ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

6,338 results

John Hammond
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

42:23
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

1,053,686 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

This video has a newer, updated version here: https://youtu.be/k2gzFV2-czc I tried three free disassemblers and decompilers and ...

26:47
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

22,462 views

3 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Virut, Unpacking a Polymorphic File Infector, Part I

We analyse the polymorphic virus Virut. In part 1 we write an API resolver for Ghidra, deal with self-modifying code, custom calling ...

54:36
Malware Analysis - Virut, Unpacking a Polymorphic File Infector, Part I

2,830 views

8 months ago

MalwareAnalysisForHedgehogs
Malware Analysis - Malicious MS Office files without Macros

We look at two techniques for MS Office files to load and execute malicious code without Macros, namely VSTO Add-ins and ...

19:53
Malware Analysis - Malicious MS Office files without Macros

2,176 views

2 days ago

MalwareAnalysisForHedgehogs
Malware Theory - Process Injection

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...

9:26
Malware Theory - Process Injection

30,332 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Theory - How Packers Work, Polymorphism and Misconceptions

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...

14:00
Malware Theory - How Packers Work, Polymorphism and Misconceptions

8,854 views

2 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Malicious NordVPN Setup, Beginner Sample

We analyze a trojanized setup file. The analysis of this sample is pretty straightforward if you know where to look. But as a ...

23:11
Malware Analysis - Malicious NordVPN Setup, Beginner Sample

1,667 views

3 months ago

MalwareAnalysisForHedgehogs
Malware Analysis - Defeating ConfuserEx Anti-Analysis with Hooking

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/ Use this coupon for -30% on the courses ...

29:44
Malware Analysis - Defeating ConfuserEx Anti-Analysis with Hooking

1,428 views

1 month ago

John Hammond
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

1:12:12
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis

383,615 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Hybrid Analysis for Malware Assessment

Automatic sandbox systems like Hybrid-Analysis are a great way to speed up malware analysis. We find a file flagged as ...

37:28
Malware Analysis - Hybrid Analysis for Malware Assessment

7,535 views

3 years ago

John Hammond
Cryptocoin Miner - Unpeeling Lemon Duck Malware

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

1:01:02
Cryptocoin Miner - Unpeeling Lemon Duck Malware

102,530 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking Lumma Stealer from Emmenhtal and Pure Crypter

Last time we extracted a download URL, in this video we unpack the rest of the Emmenhtal to Pure Crypter to Lumma Stealer ...

34:56
Malware Analysis - Unpacking Lumma Stealer from Emmenhtal and Pure Crypter

5,800 views

10 months ago

John Hammond
Mozi Malware - Finding Breadcrumbs...

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

50:16
Mozi Malware - Finding Breadcrumbs...

211,245 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Analysis Course for Hedgehogs is out

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Follow me on Twitter: ...

4:47
Malware Analysis Course for Hedgehogs is out

5,978 views

2 years ago

MalwareAnalysisForHedgehogs
Malware Analysis - RenPy game, finding malware code in 2956 files, Beginner friendly

Many applications have thousands of files, making even non-obfuscated malware sometimes challenging. This malware is based ...

36:17
Malware Analysis - RenPy game, finding malware code in 2956 files, Beginner friendly

2,018 views

1 month ago

MalwareAnalysisForHedgehogs
Malware Analysis - Writing Code Signatures

Learn how to write code based signatures. Become proficient in detecting malware samples that have no plain text strings.

40:54
Malware Analysis - Writing Code Signatures

2,964 views

1 year ago

Z. Cliffe Schreuders
Reverse Engineering and Malware Analysis: Part 1 Static Analysis

This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...

27:21
Reverse Engineering and Malware Analysis: Part 1 Static Analysis

1,334 views

5 years ago

John Hammond
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

59:28
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis

141,695 views

4 years ago

DEFCONConference
Shawn Thomas - An Introduction To Malware Analysis video - DEF CON 27 Blue Team Village

A mostly live demo of base concepts of malware analysis using a multitude of tools on a Dridex sample pulled from a phishing ...

40:31
Shawn Thomas - An Introduction To Malware Analysis video - DEF CON 27 Blue Team Village

14,423 views

6 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Oligomorphic, Polymorphic and Metamorphic Viruses

Malware analysis courses: https://malwareanalysis-for-hedgehogs.learnworlds.com/courses Buy me a coffee: ...

5:23
Malware Theory - Oligomorphic, Polymorphic and Metamorphic Viruses

25,896 views

7 years ago