22:07
Zombieware
2.4K views • 1 month ago
16:43
Introduction to YARA Part 4 - Efficient Rule Development
2.2K views • 4 months ago
8:55
Introduction to YARA Part 3 - Rule Use Cases
1.2K views • 4 months ago
4:46
Introduction to YARA Part 2 - Hunting on UnpacMe
1.4K views • 4 months ago
9:50
Introduction to YARA Part 1 - What is a YARA Rule
4.7K views • 4 months ago
47:41
OALABS Holiday Variety Show 2023
1.4K views • 5 months ago
5:09
Tips For Analyzing Delphi Binaries in IDA (Danabot)
3K views • 5 months ago
9:14
How To Recognize Macro Encrypted Strings in Malware
3.6K views • 6 months ago
7:06
Direct vs. Indirect Syscalls What Is All The HYPE?! [OALABS Call-In Show]
3K views • 7 months ago
10:35
Are Red Team Tools Helping or Hurting Our Industry? [OALABS Call-In Show]
1.8K views • 7 months ago
21:03
Reverse Engineering With Unicorn Emulation
9K views • 8 months ago
26:53
Emulation Fundamentals - Writing A Basic x86 Emulator
12K views • 9 months ago
8:36
AV Emulation Detection Tricks Used by Malware
5.5K views • 10 months ago
9:11
Tips to Learn Reverse Engineering: Avoid These Common Pitfalls!
11K views • 11 months ago
1:53:17
N00bs Night Malware RE Workshop with @c3rb3ru5d3d53c
7.3K views • 11 months ago
16:09
Understanding The PEB for Reverse Engineers
8.7K views • 1 year ago
9:40
Well it finally happened... infected myself with Emotet lel
7.3K views • 1 year ago
10:28
PE File Unmapping Explained aka Lazy Process Dumping
8.6K views • 1 year ago
57:30
ESXiArgs Ransomware Analysis with @fwosar
5.1K views • 1 year ago
12:11
What The Security Industry Should Know About Reverse Engineering [ Reverse Engineering AMA ]
2.6K views • 1 year ago
6:21
Do Companies Actually Pay Ransomware [ Reverse Engineering AMA ]
1.5K views • 1 year ago
6:40
What is The Future of Reverse Engineering [ Reverse Engineering AMA ]
2.3K views • 1 year ago
10:52
One Trick To Level Up Your Reverse Engineering [ Reverse Engineering AMA ]
3.7K views • 1 year ago
10:33
How To Identify Unknown Crypto Functions [ Reverse Engineering AMA ]
1.7K views • 1 year ago
4:33
Tips For Writing a .NET Static Config Extractor for Malware [ Reverse Engineering AMA ]
753 views • 1 year ago
12:53
What Is The Most Interesting Malware From 2022 [ Reverse Engineering AMA ]
2.4K views • 1 year ago
8:02
Most Embarrassing Malware You Have Analyzed [ Reverse Engineering AMA ]
1.6K views • 1 year ago
7:39
How to Switch Careers Into Reverse Engineering [ Reverse Engineering AMA ]
2.1K views • 1 year ago
7:35
Tips for Analysis of Large Complex Binaries [ Reverse Engineering AMA ]
1.5K views • 1 year ago
4:34
Does Big Cyber Pay Better Than Startups [ Reverse Engineering AMA ]
1.4K views • 1 year ago
Load More