RAR-files |
booktime-pmafb.rar |
50,000,000 |
8B338C26 |
booktime-pmafb.r00 |
50,000,000 |
54EBE892 |
booktime-pmafb.r01 |
50,000,000 |
7B379244 |
booktime-pmafb.r02 |
50,000,000 |
F2703E43 |
booktime-pmafb.r03 |
50,000,000 |
D210BB99 |
booktime-pmafb.r04 |
50,000,000 |
DDB9CEFA |
booktime-pmafb.r05 |
50,000,000 |
B95E403B |
booktime-pmafb.r06 |
50,000,000 |
8FBADBE3 |
booktime-pmafb.r07 |
50,000,000 |
6580FCBC |
booktime-pmafb.r08 |
50,000,000 |
1F0E4354 |
booktime-pmafb.r09 |
50,000,000 |
63C0D975 |
booktime-pmafb.r10 |
50,000,000 |
04BD2F64 |
booktime-pmafb.r11 |
50,000,000 |
277416FD |
booktime-pmafb.r12 |
50,000,000 |
A24B77A7 |
booktime-pmafb.r13 |
50,000,000 |
F39EF596 |
booktime-pmafb.r14 |
50,000,000 |
B90F7903 |
booktime-pmafb.r15 |
50,000,000 |
8A020216 |
booktime-pmafb.r16 |
50,000,000 |
ECD4BA7D |
booktime-pmafb.r17 |
50,000,000 |
602E2E69 |
booktime-pmafb.r18 |
50,000,000 |
760C8360 |
booktime-pmafb.r19 |
50,000,000 |
5985E1DA |
booktime-pmafb.r20 |
50,000,000 |
2103E683 |
booktime-pmafb.r21 |
50,000,000 |
7E8248CA |
booktime-pmafb.r22 |
50,000,000 |
9FD17E30 |
booktime-pmafb.r23 |
50,000,000 |
F22E9D69 |
booktime-pmafb.r24 |
50,000,000 |
7DA47B62 |
booktime-pmafb.r25 |
50,000,000 |
4D42392C |
booktime-pmafb.r26 |
50,000,000 |
36CD2C11 |
booktime-pmafb.r27 |
50,000,000 |
709CBDCB |
booktime-pmafb.r28 |
27,724,720 |
DB747DFC |
|
Total size: |
1,477,724,720 |
|
|
Archived
files |
Chapter_2-Lab_Setup\4. Lab Setup Instructions.mp4
[5c2e78ebc706e6a8]
|
4,066,236 |
B663068E |
Chapter_2-Lab_Setup\5. Installing Windows VM on Vmware.mp4
[568d7edacce81836]
|
42,496,348 |
B9533640 |
Chapter_2-Lab_Setup\6. Installing Flare VM.mp4
[4d3aa06c0c21d178]
|
66,642,695 |
331672C7 |
Chapter_2-Lab_Setup\7. Installing Kali Linux on Vmware.mp4
[c9cbc9ab21cf18f]
|
69,048,354 |
83F3DA1F |
Chapter_2-Lab_Setup\Additional_Files\Installing+Kali+Linux+on+Vmware.pdf |
379,604 |
661C0413 |
Chapter_2-Lab_Setup\Additional_Files\Lab+Instructions.pdf |
183,575 |
017C2D04 |
Chapter_3-Basic_Static_Malware_Analysis\10. Strings Analysis.mp4
[d3368375280e039]
|
126,067,523 |
FAB8FFAD |
Chapter_3-Basic_Static_Malware_Analysis\11. Understanding File Structure.mp4
[a5e967ba5790dffd]
|
72,346,921 |
53763C15 |
Chapter_3-Basic_Static_Malware_Analysis\12. File Dependencies and Imports.mp4
[bf22a00eccbfda2e]
|
64,726,768 |
25A02324 |
Chapter_3-Basic_Static_Malware_Analysis\13. Analysing the resources section.mp4
[d8031d38839f2839]
|
28,334,847 |
AE4CE1BE |
Chapter_3-Basic_Static_Malware_Analysis\14. Packing and Obfuscation.mp4
[c7fa3ad8acea6712]
|
72,795,071 |
05C5A89D |
Chapter_3-Basic_Static_Malware_Analysis\8. Static Malware Anlaysis and Checking File types.mp4
[2e7c844d70186b3a]
|
87,698,519 |
59EAD468 |
Chapter_3-Basic_Static_Malware_Analysis\9. Analysing Malware with Hashes.mp4
[202b111183359d7e]
|
74,204,577 |
08C90541 |
Chapter_3-Basic_Static_Malware_Analysis\Additional_Files\Analysing+Malware+with+Hashes.pdf |
518,398 |
4885E4ED |
Chapter_3-Basic_Static_Malware_Analysis\Additional_Files\Analysing+the+resources+section.pdf |
225,816 |
8DEC3EA9 |
Chapter_3-Basic_Static_Malware_Analysis\Additional_Files\File+Dependencies+and+Imports.pdf |
626,393 |
591071E1 |
Chapter_3-Basic_Static_Malware_Analysis\Additional_Files\Packing+and+Obfuscation.pdf |
303,391 |
F478EF74 |
Chapter_3-Basic_Static_Malware_Analysis\Additional_Files\sample.isc.zip |
171,377 |
10AA3789 |
Chapter_3-Basic_Static_Malware_Analysis\Additional_Files\Samples (1).zip |
177,683 |
