MalwareAnalysisForHedgehogs
Malware Analysis - Virut's NTDLL Hooking and Process Infection, Part 2
59:13
MalwareAnalysisForHedgehogs
Malware Analysis - Virut, Unpacking a Polymorphic File Infector, Part I
54:36
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking Lumma Stealer from Emmenhtal and Pure Crypter
34:56
MalwareAnalysisForHedgehogs
Malware Analysis - Binary Refinery URL extraction of Multi-Layered PoshLoader for LummaStealer
21:29
MalwareAnalysisForHedgehogs
Antivirus myths and how AVs actually work
16:35
MalwareAnalysisForHedgehogs
Malware Analysis - Writing Code Signatures
40:54
MalwareAnalysisForHedgehogs
Malware Analysis - Writing x64dbg unpacking scripts
20:51
MalwareAnalysisForHedgehogs
Malware Analysis - ConfuserEx 2 Deobfuscation with Python and dnlib, BBTok Loader
47:35
MalwareAnalysisForHedgehogs
Writing an unpacker for a 3-stage stub with emulation via speakeasy
30:45
MalwareAnalysisForHedgehogs
How to analyse Inno Setup #shorts #innosetup
0:36
MalwareAnalysisForHedgehogs
IDA vs Binary Ninja vs Ghidra after 1.5 years using them
11:09
MalwareAnalysisForHedgehogs
The real reason antivirus software detects cracks
3:20
MalwareAnalysisForHedgehogs
How to deal with bloated malware #malwareanalysis #debloat #shorts
0:38
MalwareAnalysisForHedgehogs
Malware Analysis - D3f@ck loader from Inno Setup to JPHP
31:33
MalwareAnalysisForHedgehogs
Reversing PyInstaller in 6 Steps #python #reverseengineering #pyinstaller #shorts
0:52
MalwareAnalysisForHedgehogs
Can PDFs be Malware? #malware #pdf #exploits #shorts
0:58
MalwareAnalysisForHedgehogs
Malware Simulators cannot test Antivirus Software
12:44
MalwareAnalysisForHedgehogs
Triaging Files on VirusTotal
30:44
MalwareAnalysisForHedgehogs
Malware Analysis - JS to PowerShell to XWorm with Binary Refinery
34:11
MalwareAnalysisForHedgehogs
Malware Theory - Five Unpacking Methods and a Generic Unpacking Approach
13:26
MalwareAnalysisForHedgehogs
Binary Ninja - Fix unresolved stack pointer
5:30
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking AutoIt stub with large obfuscated script
40:05
MalwareAnalysisForHedgehogs
Malware Analysis - C2 extractor for Turla's Kopiluwak using Binary Refinery
27:09
MalwareAnalysisForHedgehogs
Malware Analysis - 3 ways to deobfuscate JScript and JavaScript malware
43:08
MalwareAnalysisForHedgehogs
Malware Analysis - .NETReactor deobfuscation and configuration extraction of AgentTesla
16:18
MalwareAnalysisForHedgehogs
Malware Analysis - ZPAQ to .NET downloader to Injector DLL unpacking
28:07
MalwareAnalysisForHedgehogs
Hiding .NET IL code from DnSpy with R2R Stomping
19:24
MalwareAnalysisForHedgehogs
Reversing - .NET main is not the first thing executed
9:03
MalwareAnalysisForHedgehogs
Malware Analysis Course for Hedgehogs is out
4:47
MalwareAnalysisForHedgehogs
Malware Analysis - Agniane Stealer, Native Stub to .NET Unpacking
20:06
MalwareAnalysisForHedgehogs
Why Windows system files have wrong compile timestamps
4:13
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking Ageostealer built with Electron Framework
10:36
MalwareAnalysisForHedgehogs
Malware Theory - Packer identifiers don"t tell you if a file is packed
9:57
MalwareAnalysisForHedgehogs
Malware Analysis - 3CX SmoothOperator C2 extraction with x64dbg and CyberChef
45:37
MalwareAnalysisForHedgehogs
Malware Analysis - 3CX SmoothOperator Authenticode Abuse
9:22
MalwareAnalysisForHedgehogs
Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja
37:03
MalwareAnalysisForHedgehogs
Malware Theory - How Packers Work, Polymorphism and Misconceptions
14:00
MalwareAnalysisForHedgehogs
Does Writing Malware Help With Malware Analysis?
