1:02:14 Agentic Reverse Engineering: How AI Agents Are Changing Binary Analysis Tim Blazytko 5.9K views - 3 weeks ago
53:05 Recon 2022 - The Next Generation of Virtualization based Obfuscators Recon Conference 1.6K views - 3 years ago
56:28 Webinar: Reverse Engineering – How Attackers Uncover Secrets in Binaries emproof 1K views - 1 year ago
55:39 Webinar: Secrets Unveiled -- What Attackers Find in Embedded Systems emproof 231 views - 1 year ago
0:40 [Quick RE Flow] Let's Learn Dridex Banker: Dump ldr - VirtualProtect RWX Vitali 474 views - 6 years ago
2:29:13 Hacking Livestream #82: Reverse engineering a VM-based protection (part 2) GynvaelEN 5.7K views - 6 years ago
1:22 C++ : What is the point of VirtualProtect when any process, including malware, can use it? Hey Delphi 145 views - 3 years ago
1:28:08 Introduction to Data-Flow and Control-Flow Analyses NPTEL - Special Lecture Series 118 views - 2 years ago
1:14 C++ : VirtualProtect and kernel32.dll - attempt to access invalid address Hey Delphi 55 views - 2 years ago