Главная
Клипы
Новинки
Тренды
Популярные
Лайки
Комментарии
Все категории
Музыка
Фильмы
Видеоигры
Транспорт
Животные
Спорт
Путешествия
Люди и блоги
Юмор
Развлечения
Политика
Хобби
Образование
Наука
Организации
Найти
Basic User Behavior Simulation
Ali Hadi
4,65 тыс. подписчиков
Скачать
111 видео с канала:
Ali Hadi
Basic User Behavior Simulation
Скачать
Fileless Malware Simulation
Скачать
Simulation of the ShrinkLocker Ransomware using BitLocker
Скачать
Installing Velociraptor - Windows Client
Скачать
Installing Velociraptor - Server Config Files
Скачать
Installing Velociraptor - Installing Server Package
Скачать
Overview of Installing log2timeline and using Timesketch
Скачать
Working with log2timeline and Timesketch
Скачать
Installing Sysmon and Elastic Agents (Security Onion)
Скачать
Security Onion 2.4 Standalone Setup
Скачать
Ransomware Simulation - Scenario #3
Скачать
Ransomware Simulation - Scenario #2
Скачать
Ransomware Simulation - Scenario #1
Скачать
New PowerShell Plugin - Adversary Simulation
Скачать
Fixing a Corrupted MBR Drive - Case #1
Скачать
Fixing a Corrupted GPT Drive - Case #3
Скачать
Fixing a Corrupted GPT Drive - Case #2
Скачать
Fixing a Corrupted GPT Drive - Case #1
Скачать
Run Key Mystery - Did the Program Truly Run or Not?
Скачать
Parsing Multiple Registry Hives using VSCToolset and RegRipper
Скачать
Parsing Run Keys using RegRipper
Скачать
Grouping Agents
Скачать
C5W Agent Peer2Peer Capability
Скачать
Demo of the Code Injection Plugin
Скачать
Unloading the RansomCare Plugin at Runtime.
Скачать
Adding Custom HTTP Headers.
Скачать
Loading and Unloading RansomCare over DNS
Скачать
LNK File Testing and New Findings (Discussion)
Скачать
Reading NTFS Dataruns
Скачать
MFT Slack Space Discussion (No longer There)!
Скачать
Comparison between Loading a Dirty and Clean Windows.edb using WinSearchDBAnalyzer
Скачать
Fixing Windows edb and using WinSearchDBAnalyzer
Скачать
Fixing and Loading a Corrupted GPT Drive
Скачать
Fixing and Loading a Corrupted MBR Drive
Скачать
41-Reviewing 010 Template for PE File Format & How RVA to FOA is Calculated
Скачать
40-Working with 010 Templates - PE File (Part #12)
Скачать
39-Working with 010 Templates - PE File (Part #11)
Скачать
38-Working with 010 Templates - PE File (Part #10)
Скачать
37-Working with 010 Templates - PE File (Part #9)
Скачать
36-Working with 010 Templates - PE File (Part #8)
Скачать
35-Working with 010 Templates - PE File (Part #7)
Скачать
34-Working with 010 Templates - PE File (Part #6)
Скачать
33-Working with 010 Templates - PE File (Part #5)
Скачать
32-Working with 010 Templates - PE File (Part #4)
Скачать
31-Working with 010 Templates - PE File (Part #3)
Скачать
30- Working with 010 Templates - PE File (Part #2)
Скачать
29- Working with 010 Templates - PE File (Part #1)
Скачать
Tracing Windows APIs using Tiny_Tracer
Скачать
Writing Yara Rules - Part #2
Скачать
IOCs and Yara - Part #1
Скачать
More Yara Rules - Part #3
Скачать
28- Templates (Part 2) and File Signatures
Скачать
27- Templates (Part 1)
Скачать
26- Inspector (Interpreter Part 2)
Скачать
25- Inspector (Interpreting Data)
Скачать
1- The 010 Editor, Let us start
Скачать
20-Using EggHunters on Windows 10
Скачать
19-SEH Exploitation Case Study #2 and Howto Jump Backwards in Memory
Скачать
17-Finding Badchars Manually
Скачать
18-Finding Badchars using mona
Скачать
Creating a GPG Key and using Gpg4win to Send Secret Messages
Скачать
16-Stack Guards (aka Stack Cookies) and HowTo Bypass them using SEH
Скачать
15-Intro to SEH Exploitation with VS Studio Compilation Examples
Скачать
14-Client Side Exploitation using Evil Server, No JMP ESP, and NULL Bytes
Скачать
13-Exploiting Ultra Mini HTTPd Webserver
Скачать
