YoVDO

Malware Analysis Courses

Exploring How Memory-Mapped Files Hide From AV and Execute Malicious Code
Black Hat via YouTube
Miasm - Reverse Engineering Framework
Black Hat via YouTube
Finding Xori - Malware Analysis Triage with Automated Disassembly
Black Hat via YouTube
Hiding PIN's Artifacts to Defeat Evasive Malware
Black Hat via YouTube
rVMI - A New Paradigm for Full System Analysis
Black Hat via YouTube
Offensive Malware Analysis - Dissecting OSX/FruitFly via a Custom C&C Server
Black Hat via YouTube
Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game
Black Hat via YouTube
Invoke-DOSfuscation - Techniques for CMD Obfuscation
Black Hat via YouTube
What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection
Black Hat via YouTube
Towards a Holistic Approach in Building Intelligence to Fight Crimeware
Black Hat via YouTube
< Prev Page 36 Next >