Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
6,336 results
We analyse the polymorphic virus Virut. In part 1 we write an API resolver for Ghidra, deal with self-modifying code, custom calling ...
2,821 views
8 months ago
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...
1,333 views
5 years ago
This video has a newer, updated version here: https://youtu.be/k2gzFV2-czc I tried three free disassemblers and decompilers and ...
22,437 views
3 years ago
https://www.nsec.io/2016/01/applying-devops-principles-for-better-malware-analysis/ The malware battle online is far from being ...
1,459 views
9 years ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/ Use this coupon for -30% on the courses ...
1,412 views
1 month ago
We construct a Binary Refinery pipeline to extract the download URL of a multi-layered loader that uses JScript and PowerShell.
2,340 views
11 months ago
We create a C2 extractor for APT malware Kopiluwak. For that we need to unpack two layers of code (JScript, VBA) and remove ...
1,675 views
2 years ago
We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...
1,656 views
2 months ago
PART 2 This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at ...
399 views
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...
1,053,605 views
4 years ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...
30,292 views
8,810 views
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Follow me on Twitter: ...
5,948 views
Endpoint detection and response (EDR) software has gained significant market share due to its ability to examine system state for ...
9,171 views
1 year ago
Many applications have thousands of files, making even non-obfuscated malware sometimes challenging. This malware is based ...
1,951 views
To obtain more IoCs we analyse the second stage DLL that we decrypted in the first 3CX video. With IDA Free we determine the ...
1,479 views
Rabbit holes are the arch enemy of reverse engineers. Some simple habits will help you to avoid them. We analyse a sample that ...
4,428 views
Last time we extracted a download URL, in this video we unpack the rest of the Emmenhtal to Pure Crypter to Lumma Stealer ...
5,784 views
10 months ago
I answer the question whether malware writing is necessary or beneficial to learning malware analysis. Do antivirus companies ...
4,244 views
I found this gem on Virustotal. It crashes and we use Fiddler to make it dance. Malware analysis courses: ...
5,328 views