12-Exploitation Methods and Exploiting VUPlayer
Скачать
11-Exploiting Test2.exe and Calculating Offset to Return Address
Скачать
26-Removing Badchars from Any Payload (e.g. win-exec-calc-shellcode)
Скачать
10-Removing Badchars from Any Payload (e.g. win-exec-calc-shellcode) - P2
Скачать
10-Removing Badchars from Any Payload (e.g. win-exec-calc-shellcode)
Скачать
9-Exploiting Test.exe
Скачать
8-Corrupting Test.exe Memory
Скачать
7-Debugging Test.exe
Скачать
6-Intro to Software Exploitation (Memory Land Part #3)
Скачать
5-Intro to Software Exploitation (Memory Land Part #2)
Скачать
4-Intro to Software Exploitation (Memory Land Part #1)
Скачать
Investigating Windows Scheduled Tasks used by Ransomware
Скачать
Download and Run LNK File
Скачать
Learning about .NET Malware by Going Over the SUNBURST SolarWinds Backdoor
Скачать
Howto Install and Configure Zeek to Ship Logs to Splunk
Скачать
How Process Hacker Can Easily Detect a Malware Installing a Windows Service
Скачать
25-SEH Buffer Overflow Case Study #2
Скачать
3-Bug hunting (intro)
Скачать
24-Modifying Backward Jump (Bonus)
Скачать
23-SEH Vulnserver Case Study - (Part 3)
Скачать
22-SEH Vulnserver Case Study - (Part 2)
Скачать
21-SEH Vulnserver Case Study - (Part 1)
Скачать
2-Intro to PE File Format
Скачать
1-Introduction to the Offensive Software Exploitation Course
Скачать
20-Memory Jumping Strategies
Скачать
19-Exploit Mitigation Part-1 (Theory)
Скачать
18-Finding and Eliminating Badchars
Скачать
17-Client Side Buffer Overflow Case #2
Скачать
16-Client Side Buffer Overflow
Скачать
15-Client Side Attacks Theory
Скачать
14-Exploiting Vulnserver (Case1)
Скачать
13-Fuzzing Vulnserver using SPIKE (Case1)
Скачать
12-Fuzzing and Exploitation Determination
Скачать
11-Monitoring Test.exe and Dumping its Memory using Procdump
Скачать
10-Exploiting Test.exe
Скачать
9-Corrupting the Stack and Controlling EIP
Скачать
8-Debugging Test.exe
Скачать
7-Debugging Intro Lab
Скачать
6-Debugging (theory)
Скачать
5-Intro to Software Exploitation
Скачать
4-Intro to Software Exploitation
Скачать
3-Intro to Software Exploitation
Скачать
OS Importance 4 Cybersecurity and DFIR (AR)
Скачать
OS Importance 4 Cybersecurity and DFIR (EN)
Скачать
2-Bug hunting
Скачать
1-PE File Format Basics and others
Скачать
Канал: Ali Hadi
Basic User Behavior Simulation
Скачать
Fileless Malware Simulation
Скачать
Simulation of the ShrinkLocker Ransomware using BitLocker
Скачать
Installing Velociraptor - Windows Client
Скачать
Installing Velociraptor - Server Config Files
Скачать
Installing Velociraptor - Installing Server Package
Скачать
Overview of Installing log2timeline and using Timesketch
Скачать
Working with log2timeline and Timesketch
Скачать
Installing Sysmon and Elastic Agents (Security Onion)
Скачать
Security Onion 2.4 Standalone Setup
Скачать
Ransomware Simulation - Scenario #3
Скачать
Ransomware Simulation - Scenario #2
Скачать
Ransomware Simulation - Scenario #1
Скачать
New PowerShell Plugin - Adversary Simulation
Скачать
Fixing a Corrupted MBR Drive - Case #1
Скачать
Fixing a Corrupted GPT Drive - Case #3
Скачать
Fixing a Corrupted GPT Drive - Case #2
Скачать
Fixing a Corrupted GPT Drive - Case #1
Скачать
Run Key Mystery - Did the Program Truly Run or Not?
Скачать
Parsing Multiple Registry Hives using VSCToolset and RegRipper
Скачать
Parsing Run Keys using RegRipper
Скачать
Grouping Agents
Скачать
C5W Agent Peer2Peer Capability
Скачать
Demo of the Code Injection Plugin
Скачать
Unloading the RansomCare Plugin at Runtime.
Скачать
Adding Custom HTTP Headers.
Скачать
Loading and Unloading RansomCare over DNS
Скачать
LNK File Testing and New Findings (Discussion)
Скачать
Reading NTFS Dataruns
Скачать
MFT Slack Space Discussion (No longer There)!
