Index of /Tutorials/Malware Analysis/Malware-Development-and-Reverse-Engineering-1-The-Basics/
../
01 Introduction/ 18-Feb-2023 17:23 -
02 Installing The Tools/ 18-Feb-2023 17:23 -
03 Building EXE and DLL and Examining PE Structure 18-Feb-2023 17:23 -
04 Embedding Shellcode Payloads in EXE files/ 18-Feb-2023 17:23 -
05 Generating Shellcodes Using Metasploit in Ka..> 18-Feb-2023 17:23 -
06 Embedding Shellcode Payload in .RSRC Section..> 18-Feb-2023 17:23 -
07 Testing Unpacked Dumped Shellcode Payload Us..> 18-Feb-2023 17:23 -
08 Base64 Encoding of Shellcode Payload/ 18-Feb-2023 17:23 -
09 Reverse Engineering Base64 Encoded Payloads/ 18-Feb-2023 17:23 -
10 XOR Encryption of Payload/ 18-Feb-2023 17:23 -
11 Reverse Engineering XOR Encryption/ 18-Feb-2023 17:23 -
12 AES Encryption of Payload/ 18-Feb-2023 17:23 -
13 Reverse Engineering AES Encryption Using Cry..> 18-Feb-2023 17:23 -
14 Testing Shellcode Using Shellcode Runner/ 18-Feb-2023 17:23 -
15 Obfuscating Functions Using GetProcAddress a..> 18-Feb-2023 17:23 -
16 Reverse Engineering Function Obfuscation/ 18-Feb-2023 17:23 -
17 Trojan Engineering Using Code Caves/ 18-Feb-2023 17:23 -
18 Reverse Engineering Code Cave Trojans/ 18-Feb-2023 17:23 -
19 Process Injection/ 18-Feb-2023 17:23 -
20 Detecting Process Injection and Reverse Engi..> 18-Feb-2023 17:23 -
21 Testing Process Injection Shellcode with She..> 18-Feb-2023 17:23 -
22 DLL Injection/ 18-Feb-2023 17:23 -
23 Detecting and Reverse Engineering DLL Injection 18-Feb-2023 17:23 -
24 Creating a Stealth Trojan/ 18-Feb-2023 17:23 -
25 Lab Project _ Creating a Trojan with Encrypt..> 18-Feb-2023 17:23 -
26 Reverse Engineering the Lab Project Trojan/ 18-Feb-2023 17:23 -
27 Anti Virus Evasion/ 18-Feb-2023 17:23 -
28 Bonus Lecture/ 18-Feb-2023 17:23 -