Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  1. tronny

    SANS - FOR518 - Mac Forensic Analysis

    SANS - FOR518 - Mac Forensic Analysis *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. tronny

    SANS - FOR500 - Windows Forensic Analysis

    SANS - FOR500 - Windows Forensic Analysis *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. carxproveteran

    Master Course in Hazard Analysis and Critical Control Points

    Master Course in Hazard Analysis and Critical Control Points HACCP, HARPC, Critical Control Points, Food safety, ISO 22000, Good Manufacturing Practice (GMP), HACCP Training What you'll learn Learnt the Introduction and Importance of Hazard Analysis Critical Control Point (HACCP) Understand the...
  4. tronny

    AND - Osquery for Security Analysis, by Josh Brower

    AND - Osquery for Security Analysis, by Josh Brower *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. tronny

    AND - Networkdefense Osquery for Security Analysis

    AND - Networkdefense Osquery for Security Analysis *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. tronny

    AND - ELK for Security Analysis, by Chris Sanders

    AND - ELK for Security Analysis, by Chris Sanders *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. tronny

    Udemy - Technical Analysis Masterclass, by Debanjan Lahiri

    Udemy - Technical Analysis Masterclass, by Debanjan Lahiri *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. tronny

    Udemy - Reverse Engineering, Debugging and Malware Analysis

    Udemy - Reverse Engineering, Debugging and Malware Analysis - 2021, by TechBinz Academy *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. tronny

    Udemy - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022

    Udemy - Reverse Engineering and Malware Analysis x6432 CRMA+ 2022 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. tronny

    Udemy - Reverse Engineering and Malware Analysis Fundamentals, by Paul Chin

    Udemy - Reverse Engineering and Malware Analysis Fundamentals, by Paul Chin *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. tronny

    Udemy - Reverse Engineering & Malware Analysis of .NET & Java, by Paul Chin

    Udemy - Reverse Engineering & Malware Analysis of .NET & Java, by Paul Chin *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. tronny

    Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+

    Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+, by OCSALY Academy *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. tronny

    Udemy - Practical Malware Analysis - Dissecting Malicious Software

    Udemy - Practical Malware Analysis - Dissecting Malicious Software *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. Parlayking

    Technical analysis collection

    https://drive.google.com/drive/mobile/folders/19JMQO_rPBYrP3WyYtdEjYT7XsH0ZA97U
  15. carxproveteran

    Data Science: Python for Data Analysis Full Bootcamp

    Data Science: Python for Data Analysis Full Bootcamp Learn and build your Python Programming skills from the ground up in addition to Python Data Science libraries and tools What you'll learn Code with Python Programming Language Python Functional Programming Structure Data using collection...
  16. tronny

    Udemy - Mastering Reverse Engineering & Malware Analysis REMASM+

    Udemy - Mastering Reverse Engineering & Malware Analysis REMASM+, by OCSALY Academy *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. dax050

    Practical malware analysis 1 - 4

    This is the last lab in the first chapter “BASIC STATIC TECHNIQUES”. The lab file is Lab01–04.exe, let’s start to analyze it and answering the following questions to see what it hides: Upload the Lab01–04.exe file to http://www.VirusTotal.com/. Does it match any existing antivirus definitions...
  18. dax050

    Practical malware analysis 1 - 3

    this is an easy lab for this chapter, it will not take too much. We have Lab01–03.exe file, and we need to answer the following questions: Upload the Lab01–03.exe file to http://www.VirusTotal.com/. Does it match any existing antivirus definitions? Are there any indications that this file is...
  19. dax050

    practical malware analysis 1 - 2

    Hello, guys today I will continue solving the labs, remember to be safe and setup your virtual environment, at the end I will attach links to the tools I’ve used so you also can try digging to the labs by yourselves. as we know I will only use the techniques that the book mentioned and not...
  20. dax050

    Practical Malware Analysis 1 - 1

    Remember to setup your safe environment before digging into the labs. This lab comes with two files Lab01–01.exe and Lab01–01.dll., I will use the tools and the basic static analysis technique that’ve been mentioned in the chapter to answer the questions. Question 1 Answer: Uploading the two...
  21. yurithome123

    Data Analysis Using SQL and Excel

    https://drive.google.com/file/d/1obmvsr7DHn4XOsgc3dT8FeCFeZjPI-sv/view
  22. yurithome123

    Complete data analysis course!! PROBABLY PAID

    https://drive.google.com/file/d/1fKBc35LL4csO30U6EUF-_btvKXAz6w4k/view?usp=drivesdk
  23. carxproveteran

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+ Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra, Game Hacking, IDA Pro, IDA Free, C++ and C! What you'll learn Launch a career in cybersecurity: Gain practical expertise in reverse engineering and malware...
  24. caychro

    Others  Hacking News and Breach Analysis

    Stay informed and engaged with the ever-evolving world of hacking news and data breaches in this thread. We'll analyze recent hacking incidents, explore their impact, extract valuable lessons, and discuss proactive measures to prevent future security breaches. The field of cybersecurity is...
  25. saqib2619

    Login:Pass  FMEA: Failure, Modes, Effects, Analysis

    Download: https://www.udemy.com/course/fmea-failure-modes-effects-analysis/ *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  26. saqib2619

    Login:Pass  Root Cause Analysis: Fishbone Diagram

    https://www.udemy.com/course/root-cause-analysis-cause-effect-diagram Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  27. saqib2619

    Login:Pass  Root Cause Analysis: Drill Down Tool

    https://www.udemy.com/course/drill-down-tool/ Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. realdevil

    SQL Course 2023: SQL for Data Analysis and Data Science.