Скачать
Comparison between Loading a Dirty and Clean Windows.edb using WinSearchDBAnalyzer
Скачать
Fixing Windows edb and using WinSearchDBAnalyzer
Скачать
Fixing and Loading a Corrupted GPT Drive
Скачать
Fixing and Loading a Corrupted MBR Drive
Скачать
41-Reviewing 010 Template for PE File Format & How RVA to FOA is Calculated
Скачать
40-Working with 010 Templates - PE File (Part #12)
Скачать
39-Working with 010 Templates - PE File (Part #11)
Скачать
38-Working with 010 Templates - PE File (Part #10)
Скачать
37-Working with 010 Templates - PE File (Part #9)
Скачать
36-Working with 010 Templates - PE File (Part #8)
Скачать
35-Working with 010 Templates - PE File (Part #7)
Скачать
34-Working with 010 Templates - PE File (Part #6)
Скачать
33-Working with 010 Templates - PE File (Part #5)
Скачать
32-Working with 010 Templates - PE File (Part #4)
Скачать
31-Working with 010 Templates - PE File (Part #3)
Скачать
30- Working with 010 Templates - PE File (Part #2)
Скачать
29- Working with 010 Templates - PE File (Part #1)
Скачать
Tracing Windows APIs using Tiny_Tracer
Скачать
Writing Yara Rules - Part #2
Скачать
IOCs and Yara - Part #1
Скачать
More Yara Rules - Part #3
Скачать
28- Templates (Part 2) and File Signatures
Скачать
27- Templates (Part 1)
Скачать
26- Inspector (Interpreter Part 2)
Скачать
25- Inspector (Interpreting Data)
Скачать
1- The 010 Editor, Let us start
Скачать
20-Using EggHunters on Windows 10
Скачать
19-SEH Exploitation Case Study #2 and Howto Jump Backwards in Memory
Скачать
17-Finding Badchars Manually
Скачать
18-Finding Badchars using mona
Скачать
Creating a GPG Key and using Gpg4win to Send Secret Messages
Скачать
16-Stack Guards (aka Stack Cookies) and HowTo Bypass them using SEH
Скачать
15-Intro to SEH Exploitation with VS Studio Compilation Examples
Скачать
14-Client Side Exploitation using Evil Server, No JMP ESP, and NULL Bytes
Скачать
13-Exploiting Ultra Mini HTTPd Webserver
Скачать
12-Exploitation Methods and Exploiting VUPlayer
Скачать
11-Exploiting Test2.exe and Calculating Offset to Return Address
Скачать
26-Removing Badchars from Any Payload (e.g. win-exec-calc-shellcode)
Скачать
10-Removing Badchars from Any Payload (e.g. win-exec-calc-shellcode) - P2
Скачать
10-Removing Badchars from Any Payload (e.g. win-exec-calc-shellcode)
Скачать
9-Exploiting Test.exe
Скачать
8-Corrupting Test.exe Memory
Скачать
7-Debugging Test.exe
Скачать
6-Intro to Software Exploitation (Memory Land Part #3)
Скачать
5-Intro to Software Exploitation (Memory Land Part #2)
Скачать
4-Intro to Software Exploitation (Memory Land Part #1)
Скачать
Investigating Windows Scheduled Tasks used by Ransomware
Скачать
Download and Run LNK File
Скачать
Learning about .NET Malware by Going Over the SUNBURST SolarWinds Backdoor
Скачать
Howto Install and Configure Zeek to Ship Logs to Splunk
Скачать
How Process Hacker Can Easily Detect a Malware Installing a Windows Service
Скачать
25-SEH Buffer Overflow Case Study #2
Скачать
3-Bug hunting (intro)
Скачать
24-Modifying Backward Jump (Bonus)
Скачать
23-SEH Vulnserver Case Study - (Part 3)
Скачать
22-SEH Vulnserver Case Study - (Part 2)
Скачать
21-SEH Vulnserver Case Study - (Part 1)
Скачать
2-Intro to PE File Format
Скачать
1-Introduction to the Offensive Software Exploitation Course
Скачать
20-Memory Jumping Strategies
Скачать
19-Exploit Mitigation Part-1 (Theory)
Скачать
18-Finding and Eliminating Badchars
Скачать
17-Client Side Buffer Overflow Case #2
Скачать
16-Client Side Buffer Overflow
Скачать
15-Client Side Attacks Theory
Скачать
14-Exploiting Vulnserver (Case1)
Скачать
13-Fuzzing Vulnserver using SPIKE (Case1)
Скачать
12-Fuzzing and Exploitation Determination
Скачать
11-Monitoring Test.exe and Dumping its Memory using Procdump
Скачать
10-Exploiting Test.exe
Скачать
9-Corrupting the Stack and Controlling EIP
Скачать
8-Debugging Test.exe
Скачать
7-Debugging Intro Lab
Скачать
6-Debugging (theory)
Скачать
5-Intro to Software Exploitation
Скачать
4-Intro to Software Exploitation
Скачать
3-Intro to Software Exploitation
Скачать
OS Importance 4 Cybersecurity and DFIR (AR)
Скачать
OS Importance 4 Cybersecurity and DFIR (EN)
Скачать
2-Bug hunting
Скачать
1-PE File Format Basics and others
Скачать