1 |
 |
Nullcon Goa 2011: Automatic Program Analysis Using Dynamic Binary Instrumentation - By Sunil Kumar |
12 years, 6 months |
nullcon |
malware, analysis, re, hacking, nullcon, reverse engineering |
6980 |
3 |
2 |
 |
Bad Robots |
12 years, 6 months |
mr_insecure |
malware, analysis, backtrack, day, back-track.de, virus, ida, python |
5909 |
None |
3 |
 |
Starting A Car From Your Computer. Hacking Viper Smartstart. |
12 years, 5 months |
whistler585 |
Viper, SmartStart, hack, packet, analysis |
12228 |
4 |
4 |
 |
Securitytube Live Blackhat: Malware Analysis By Mark Russinovich (Short Clip) |
12 years, 4 months |
SecurityTube_Bot |
blackhat, malware, analysis, mark, russinovich |
6179 |
None |
5 |
 |
Mikko Hypponen: Fighting Viruses Talk From Ted |
12 years, 1 month |
Andrew |
mikko, ted, virus, analysis |
4483 |
2 |
6 |
 |
Acoustic Intrusions - Derbycon 2011 |
12 years, 1 month |
Netinfinity |
acoustic, intrusion, phones, hacking, hotel, HD Moore, security, analysis |
4667 |
None |
7 |
 |
5 Minute Malware Analysis |
11 years, 6 months |
Securitytube_Poster |
malware, analysis, virus, botnet, linux |
4811 |
2 |
8 |
 |
Six Million Oscommerce Pages Infected--Malware Analysis Of Incident |
11 years, 6 months |
Securitytube_Poster |
malware, analysis, attack |
3623 |
None |
9 |
 |
How To Extract Metadata Form Files Using Foca |
11 years, 5 months |
Ashish_st |
foca, metadata, analysis |
9090 |
2 |
10 |
 |
Sec. And Net. Forensics: 8 Threat Analysis |
11 years, 5 months |
Ashish_st |
threat, analysis |
3528 |
2 |
11 |
 |
Tektip Ep13 - Automater Ip And Url Analysis Tool .Mp4 |
11 years |
1aN0rmus |
1aNormus, TekDefense, Tektip, Python, intrusion analysis, analysis, investigation, ipvoid, robtex, blacklist, URL Filtering, Automater |
4550 |
1 |
12 |
 |
Tektip - Ep14 - Pipal Analysis Of Yahoo Password Dump |
11 years |
1aN0rmus |
1aN0rmus, Tekdefese, tekTip, Pipal, Yahoo, analysis, password, crack, dump |
4681 |
None |
13 |
 |
Tektip Ep15 - Automater Mr1 Passive Ip And Url Analysis Tool |
11 years |
1aN0rmus |
Automater, Fortiguard, Github, IP, Programming, Robtec, Scripting, URL, analysis, backtrack, ipvoid, python, 1aN0rmus, TekDefense, TekTip, OSINT |
5995 |
1 |
14 |
 |
Zeus Malware Memory Analysis With Volatility Framework |
11 years |
L33T |
zeus, malware, framework, analysis |
14805 |
2 |
15 |
 |
Jackcr's Forensic Challenge Solutions With Volatility Framework |
10 years, 8 months |
L33T |
forensics, memory, backdoor, analysis |
6271 |
None |
16 |
 |
Pdf Analysis With Pdf Stream Dumper |
10 years, 8 months |
tinitee |
pdf, analysis, dumper, malicious |
7272 |
None |
17 |
 |
Pdf Analysis With Peepdf |
10 years, 8 months |
tinitee |
hacking, hack, pdf, analysis, malware |
3889 |
None |
18 |
 |
Tektip Ep24 - Moloch |
10 years, 8 months |
1aN0rmus |
TekDefense, TekTip, 1aN0rmus, Moloch, Traffic, pcap, packet, analysis |
4798 |
None |
19 |
 |
Parsing Binary File Formats With Powershell |
10 years, 8 months |
tinitee |
powershell, binary, malware, analysis |
4110 |
None |
20 |
 |
Nova Hackers - Effective Intelligence Analysis In Bro Ids |
10 years, 6 months |
tinitee |
bro, ids, network, analysis |
3948 |
None |
21 |
 |
Nova Hackers - Log Analysis With Graylog2 |
10 years, 6 months |
tinitee |
log, analysis, graylog2, tool |
4809 |
None |
22 |
 |
Nova Hackers John Lankau - Encase Basics |
10 years, 6 months |
tinitee |
hacking, hack, forensics, digital, encase, analysis |
3552 |
None |
23 |
 |
Scdgb - Shellcode Analysis |
10 years, 6 months |
tinitee |
shellcode, tool, scdgb, analysis, hash |
3697 |
None |
24 |
 |
Dynamic Malware Analysis |
10 years, 6 months |
tinitee |
dynamic, malware, analysis, hacking, hack |
5017 |
None |
25 |
 |
Android Forensics: Pulling Android Memory Using Lime |
10 years, 6 months |
tinitee |
lime. forensics, memory, analysis |
6937 |
1 |
26 |
 |
Static Analysis With Ida Pro |
10 years, 6 months |
Alone |
hacking, hack, malware, analysis, static-analysis, IDA-Pro |
4603 |
None |
27 |
 |
Ipcop Intrusion Detection System (Ids) |
10 years, 6 months |
tinitee |
ipcop, ids, hacking, hack, analysis, data |
3117 |
None |
28 |
 |
Wireless Intrusion Prevention Systems |
10 years, 6 months |
tinitee |
wireless, ids, hacking, hack, analysis |
3369 |
None |
29 |
 |
Introduction To Security And Network Forensics: Network Forensics |
10 years, 5 months |
Alone |
hacking, network, analysis, forensics |
4534 |
None |
30 |
 |
Extracting Badness From A Pdf... In 4 Ways! |
10 years, 5 months |
Alone |
hacking, pdf, analysis, malware, hack |
3196 |
None |
31 |
 |
Offensive Security 2013 - Reverse Engineering (X86) Workshop Day 2 |
10 years, 5 months |
Alone |
analysis, hacking, reverse-engineering, x86 |
4330 |
None |
32 |
 |
Re-Engineering Android Applications |
10 years, 5 months |
Alone |
hacking, hack, android, application, analysis, reverse-engineering |
3664 |
None |
33 |
 |
Omnipeek Network Analyzer - Wireless Analysis |
10 years, 4 months |
Alone |
network, analysis, wireless, 802.11/a/b/g/n/ac |
2739 |
None |
34 |
 |
Amnesia - Layer 1 Binary Analysis System |
10 years, 3 months |
R3OATH |
amnesia, binary, analysis, strings, imports, exports, assembly, reverse engineer, python, windows |
4491 |
None |
35 |
 |
Noriben Overview - Behavioral Malware Analysis Script |
10 years |
gabriel.pulgar@defpoint.com |
noriben, noriben.py, process monitor, python script, procmon, malware analysis, analysis, malware, overview, behavioral, behavioral analysis, brian baskin, bsides, bsidesdc, beginner |
3284 |
None |