Reverse Engineering — Decompiling A Virus To C Source Code (IDA Pro) - - vimore.org

Reverse Engineering — Decompiling A Virus To C Source Code (IDA Pro)

Reverse Engineering — Decompiling A Virus To C Source Code (IDA Pro)

YouTube

Starting new series! IDA Pro 6.8 tutorials • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1JhSKGgRQmir8rRF4Sm5CP4fDDofKFAypd • Facebook: https://www.facebook.com/Zer0Mem0ry • Twitter: https://www.twitter.com/Zer0Mem0ry



Reversing and Cracking first simple Program - bin 0x05

A very simple reversing challenge for Linux GitHub: https://github.com/LiveOverflow/liveoverflow_youtube/tree/master/0x05_simple_crackme_intro_assembler http:/

YouTube

How I reverse engineer a chip

A whirlwind tour of my procedure going from physical chip to annotated die image to schematic to wiki page to you! Hot sulfuric acid decapsulation of plastic p

YouTube

C/C++ Memory Hacking — Run PE | Run Executable From Memory

Source download: Link Removed • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1JhSKGgRQmir8rRF4Sm5CP4fDDofKFAypd • Facebook: https

YouTube

Wana Decrypt0r (Wanacry Ransomware) - Computerphile

$300 or your files are toast: Dr Pound takes a look at the latest ransomware to be doing the rounds. How Wana Decrypt0r encrypts files: https://youtu.be/pLlu

YouTube

C/C++ Kernel Mode — Communcation From User space To Kernel Space (IOCTL)

Get My Visual Studio Theme! https://www.patreon.com/posts/how-to-get-and-8806134 • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1

YouTube

How to trace a Trojan back to it's owner

JackkTutorials shows you how to trace an ip address from a well known Trojan called a Remote Administration Tool or RAT for short Quick Links -----------------

YouTube

Основы дизассемблирования

Введение в дизассемблирование программ. Анализ простейших программ с использованием gcc -S, objdump, hiew, IDA Pro. Дополнительные источники информации: Викиу

YouTube

How To Make A Self-Replicating Virus

📖📕 GET THE NEW TINKERNUT BOOK: http://bit.ly/Tinkernutbook 📕📖 Description: How do viruses clone themselves to other computers? Let's take a look and learn how

YouTube

Reverse Engineering: Programme cracken

Vielen Dank für Ihre Unterstützung: https://paypal.me/SemperVideo http://www.patreon.com/sempervideo?ty=c http://flattr.com/profile/SemperVideo http://amzn.

YouTube

C/C++ Memory Hacking — API Call Hooking | Intercepting API calls

You can easily get your dll loaded to every process by modifying App_init_dlls registry. http://arcaneincantations.mvps.org/wi... Project: https://github.com/Z

YouTube

C++ Game Hacking Tutorial Ep.1 | Reading/Writing Memory

The absolute basics of reading/writing memory in C++. For those of you who want to make an aimbot, or walhack: This is the place to start. You need to learn to

YouTube

Samy Kamkar: Getting Started with Reverse Engineering

Samy Kamkar is a security researcher know of uncovering vulnerabilities in wireless systems. His talk at the 2017 Hackaday Superconference covered keyless entry

YouTube

C/C++ Memory Hacking — Self Modifying Code | Encrypt Memory At Runtime

Project Download: Link Removed. DumpMemory: https://gist.github.com/domnikl/af00cc154e3da1c5d965 Get My Visual Studio Theme! https://www.patreon.com/posts/ho

YouTube

WannaCry 2.0 Ransomware

A very quick behavioural analysis of WannaCry / wanacry 2.0 / wanacrypt0r ransomware. Filmed in one take with a view to show how to really quickly analyse a sam

YouTube

Basic Dynamic Analysis with IDA Pro and WinDBG

This video demonstrates the basics of using IDA Pro and WinDBG presented in the form of evaluating a sample application. Enjoy! -brad antoniewicz

YouTube

Intro to Ida disassembler

in this video i briefly show you ida and how it disassembles a crackme i made lol :)

YouTube

iOS Hacking Basics - Reverse Engineering iOS Apps & Runtime Modification Tutorial

Enjoy and please subscribe! This video took a long time to put together and edit so please leave a LIKE! :D My Twitter - twitter.com/bellis1000

YouTube

C/C++ Memory Hacking — Function Hooking / Detouring

Project on github: https://github.com/Zer0Mem0ry/Detour/tree/master IDA Pro sigmaker: https://tuts4you.com/download.php?view.3263 Get My Visual Studio Theme!

YouTube

WannaCry 2.0 - Three ways to find the Kill Switch

Here I demonstrate three ways you can find the Kill Switch that is hard-coded into the WannaCry 2.0 Ransomware sample. Firstly we look at the network strings in

YouTube

MMORPG Bot Reverse Engineering and Tracking

A friend told me that a GW2 trading bot implemented a dumb API. We are going to find and use it to track the bot. Play Guild Wars 2: https://account.arena.net/

YouTube