14:57
MalwareAnalysisForHedgehogs
Malware Analysis - Decrypt NighHawk Strings with Ghidra Scripting
28:20
MalwareAnalysisForHedgehogs
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free
26:47
MalwareAnalysisForHedgehogs
Malware Analysis - Kernel Mode Driver Emulation with Speakeasy
17:24
MalwareAnalysisForHedgehogs
Malware Analysis - Hybrid Analysis for Malware Assessment
37:28
MalwareAnalysisForHedgehogs
Book Review - Malware Analysis and Detection Engineering
14:54
MalwareAnalysisForHedgehogs
Malware Theory - Overview to Malware Vaccines
11:32
MalwareAnalysisForHedgehogs
Reversing - Writing an EXE4J Configuration Extractor
21:06
MalwareAnalysisForHedgehogs
Malware Theory - Trojan Horse is not a Malware Type
8:33
MalwareAnalysisForHedgehogs
Malware Theory - Process Injection
9:26
MalwareAnalysisForHedgehogs
Malware Theory - Imphash algorithm explained
5:43
MalwareAnalysisForHedgehogs
Malware Theory - Understanding .NET Streams and Metadata
6:43
MalwareAnalysisForHedgehogs
Malware Analysis - Fileless GooLoad static analysis and unpacking
29:51
MalwareAnalysisForHedgehogs
Malware Analysis - Simple Habits to Stop Going Down the Rabbit Hole
33:43
MalwareAnalysisForHedgehogs
Most controversial files on VirusTotal
17:22
MalwareAnalysisForHedgehogs
Malware Analysis - Dumping COVID-19.jar with Java Instrumentation
15:29
MalwareAnalysisForHedgehogs
Malware Theory - Network Worm Basics
8:03
MalwareAnalysisForHedgehogs
Malware Theory - PE Malformations and Anomalies
18:08
MalwareAnalysisForHedgehogs
Malware Theory - Why There Is No Perfect Antivirus Scanner
10:23
MalwareAnalysisForHedgehogs
Malware Analysis - DOSfuscation Deobfuscation
13:31
MalwareAnalysisForHedgehogs
Malware Theory - Oligomorphic, Polymorphic and Metamorphic Viruses
5:23
MalwareAnalysisForHedgehogs
Malware Theory - Memory Mapping of PE Files
5:44
MalwareAnalysisForHedgehogs
Malware Theory - Portable Executable Resources
8:19
MalwareAnalysisForHedgehogs
Malware Theory - Basic Structure of PE Files
6:29
MalwareAnalysisForHedgehogs
Writing Malware Analysis Papers and Blog Articles
12:57
MalwareAnalysisForHedgehogs
Malware Analysis - When De4dot fails, Removing Anti Tamper from NullShield
14:44
MalwareAnalysisForHedgehogs
Malware Analysis - Deobfuscating .NET Assemblies with De4Dot
13:02
MalwareAnalysisForHedgehogs
Malware Analysis - Unpack and Decompile PyInstaller Malware
10:32
MalwareAnalysisForHedgehogs
Malware Analysis - ROKRAT Unpacking from Injected Shellcode
14:46
MalwareAnalysisForHedgehogs
Ask An Analyst - How did I get Into Malware Analysis?
6:57
MalwareAnalysisForHedgehogs
Malware Analysis - Finding Fresh Samples Without Paid Account
14:46
MalwareAnalysisForHedgehogs
Malware Analysis - What is a Scantime Crypter?
14:50
MalwareAnalysisForHedgehogs
Malware Analysis - Deobfuscating Loyeetro Trojan-Spy
19:14
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking RunPE Loyeetro Trojan
18:28
MalwareAnalysisForHedgehogs
Malware Analysis - Creating a Decrypter for Alpha Ransomware Pt. 3
21:20
MalwareAnalysisForHedgehogs
Anti-Reversing - Anti-Dump Trick "Header Erase"
6:54
MalwareAnalysisForHedgehogs
Malware Analysis - Getting Started with High-Level Petna / Petya
12:22
MalwareAnalysisForHedgehogs
Malware Analysis - Encryption Algorithm of Alpha Ransomware (Pt. 2)
29:28
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking Alpha Ransomware (Pt. 1)
40:43
MalwareAnalysisForHedgehogs
Malware Analysis - Code Injection via CreateRemoteThread & WriteProcessMemory
14:47
MalwareAnalysisForHedgehogs
Malware Analysis - Hook Injection PoC by Robert Kuster
19:20
MalwareAnalysisForHedgehogs
Malware Analysis - Process Hollowing
13:30
MalwareAnalysisForHedgehogs
Ask An Analyst - Becoming a Malware Analyst With Sarah and Fabian
54:06
MalwareAnalysisForHedgehogs
Malware Analysis - Exploring Spora's Encryption Procedure
22:46
MalwareAnalysisForHedgehogs
Ask An Analyst - Frustrating and Exciting Sides of our Job
42:32
MalwareAnalysisForHedgehogs
Ask an Analyst - Fabian and Sarah Explain their Polar Bear Obsession
16:28
MalwareAnalysisForHedgehogs
MalwareAnalysisForHedgehogs Live Stream
MalwareAnalysisForHedgehogs
Malware Analysis - Fun With Fiddler
7:59
MalwareAnalysisForHedgehogs
Malware Analysis - Malware Hunting and Classification with YARA
21:07
MalwareAnalysisForHedgehogs
Anti-Reversing - A Way to Learn Anti-Reversing Tricks
11:14
MalwareAnalysisForHedgehogs
Anti-Reversing - Anti-Debug Trick SetUnhandledExceptionFilter
8:21
MalwareAnalysisForHedgehogs
Malware Analysis - Batch2Exe Wrapped Ransomware
10:57
MalwareAnalysisForHedgehogs
Malware Analysis - Macro Malware Analysis
15:22
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking njRAT Protected by Confuser v.1.9 and others
21:34
MalwareAnalysisForHedgehogs
Malware Analysis - HolyCrypt and PowerWare Ransomware
20:57
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking Flash Malware using HxD
16:16
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking NetWiredRC With DnSpy
27:05
MalwareAnalysisForHedgehogs
Malware Analysis - Java Malware Deobfuscation
20:38
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking a Multilayered VBScript Worm
11:34
MalwareAnalysisForHedgehogs
Lab Setup - Convenience Tricks for your Lab
8:27
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking Locky with VirtualAlloc
6:55
MalwareAnalysisForHedgehogs
Malware Analysis - .NET Unpacking
23:58
MalwareAnalysisForHedgehogs
Malware Analysis - Unpacking with HxD and Python
11:38