Please open Telegram to view this post
VIEW IN TELEGRAM
ASM-Tutorial-Silence@securebyte.rar
159.3 MB
#TrainingCourse #Programming #Assembly
Silence's Programings Tour WinASM - MASM32
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
Silence's Programings Tour WinASM - MASM32
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
Persian-WinASM-MASM@securebyte.rar
93.4 MB
#TrainingCourse #Programming #Assembly
Death-Song Assembly Language Programming in WinASM
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
Death-Song Assembly Language Programming in WinASM
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#TrainingCourse #Programming #CPP
📗C++ API Programming References
رفرنس اول : theForger's Win32 API Programming Tutorial
در زبان ++C درس داده شده و دارای چندین نسخه ترجمه شده از جمله زبان انگلیسی .
🌐 Website
رفرنس دوم : وب سایت ZetCode
در زبان ++C که نسخه تجاری به صورت PDF از همین سرفصل ها قابل ارائه توسط وب سایت است که اگر نسخه رایگان برای شما جالب و کاربردی بود امکان خرید eBook را هم خواهید داشت.
🌐 Website
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗C++ API Programming References
رفرنس اول : theForger's Win32 API Programming Tutorial
در زبان ++C درس داده شده و دارای چندین نسخه ترجمه شده از جمله زبان انگلیسی .
🌐 Website
رفرنس دوم : وب سایت ZetCode
در زبان ++C که نسخه تجاری به صورت PDF از همین سرفصل ها قابل ارائه توسط وب سایت است که اگر نسخه رایگان برای شما جالب و کاربردی بود امکان خرید eBook را هم خواهید داشت.
🌐 Website
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
👍1
#TrainingCourse #MalwareAnalysis
📗Introduction to Malware Analysis and Reverse Engineering (2017-2018-2020) University of Cincinnati.
➖Week 01: Introduction to VirtualBox and Lab VMs
➖Week 02: Intro to malware taxonomy / building a basic attack
➖Week 03: Deconstruct attack with static analysis
➖Week 04: x86 disassembly and analysis
➖Week 05: Dynamic analysis, networking, Immunity Intro
➖Week 06: Immunity Debugger analysis workflows
➖Week 07: Mid-Term Project week #1, no class
➖Week 08: Run-time analysis with debugger / inetsim / etc.
➖Week 09: Identification with Yara and other tools
➖Week 10: Spring break - NO CLASS
➖Week 11: Using ELK to analyze behavioral logs
➖Week 12: Java & SWF malware analysis
➖Week 13: Android Malware analysis tools, setup
➖Week 14: Android malware static analysis
➖Week 15: Android malware live analysis
➖Week 16: Finals week - Final project
🌐 Website
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗Introduction to Malware Analysis and Reverse Engineering (2017-2018-2020) University of Cincinnati.
➖Week 01: Introduction to VirtualBox and Lab VMs
➖Week 02: Intro to malware taxonomy / building a basic attack
➖Week 03: Deconstruct attack with static analysis
➖Week 04: x86 disassembly and analysis
➖Week 05: Dynamic analysis, networking, Immunity Intro
➖Week 06: Immunity Debugger analysis workflows
➖Week 07: Mid-Term Project week #1, no class
➖Week 08: Run-time analysis with debugger / inetsim / etc.
➖Week 09: Identification with Yara and other tools
➖Week 10: Spring break - NO CLASS
➖Week 11: Using ELK to analyze behavioral logs
➖Week 12: Java & SWF malware analysis
➖Week 13: Android Malware analysis tools, setup
➖Week 14: Android malware static analysis
➖Week 15: Android malware live analysis
➖Week 16: Finals week - Final project
🌐 Website
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_