Completed
HexRaysCodexplorer: v1.7 [NSEC Edition]
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
OO RE with HexraysCodeXplorer
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Modern C++ Malware for Targeted Attacks
- 3 Virtual Methods
- 4 Virtual Function Tables
- 5 C++ Templates
- 6 C++ Code Reconstruction Problems
- 7 REconstructing Flamer Framework
- 8 Data Types Beins Used: Smart pointers
- 9 Data Types Being Used: Vectors
- 10 Approaching Flamer
- 11 REconstructing Object's Attributes
- 12 XAgent Framework
- 13 Object Interconnection: IAgent Module
- 14 XAgent: LocalDataStorage
- 15 XAgent: Cryptor
- 16 XAgent: IReservedApi
- 17 XAgent: Identifying Used Types
- 18 Hex-Rays Decompiler Plugin SDK
- 19 DEMO time :
- 20 HexRaysCodexplorer: v1.7 [NSEC Edition]
- 21 Why python?
- 22 HexRaysCodeXplorer: Next plans
- 23 Thank you for your attention!