New here? Post 10 threads to unlock access to threads, or upgrade now to access Crax all content instantly!
Join CraxPro and earn real money through our Credit Rewards System. Participate and redeem credits for Bitcoin/USDT. Start earning today! Read the detailed thread here
You are using an out of date browser. It may not display this or other websites correctly. You should upgrade or use an alternative browser.
MP4 | Video: H264 1920x1080 | Audio: AAC 48000Hz 2 Ch
Language: English | Duration: 60+ min | Size: 7.52 GB
he online format of Kaspersky’s training helps more engineers upgrade their reversing skills and become confident users of our software disassembly product, IDA Pro
Overview & objectives...
InfosecInstitute - IACRB Certified Reverse Engineering Analyst (CREA)
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
The difference between a forward proxy and a reverse proxy is the objects they are acting on. The forward proxy is the request of the proxy client, which is aware of the existence of the proxy server, and is often used in scenarios such as scientific Internet surfing, breaking access...
Kaspersky - Targeted Malware Reverse Engineering, by Denis Legezo
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Ethical Hacking: Reverse Shells
Hack Windows and Linux boxes
What you'll learn
Hack Windows computers
Hack Linux computers
Use shells
Create Malicious Executables
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Reverse Engineering & Malware Analysis in 21 Hours | REMAC+
Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra, Game Hacking, IDA Pro, IDA Free, C++ and C!
What you'll learn
Launch a career in cybersecurity: Gain practical expertise in reverse engineering and malware...
eCRE - Reverse Engineering Professional - eLearnSecurity(INE) 2021
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
What you’ll learn
The theory behind disassembly and its role in reverse engineering.
The four stages of binary analysis: Preprocessing, Compilation, Assembly, and Linking.
The compilation process breakdown and the purpose of each phase.
Working with symbolic information in stripped and not...
Reversing secrets of reverse engineering (Eldad Eilam) - EPUB
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with...
Practical reverse engineering x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation by Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse - PDF
Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or...
Mastering x86-64 Real Assembly Language from Zero | 2023ASM+
Every Code is Open Source if you know ASSEMBLY Programming | Reverse Engineering, Ethical Hacking, Windows, Linux, MP...
What you'll learn
Write efficient x86-64 assembly programs.
Use NASM assembler for optimal coding.
Analyze and...
DECRYPTING OBJECT X AES CIPHER BY REVERSE ENGINEERING
The complexity of implementing an AES vector initialization checker with all these specific conditions in Assembly and Ruby is considerable for a chat environment. Here is a very simple example in Ruby that checks the sequential nature of a...
Ethical Hacking: Reverse Shells
Hack Windows and Linux boxes
What you'll learn
Hack Windows computers
Hack Linux computers
Use shells
Create Malicious Executables
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Game Hacking: Cheat Engine Game Hacking Basics
Introduction to reverse engineering and memory hacking using Cheat Engine
What you'll learn
How to get started with Cheat Engine
How to hack a process memory
Finding variables and pointers in memory
Using data structures to hack health and ammo...
Learn Ethical Hacking & Reverse Engineering
Fun way to learn Ethical Hacking & Reverse Engineering by hacking real practice websites & reversing CrackMe's
What you'll learn
Web Hacking
Website defacement
Tampering Cookies
Hacking Admin Passwords
Hack Bank Accounts to Transfer Money
Stealing...
In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are...
Learn how to reverse engineer and hack the memory of programs running on Windows
What you'll learn:
Debug programs with Cheat Engine
Reverse engineer programs
Solve CrackMe challenges
Disassemble programs into assembly code
Setting breakpoints and stepping through code
Modify program behaviour...
Reverse Engineering 2: Windows GUI Programs, a training course on reverse engineering of Windows programs with user interface is published by Udemy Academy. In the first course of this series, Reverse Engineering 1: x64dbg Debugger for Beginners, you learned how to reverse engineer a...
Launch a career in cybersecurity: Gain practical expertise in reverse engineering and malware analysis opening doors to lucrative opportunities in the field.
Unveil the secrets of malware: Discover how to dissect and analyze malicious code to understand its inner workings with Reverse...
InfosecInstitute - Malware Analysis Reverse Engineering - 2022
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
eARES v1.2 - ADVANCED REVERSE ENGINEERING OF SOFTWARE
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Practical reverse engineering_ x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Mastering Reverse Engineering Re-engineer your ethical hacking skills
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Kaspersky Malware Analysis and Reverse Engineering
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***