Completed
Reversing CryptoCrazy Ransomware - PoC Decryptor and some Tricks
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Malware Analysis Tips and Tricks
Automatically move to the next video in the Classroom when playback concludes
- 1 Deobfuscation SmartAssembly 8+ and recreating Original Module SAE+DnSpy
- 2 Advanced DnSpy tricks in .NET reversing - Tracing, Breaking, dealing with VMProtect
- 3 Full malware analysis Work-Flow of AgentTesla Malware
- 4 Powershell and DnSpy tricks in .NET reversing – AgentTesla [Part2]
- 5 Powershell and DnSpy tricks in .NET reversing – AgentTesla [Part1]
- 6 Reversing CryptoCrazy Ransomware - PoC Decryptor and some Tricks
- 7 [2] Lokibot analyzing - spoofing GULoader and LokiBot C2 [part2] - INetSim + BurpSuite
- 8 Fast API resolving of REvil Ransomware related to Kaseya attack
- 9 [2] Lokibot analyzing - spoofing GULoader and LokiBot C2 [part1] - Own implementation in Python
- 10 [1] Lokibot analyzing - defeating GuLoader with Windbg (Kernel debugging) and Live C2
- 11 Visible vs Hidden vs VeryHidden Sheet - Excel Binary File Format (.xls)
- 12 Abusing External Resource References MSOffice [part1] - TEMPLATE_INJECTION
- 13 Abusing External Resource References MSOffice [part2] - OLEOBJECT_INJECTION