Exetools  

Go Back   Exetools > General > General Discussion

Notices

Reply
 
Thread Tools Display Modes
  #976  
Old 11-06-2022, 01:38
Sky Sky is offline
Friend
 
Join Date: Aug 2004
Posts: 68
Rept. Given: 3
Rept. Rcvd 3 Times in 2 Posts
Thanks Given: 6
Thanks Rcvd at 15 Times in 11 Posts
Sky Reputation: 3
@user_hidden
All "Udemy Reverse Engineering*" links dead.
Can you reupload all of them?
At some places I saw 18 pf them. I suspect there're courses: Malware analysis, IDA & Ghidra for Beginners, Game ...

Last edited by Sky; 11-06-2022 at 01:48.
Reply With Quote
  #977  
Old 11-14-2022, 21:47
chicknsoup chicknsoup is offline
Friend
 
Join Date: Sep 2013
Posts: 39
Rept. Given: 2
Rept. Rcvd 8 Times in 2 Posts
Thanks Given: 7
Thanks Rcvd at 34 Times in 17 Posts
chicknsoup Reputation: 8
Quote:
Originally Posted by Sky View Post
@user_hidden
All "Udemy Reverse Engineering*" links dead.
Can you reupload all of them?
At some places I saw 18 pf them. I suspect there're courses: Malware analysis, IDA & Ghidra for Beginners, Game ...
You may try this site, for example:

_https://downloadly.ir/elearning/video-tutorials/reverse-engineering-debugging-and-malware-analysis/
Reply With Quote
The Following 2 Users Say Thank You to chicknsoup For This Useful Post:
niculaita (11-15-2022), traf0 (11-16-2022)
  #978  
Old 03-14-2023, 16:55
sobinary sobinary is offline
Friend
 
Join Date: Mar 2018
Posts: 14
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 6
Thanks Rcvd at 8 Times in 2 Posts
sobinary Reputation: 0
Machine Learning under Malware Attack

Machine learning has become key in supporting decision-making processes across a wide array of applications, ranging from autonomous vehicles to malware detection. However, while highly accurate, these algorithms have been shown to exhibit vulnerabilities, in which they could be deceived to return preferred predictions. Therefore, carefully crafted adversarial objects may impact the trust of machine learning systems compromising the reliability of their predictions, irrespective of the field in which they are deployed. The goal of this book is to improve the understanding of adversarial attacks, particularly in the malware context, and leverage the knowledge to explore defenses against adaptive adversaries. Furthermore, to study systemic weaknesses that can improve the resilience of machine learning models.

Code:
https://www.mediafire.com/file/09bzj8bo6lg1l3w/MLuMA.7z/file
password:exetools
Reply With Quote
  #979  
Old 05-23-2023, 06:13
moro3391 moro3391 is offline
Friend
 
Join Date: Jan 2013
Posts: 67
Rept. Given: 2
Rept. Rcvd 18 Times in 11 Posts
Thanks Given: 1
Thanks Rcvd at 43 Times in 22 Posts
moro3391 Reputation: 18
The IDA Pro Book 2nd Edition

The Unofficial Guide to the World's Most Popular Disassemble, 2nd Edition.you will learn:
–Navigate, comment, and modify disassembly
–Identify known library routines, so you can focus your analysis on other areas of the code
–Use code graphing to quickly make sense of cross references and function calls
–Extend IDA to support new processors and filetypes using the SDK
–Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more.

PHP Code:
https://mega.nz/file/ZHECjRzR#JxJm7OhJqzL38Jo-o7KEykZ2yjaDH_yP74iAVcr0nVc 
Reply With Quote
The Following User Says Thank You to moro3391 For This Useful Post:
traf0 (05-24-2023)
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
ebooks conan981 General Discussion 0 07-07-2006 22:36
some ebooks fulone General Discussion 1 05-20-2004 21:22


All times are GMT +8. The time now is 14:33.


Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX, chessgod101
( 1998 - 2023 )