For Android application reverse engineering, I think JEB is a great tool. I used to use dex2jar and JD-GUI, but now I turn to JEB! But it is still in Java layer. Many application builder writting the business logic using C/C++, and we have to reverse the .so file
Hello Sir, Thanks for the understanding about the static analysis it really us AWESOME VIDEO but i have some question 1. If the malware code is in the docx, pdf, xlxs file how do we check those 2. Malware downloaded some files and even edited them as well, how do we find them in coding?
For Android application reverse engineering, I think JEB is a great tool. I used to use dex2jar and JD-GUI, but now I turn to JEB! But it is still in Java layer. Many application builder writting the business logic using C/C++, and we have to reverse the .so file
An Awesome collection of tools. Many which I use daily and can vouch for !
ua-cam.com/video/rb3t6hdIt-M/v-deo.html
Hello Sir,
Thanks for the understanding about the static analysis it really us AWESOME VIDEO but i have some question
1. If the malware code is in the docx, pdf, xlxs file how do we check those
2. Malware downloaded some files and even edited them as well, how do we find them in coding?
I found this videos are very helpful , and can you tell where can I collect malware samples ?
really thank you for this kind of training.
Can you please share the malware links?
6:14 Windows does have indexed search. Can you just research what you spew out?
thank you very much for clear and nice explanation
Damn this is gold. Thank you.
I found this very useful! I'm in high school and I'm planning to become a malware analyzer when I'm older.
extremely valuable shit. loved it!!
Emeğine eline sağlık abi
*Ha ha, let's do some bad things together* guldurdun kardesim 39:45
Thank you sir
You talk talk talk and explain nothing