Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
6,985 results
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...
1,053,689 views
4 years ago
This video has a newer, updated version here: https://youtu.be/k2gzFV2-czc I tried three free disassemblers and decompilers and ...
22,465 views
3 years ago
We look at two techniques for MS Office files to load and execute malicious code without Macros, namely VSTO Add-ins and ...
2,181 views
2 days ago
We analyse the polymorphic virus Virut. In part 1 we write an API resolver for Ghidra, deal with self-modifying code, custom calling ...
2,830 views
8 months ago
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...
8,847 views
2 years ago
30,334 views
Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Follow me on Twitter: ...
5,978 views
We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...
1,668 views
3 months ago
211,245 views
Learn how to write code based signatures. Become proficient in detecting malware samples that have no plain text strings.
2,966 views
1 year ago
102,533 views
383,621 views
141,695 views
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...
1,335 views
5 years ago
Many applications have thousands of files, making even non-obfuscated malware sometimes challenging. This malware is based ...
2,014 views
1 month ago
I answer the question whether malware writing is necessary or beneficial to learning malware analysis. Do antivirus companies ...
4,264 views
Connecting With Us --------------------------------------------------- + Hire Us For A Project: https://lawrencesystems.com/hire-us/ + Tom ...
11,362 views
How I got into malware analysis and what disassemblers I recommend for a newbie 00:16 - How did you get into malware ...
11,116 views
8 years ago
Rabbit holes are the arch enemy of reverse engineers. Some simple habits will help you to avoid them. We analyse a sample that ...
4,428 views
25,896 views
7 years ago