Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
5,173 results
https://www.nsec.io/2016/01/applying-devops-principles-for-better-malware-analysis/ The malware battle online is far from being ...
1,458 views
9 years ago
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...
1,332 views
5 years ago
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...
1,053,387 views
4 years ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...
30,195 views
We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...
1,633 views
2 months ago
We analyse the polymorphic virus Virut. In part 1 we write an API resolver for Ghidra, deal with self-modifying code, custom calling ...
2,779 views
8 months ago
We create a C2 extractor for APT malware Kopiluwak. For that we need to unpack two layers of code (JScript, VBA) and remove ...
1,675 views
1 year ago
For more content, subscribe on Twitch! https://twitch.tv/johnhammond010 If you would like to support me, please like, comment ...
106,022 views
Rabbit holes are the arch enemy of reverse engineers. Some simple habits will help you to avoid them. We analyse a sample that ...
4,427 views
Many applications have thousands of files, making even non-obfuscated malware sometimes challenging. This malware is based ...
1,834 views
3 weeks ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/ Use this coupon for -30% on the courses ...
1,381 views
1 month ago
We construct a Binary Refinery pipeline to extract the download URL of a multi-layered loader that uses JScript and PowerShell.
2,330 views
11 months ago
Learn how to write code based signatures. Become proficient in detecting malware samples that have no plain text strings.
2,940 views
To obtain more IoCs we analyse the second stage DLL that we decrypted in the first 3CX video. With IDA Free we determine the ...
1,477 views
2 years ago
Automatic sandbox systems like Hybrid-Analysis are a great way to speed up malware analysis. We find a file flagged as ...
7,471 views
3 years ago
GooLoad is delivered via SEO poisoning of malicious websites and delivered as JScript in a ZIP archive, often disguised as ...
3,130 views
Last time we extracted a download URL, in this video we unpack the rest of the Emmenhtal to Pure Crypter to Lumma Stealer ...
5,745 views
10 months ago
8,751 views
How I got into malware analysis and what disassemblers I recommend for a newbie 00:16 - How did you get into malware ...
11,112 views
8 years ago
To try everything Brilliant has to offer—free—for a full 30 days, visit https://brilliant.org/GnarCoding/ . You'll also get 20% off an ...
3,560 views
This talk was performed on 22 August 2020 at Camp++ 0x7e4, MP4 downloads and presentation slides are available at ...
140 views
Volatility is a very powerful memory forensics tool. It is used to extract information from memory images (memory dumps) of ...
92,805 views
102,445 views
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: ...
7,694 views
Fireeye made a white paper on cmd.exe command obfuscation (DOSfuscation). We deobfuscate a malware sample that uses ...
6,128 views
7 years ago