Unpacking Princess Locker and Fixing Corrupted PE Header (OALabs x MalwareAnalysisForHedgehogs)

1:53:17
N00bs Night Malware RE Workshop with @c3rb3ru5d3d53c

33:23
Analyzing Adwind / JRAT Java Malware

28:05
Lazy String Decryption Tips With IDA PRO and Shade Ransomware Unpacked!

42:28
Unpacking Process Injection Malware With IDA PRO (Part 1)

13:26
Malware Theory - Five Unpacking Methods and a Generic Unpacking Approach

20:21
Malware Analysis Bootcamp - Analyzing The PE Header

23:47
The Rust vs C Linux Divide.. Another Rust Maintainer Steps Down.

28:54