engineering of Android malware

214 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - DOSfuscation Deobfuscation

Fireeye made a white paper on cmd.exe command obfuscation (DOSfuscation). We deobfuscate a malware sample that uses ...

13:31
Malware Analysis - DOSfuscation Deobfuscation

6,128 views

7 years ago

Caleb Fenton
Android Deobfuscation - Tools and Techniques @TetCon2016

Sorry about the strange cuts. This was recorded on a phone that ran out of memory multiple times during recording! This is ~95% ...

42:14
Android Deobfuscation - Tools and Techniques @TetCon2016

3,554 views

9 years ago

DEFCONConference
DEF CON 21 - Craig Young - Android WebLogin Google's Skeleton Key

The PoC iterations and analysis results provide some insight into the state of Google's Bouncer and Android malware analysis at ...

23:28
DEF CON 21 - Craig Young - Android WebLogin Google's Skeleton Key

1,740 views

12 years ago

Paul Mc Quade
MRV#2 File Signatures - (Docs and Tools)

Malware Research Video #2 - File Signatures - (Docs) https://en.wikipedia.org/wiki/File_signature ...

2:39
MRV#2 File Signatures - (Docs and Tools)

196 views

3 years ago

Velimir Radlovački
Unboxing Android: Everything You Wanted To Know About Android Packers

PLEASE SUBSCRIBE, LIKE AND COMMENT TO KEEP THIS CHANNEL ALIVE! Tip Jar: https://paypal.me/radlovacki To ...

32:03
Unboxing Android: Everything You Wanted To Know About Android Packers

137 views

6 years ago

Life Tech Mentor
An Introduction To Malware Analysis

A mostly live demo of base concepts of malware analysis using a multitude of tools on a Dridex sample pulled from a phishing ...

40:31
An Introduction To Malware Analysis

124 views

5 years ago

Rahad Chowdhury
Android Application Vulnerability Scanner using MobSF

Android Application Vulnerability Scanner using MobSF | Rahad Chowdhury What is Android application vulnerability scanner?

19:06
Android Application Vulnerability Scanner using MobSF

6,426 views

3 years ago

OpenSecurityTraining2
Dynamic Malware Analysis D3P12 Anti-VM Techniques

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter ...

1:20
Dynamic Malware Analysis D3P12 Anti-VM Techniques

2,977 views

10 years ago

Pentesting Club
3.2 QARK (Quick Android Review Kit)

Android application source code analysis tool developed by LinkedIn. #################################### Github ...

6:34
3.2 QARK (Quick Android Review Kit)

4,648 views

3 years ago

botconf eu
APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications

So the result of the analysis is the java code is a dropper trojanizing malicious android application it is heavily obfuscated and the ...

24:12
APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications

334 views

5 years ago