M. Heiderich, E.A.V. Nava, G. Heyes, D. Lindsay - Web Application Obfuscation - 2010.pdf
7 months, 1 week
Files: 1 Total size: 1.5 MB Total requests: 45 Last access time: 1 week, 2 days
|
[ FreeCourseWeb.com ] PluralSight - Malware Analysis- Identifying and Defeating Code Obfuscation.zip
10 months
Files: 1 Total size: 254.7 MB Total requests: 19 Last access time: 1 week, 6 days
|
[UdemyCourseDownloader] Malware Analysis Identifying and Defeating Code Obfuscation
10 months, 2 weeks
Files: 5 Total size: 272.7 MB Total requests: 44 Last access time: 6 days, 16 hours
|
Malware Analysis- Identifying and Defeating Code Obfuscation
10 months, 2 weeks
Files: 5 Total size: 357.7 MB Total requests: 357 Last access time: 3 days, 11 hours
|
Practical reverse engineering x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation (Bruce Dang, Alexandre Gazet, Elias Bachaalany etc.)
1 year, 6 months
Files: 2 Total size: 3.2 MB Total requests: 42 Last access time: 2 weeks, 6 days
|
The Short Film Obfuscation (HD).avi
1 year, 8 months
Files: 1 Total size: 141.0 MB Total requests: 147 Last access time: 5 days, 14 hours
|
Practical Reverse Engineering - x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation [EPUB]
1 year, 8 months
Files: 1 Total size: 3.2 MB Total requests: 111 Last access time: 5 days, 9 hours
|
Obfuscation- A User's Guide for Privacy and Protest [2015]
1 year, 9 months
Files: 3 Total size: 59.2 MB Total requests: 176 Last access time: 1 day, 12 hours
|