    SQL Course 2023: SQL for Data Analysis and Data Science. Master the Art of SQL Querying and PostgreSQL for Data Analysis and Data Science An using Real World SQL Database. What you'll learn Using Real World PostgreSQL Database Airlines Database. Use Python Pandas to Analyze and visualize...
  29. curi

    Method/Tut  Data Science, Machine Learning, Data Analysis, Python & R

    Link: https://www.udemy.com/course/data-science-machine-learning-data-analysis-python-r/
  30. carxproveteran

    Python Numpy Data Analysis for Data Scientist | AI | ML | DL

    Python Numpy Data Analysis for Data Scientist | AI | ML | DL Unlock the Power of Data Analysis with Python Pandas for Data Science, AI, Machine Learning, and Deep Learning What you'll learn Understand the basics of Numpy and how to set up the Numpy environment. Create and access arrays, use...
  31. carxproveteran

    Data Analysis And Business Intelligence With Microsoft Excel

    Data Analysis And Business Intelligence With Microsoft Excel Use Power Query, Power Pivot, DAX, & Excel's data visualization tools to build powerful Business Intelligence solutions What you'll learn Use Power Query to pull external datasets into Excel, and transform them into whatever shape is...
  32. carxproveteran

    Excel Data Analysis With Pivot Tables & Pivot Charts - 2023

    Excel Data Analysis With Pivot Tables & Pivot Charts - 2023 Data analysis excel, data analysis, Pivot Chart, Microsoft excel, advanced excel, ms excel, Data Analytics, Excel, Data What you'll learn Introduction Of Data Analytics Introduction Of Pivot Table & Pivot Charts The Five Steps For Data...
  33. tronny

    INE - Digital Forensics File & Disk Analysis

    INE - Digital Forensics File & Disk Analysis *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. tronny

    FireEye - The Beginner Malware Analysis Course

    FireEye - The Beginner Malware Analysis Course *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  35. tronny

    Fireeye - Mandiant Malware Analysis Course

    Fireeye - Mandiant Malware Analysis Course *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. tronny

    Fireeye - Malware Analysis Crash

    Fireeye - Malware Analysis Crash *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. carxproveteran

    SQL Course 2023: SQL for Data Analysis and Data Science.

    SQL Course 2023: SQL for Data Analysis and Data Science. Master the Art of SQL Querying and PostgreSQL for Data Analysis and Data Science An using Real World SQL Database. What you'll learn Using Real World PostgreSQL Database Airlines Database. Use Python Pandas to Analyze and visualize...
  38. carxproveteran

    Google Sheets for Data Analysis and Workflow Automation

    Google Sheets for Data Analysis and Workflow Automation Learn to implement real-life projects in Google Sheet and also apply most of the functions in Excel too. What you'll learn Use different types of functions for Data Cleaning and Data Analysis Prevent the user from adding Bad Data to your...
  39. NOUR-777

    Algorithmic Trading & Quantitative Analysis Using Python

    SALES PAGE DOWNLOAD LINK RAR password if asked would be whocares to contact me about any course : https://t.me/lumin4ry1
  40. ebiklo

    Method/TUT  ❤️QUANTITY SURVEYING WITH RATE ANALYSIS AND TAKE OFF-BEGINNERS❤️100% OFF❤️

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** https://www.udemy.com/course/quantity-surveying-with-rate-analysis-and-take-off-beginners/?couponCode=QSBEGINAUG23
  41. itsebm

    Multi/Others  LockBit Black Builder 3.0 Analysis

    This released code enables for comprehensive and unrestricted examination, but regrettably also implies that numerous new groups are developing, employing the same or modified versions of LockBit 3.0 coming from this constructor. Figure 2: LockBit 3.0 Builder The builder, once extracted...
  42. itsebm

    Multi/Others  Analysis to ArisLocker: A Python Based Ransomware

    In this article, we will explore a Python-based file encryption ransomware called ArisLocker. ArisLocker is designed to encrypt files on a victim's machine and demand a ransom for their decryption. We will analyze the code of ArisLocker and understand its functionality. Note : It's important...
  43. hilltimoth

    Private  Learn Vulnerability Analysis in Kali Linux with SysGod!!

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. kalix001

    Reverse Engineering x64dbg Graphical Static Analysis

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. ~SAMURAI~

    EBook/Course  ❤️QUANTITY SURVEYING WITH RATE ANALYSIS AND TAKE OFF-BEGINNERS❤️100% OFF❤️

    https://www.udemy.com/course/quantity-surveying-with-rate-analysis-and-take-off-beginners/?couponCode=QSBEGINAUG23
  46. ~SAMURAI~

    EBook/Course  [100% OFF] REVERSE ENGINEERING AND MALWARE ANALYSIS IN 21 HOURS

    https://www.udemy.com/course/reverse_engineering/?couponCode=REV_ANALYSIS
  47. williamfgm

    Investopedia - Technical Analysis

    Download here from pCloud
  48. r3vm4y

    Combo Tools  SCANNER INURLBR

    Screenshots Email extraction External Command Filter Result Value php inurlbr.php --dork '"com.br/wp-login.php"' -t 2 -a 'wp-login.php?action=lostpassword' -s filter_string.txt Simple fuzz Parallel terminal ( popup ) Extract urls using archive.org Extract...
  49. Mehrama

    Login:Pass  3D Analysis in ArcGIS on DEM (Slope, Aspect, TIN, Contour, Hillshade)

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. kardasavant.sh.z.a79

    ⭐[UDEMY] 1120+ PAID COURSES ⭐️

    https://www.upload.ee/files/14326816/magnets.txt.html
Top Bottom