OO RE with HexraysCodeXplorer

OO RE with HexraysCodeXplorer

NorthSec via YouTube Direct link

Approaching Flamer

10 of 23

10 of 23

Approaching Flamer

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

OO RE with HexraysCodeXplorer

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Modern C++ Malware for Targeted Attacks
  3. 3 Virtual Methods
  4. 4 Virtual Function Tables
  5. 5 C++ Templates
  6. 6 C++ Code Reconstruction Problems
  7. 7 REconstructing Flamer Framework
  8. 8 Data Types Beins Used: Smart pointers
  9. 9 Data Types Being Used: Vectors
  10. 10 Approaching Flamer
  11. 11 REconstructing Object's Attributes
  12. 12 XAgent Framework
  13. 13 Object Interconnection: IAgent Module
  14. 14 XAgent: LocalDataStorage
  15. 15 XAgent: Cryptor
  16. 16 XAgent: IReservedApi
  17. 17 XAgent: Identifying Used Types
  18. 18 Hex-Rays Decompiler Plugin SDK
  19. 19 DEMO time :
  20. 20 HexRaysCodexplorer: v1.7 [NSEC Edition]
  21. 21 Why python?
  22. 22 HexRaysCodeXplorer: Next plans
  23. 23 Thank you for your attention!

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.