ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

7,021 results

MalwareAnalysisForHedgehogs
Malware Analysis - Virut, Unpacking a Polymorphic File Infector, Part I

We analyse the polymorphic virus Virut. In part 1 we write an API resolver for Ghidra, deal with self-modifying code, custom calling ...

54:36
Malware Analysis - Virut, Unpacking a Polymorphic File Infector, Part I

2,821 views

8 months ago

Z. Cliffe Schreuders
Reverse Engineering and Malware Analysis: Part 1 Static Analysis

This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...

27:21
Reverse Engineering and Malware Analysis: Part 1 Static Analysis

1,333 views

5 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

This video has a newer, updated version here: https://youtu.be/k2gzFV2-czc I tried three free disassemblers and decompilers and ...

26:47
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

22,437 views

3 years ago

NorthSec
Olivier Bilodeau & Hugo Genesse - Applying DevOps Principles for Better Malware Analysis

https://www.nsec.io/2016/01/applying-devops-principles-for-better-malware-analysis/ The malware battle online is far from being ...

26:33
Olivier Bilodeau & Hugo Genesse - Applying DevOps Principles for Better Malware Analysis

1,459 views

9 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Binary Refinery URL extraction of Multi-Layered PoshLoader for LummaStealer

We construct a Binary Refinery pipeline to extract the download URL of a multi-layered loader that uses JScript and PowerShell.

21:29
Malware Analysis - Binary Refinery URL extraction of Multi-Layered PoshLoader for LummaStealer

2,340 views

11 months ago

MalwareAnalysisForHedgehogs
Malware Analysis - Defeating ConfuserEx Anti-Analysis with Hooking

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/ Use this coupon for -30% on the courses ...

29:44
Malware Analysis - Defeating ConfuserEx Anti-Analysis with Hooking

1,412 views

1 month ago

MalwareAnalysisForHedgehogs
Malware Analysis - C2 extractor for Turla's Kopiluwak using Binary Refinery

We create a C2 extractor for APT malware Kopiluwak. For that we need to unpack two layers of code (JScript, VBA) and remove ...

27:09
Malware Analysis - C2 extractor for Turla's Kopiluwak using Binary Refinery

1,675 views

2 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Malicious NordVPN Setup, Beginner Sample

We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...

23:11
Malware Analysis - Malicious NordVPN Setup, Beginner Sample

1,656 views

2 months ago

MalwareAnalysisForHedgehogs
Malware Theory - How Packers Work, Polymorphism and Misconceptions

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...

14:00
Malware Theory - How Packers Work, Polymorphism and Misconceptions

8,810 views

2 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Process Injection

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...

9:26
Malware Theory - Process Injection

30,290 views

4 years ago

John Hammond
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

42:23
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

1,053,597 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis Course for Hedgehogs is out

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Follow me on Twitter: ...

4:47
Malware Analysis Course for Hedgehogs is out

5,948 views

2 years ago

DEFCONConference
DEF CON 32 - Defeating EDR Evading Malware with Memory Forensics - Case, Sellers, Richard, et al.

Endpoint detection and response (EDR) software has gained significant market share due to its ability to examine system state for ...

43:47
DEF CON 32 - Defeating EDR Evading Malware with Memory Forensics - Case, Sellers, Richard, et al.

9,171 views

1 year ago

MalwareAnalysisForHedgehogs
Malware Analysis - 3CX SmoothOperator C2 extraction with x64dbg and CyberChef

To obtain more IoCs we analyse the second stage DLL that we decrypted in the first 3CX video. With IDA Free we determine the ...

45:37
Malware Analysis - 3CX SmoothOperator C2 extraction with x64dbg and CyberChef

1,479 views

2 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - RenPy game, finding malware code in 2956 files, Beginner friendly

Many applications have thousands of files, making even non-obfuscated malware sometimes challenging. This malware is based ...

36:17
Malware Analysis - RenPy game, finding malware code in 2956 files, Beginner friendly

1,951 views

1 month ago

MalwareAnalysisForHedgehogs
Malware Analysis - Simple Habits to Stop Going Down the Rabbit Hole

Rabbit holes are the arch enemy of reverse engineers. Some simple habits will help you to avoid them. We analyse a sample that ...

33:43
Malware Analysis - Simple Habits to Stop Going Down the Rabbit Hole

4,428 views

5 years ago

MalwareAnalysisForHedgehogs
Does Writing Malware Help With Malware Analysis?

I answer the question whether malware writing is necessary or beneficial to learning malware analysis. Do antivirus companies ...

14:57
Does Writing Malware Help With Malware Analysis?

4,244 views

3 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking Lumma Stealer from Emmenhtal and Pure Crypter

Last time we extracted a download URL, in this video we unpack the rest of the Emmenhtal to Pure Crypter to Lumma Stealer ...

34:56
Malware Analysis - Unpacking Lumma Stealer from Emmenhtal and Pure Crypter

5,784 views

10 months ago

John Hammond
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

1:12:12
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis

383,518 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Fun With Fiddler

I found this gem on Virustotal. It crashes and we use Fiddler to make it dance. Malware analysis courses: ...

7:59
Malware Analysis - Fun With Fiddler

5,328 views

9 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - ConfuserEx 2 Deobfuscation with Python and dnlib, BBTok Loader

We deobfuscate BBTok loader, a .NET sample that is protected with ConfuserEx 2. We use de4dot-cex for control flow ...

47:35
Malware Analysis - ConfuserEx 2 Deobfuscation with Python and dnlib, BBTok Loader

3,054 views

1 year ago

MalwareAnalysisForHedgehogs
Malware Theory - Oligomorphic, Polymorphic and Metamorphic Viruses

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...

5:23
Malware Theory - Oligomorphic, Polymorphic and Metamorphic Viruses

25,881 views

7 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Writing Code Signatures

Learn how to write code based signatures. Become proficient in detecting malware samples that have no plain text strings.

40:54
Malware Analysis - Writing Code Signatures

2,955 views

1 year ago

DEFCONConference
Shawn Thomas - An Introduction To Malware Analysis video - DEF CON 27 Blue Team Village

A mostly live demo of base concepts of malware analysis using a multitude of tools on a Dridex sample pulled from a phishing ...

40:31
Shawn Thomas - An Introduction To Malware Analysis video - DEF CON 27 Blue Team Village

14,417 views

6 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Hybrid Analysis for Malware Assessment

Automatic sandbox systems like Hybrid-Analysis are a great way to speed up malware analysis. We find a file flagged as ...

37:28
Malware Analysis - Hybrid Analysis for Malware Assessment

7,522 views

3 years ago