DADBCADE |
Chapter_3-Basic_Static_Malware_Analysis\Additional_Files\Static+Malware+Anlaysis+and+Checking+File+types.pdf |
762,601 |
00C53396 |
Chapter_3-Basic_Static_Malware_Analysis\Additional_Files\Strings+Analysis.pdf |
689,860 |
4EFC8FA7 |
Chapter_3-Basic_Static_Malware_Analysis\Additional_Files\Understanding+File+Structure.pdf |
300,225 |
9777DDB1 |
Chapter_4-Dynamic_Malware_Analysis\15. Intro to Dynamic Malware Analysis.mp4
[9a06e8a14580cac7]
|
12,583,348 |
D61B47DA |
Chapter_4-Dynamic_Malware_Analysis\16. Process Monitoring.mp4
[5cf5e96a3a7b4a1]
|
134,926,938 |
F26D540F |
Chapter_4-Dynamic_Malware_Analysis\17. Registry and File Monitoring.mp4
[fbb0522f6cf658dd]
|
99,670,815 |
E59224F9 |
Chapter_4-Dynamic_Malware_Analysis\18. Network Monitoring.mp4
[88eeb2266ee3c27a]
|
81,685,071 |
E948B294 |
Chapter_4-Dynamic_Malware_Analysis\19. Persistence management.mp4
[d4e804212abcb71c]
|
37,621,114 |
AA5FB202 |
Chapter_4-Dynamic_Malware_Analysis\20. Tying it all together.mp4
[2ee20eef3419b5e4]
|
111,630,077 |
809046A6 |
Chapter_4-Dynamic_Malware_Analysis\21. Lets Defend Example 1 - Walkthrough.mp4
[cf230867e89ade04]
|
153,994,699 |
1D5C8C0D |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files\267.bin.zip |
162,538 |
AFFCEBB0 |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files\Intro+to+Dynamic+Malware+Anlaysis.pdf |
185,236 |
0A34BFBB |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files\Network+Monitoring.pdf |
194,543 |
AA95ED51 |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files\persistance+Management.pdf |
180,619 |
0892ECBE |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files\Process+Monitoring.pdf |
184,111 |
F8F328F9 |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files\Registry+and+File+Monitoring.pdf |
181,733 |
99AB3959 |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files\re_whatami.zip |
26,128 |
B35DD8D0 |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files\SynapseX.bin (1).zip |
170,150 |
3A52D5F9 |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files\SynapseX.bin.zip |
170,150 |
3A52D5F9 |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files\Tying+it+all+together.pdf |
158,441 |
1566C424 |
Chapter_5-Sandboxing_Malware\22. Online Malware Analysis through Any Run.mp4
[885d62ed21bad143]
|
80,459,883 |
8D54842C |
Chapter_5-Sandboxing_Malware\Additional_Files\Sandboxing+Malware.pdf |
177,904 |
973D12A5 |
Chapter_5-Sandboxing_Malware\Additional_Files\SynapseX.bin.zip |
171,003 |
E2BC83CA |
Chapter_1-Introduction\1. Introduction to Course.mp4
[b57e23c9ef6282db]
|
12,994,976 |
2AF3C469 |
Chapter_1-Introduction\2. Who AM I .mp4
[27c13361d518bdaa]
|
20,893,310 |
EE4169F9 |
Chapter_1-Introduction\3. Introduction to Malware Analysis.mp4
[7f20e84a4bd232e5]
|
16,360,640 |
9D442756 |
Chapter_1-Introduction\Additional_Files\Introduction+to++Malware+Analysis.pdf |
164,499 |
7E32FD4E |
Chapter_2-Lab_Setup\Additional_Files |
0 |
00000000 |
Chapter_3-Basic_Static_Malware_Analysis\Additional_Files |
0 |
00000000 |
Chapter_4-Dynamic_Malware_Analysis\Additional_Files |
0 |
00000000 |
Chapter_5-Sandboxing_Malware\Additional_Files |
0 |
00000000 |
Chapter_1-Introduction\Additional_Files |
0 |
00000000 |
Chapter_2-Lab_Setup |
0 |
00000000 |
Chapter_3-Basic_Static_Malware_Analysis |
0 |
00000000 |
Chapter_4-Dynamic_Malware_Analysis |
0 |
00000000 |
Chapter_5-Sandboxing_Malware |
0 |
00000000 |
Chapter_1-Introduction |
0 |
00000000 |
|
Total size: |
1,477,714,708 |
|
|