Jump to content

WarLord

Active Members
  • Posts

    644
  • Joined

  • Last visited

  • Days Won

    25

Everything posted by WarLord

  1. Cel mai bun sfat!!! Invatatul continua si dupa scoala si dupa serviciu!
  2. Incident Response and Handling. Super fain. Nu numai ca trebuie sa intelegi tehnici offensive dar si defensive, apoi cautat in loguri pe Windows si Linux.
  3. Haha, toata lumea pe offensive, dar stim sa facem defensive? Tot info sec-ul e un IT bine facut si industria are nevoie de IT-isti buni carora sa le pese de sisteme, apoi avem nevoie de 'boots on the ground' pe partea de defensive, implementari sisteme, cloud implementari si cloud securitate, etc. Nu visati la bani buni daca nu aveti partea IT-ului bine cunoscuta cu vreo 10 ani de experienta minim, adica sa incepi de la helpdesk si sa urci pana la securitate dupa vreo 10 ani, nu amagiti oamenii ca fac burnout. Pentru developeri e lucru mult si f bine platit pe partea de cloud: Google si AWS. Am vorbit cu un head hunter - $150k cu vreo 3 ani de experienta pe cloud si proiecte f faine, mai faine decat in offensive. Te mananca viermii pana stai o saptamana pe un pentest report.
  4. Nytro, super fain. E CTF-ul asa in stil OffSec cu raport scris la sfarsit, sau cu flaguri? Merge orice, chiar si vms de la firme serioase ca OffSec? :D
  5. I am pretty chill bro. Nu lua totul ca atac personal, ca n-am nimic de impartit cu tine. Si da, am inteles la ce te refereai, dar totusi, cu asa cereri unul interesat crede ca esti mofturos, si nici nu se chinuie sa aplice. Daca esti dezamagit cu o firma, mergi la alta, ca doar ii ca la piata, nu?!
  6. Si tu cauti unicorni mah? Sunt multi angajatori ca si tine si nu va dati seama cat de rau stricati industria IT cu asteptari din astea.
  7. "Nu cititi curs, invatati scenarii. Nu invatati comenzi ci luati un scenariu si rezolvati-l de la cap la coada. Nu va axati pe cursuri/certificari care sunt vendor propietary, cum este Cisco. ...Invatati cum functioneaza lucrurile si mai ales de ce." CORECT! Invatati scenarii. 100-1000 de acord cu asta. Practica si iar practica gandita. Asa ca si militarii. Aia nu invata din carte teoretic cum sa traga cu arma, sau teoretic cum se infiltreaza/ataca o tara, ci practic, pe campul de lupta si prin exercitii!
  8. Merita de inceput ca sa-ti dezvolti un vocabular sa poti prezenta o idee un manager sau coleg din domeniu, etc. Dar cu certificatele de inceput nu faci prea multa treaba. Daca gasesti un Security+ care sa te invete practic ce inseamna fiecare lucru/idee/notiune atunci DA, pentru ca in momentul ala inveti practic cum si ce. Poti sa faci tu research-ul tau, acasa cu VMware workstation si masini virtuale, pe care oricum ca ITist trebuie sa il ai, dar dureaza luni de zile pana aflii raspunsurile la intrebarile tale critice si practice. Eventual daca prezinti bine situatia la un interviu, poti sa spui ca ai facut tu research-ul acasa in laborator, in reteaua ta de acasa, explici, comentezi, aduci contra argumente la inverviu sa arati ca stii ce pula ta vorbesti, si daca gasesti un manager din ala care sa aprecieze setea ta pentru cunostinte ai spart gheata si iei un job. Nu stiu cum is managerii romani, dar cum observa multi, managerii romani is destul de distrusi si pretentiosi. Din carti inveti multa teorie, si putina practica, de aia se pune accentul pe 'experienta' lui peste. Apoi nu uita ca Security+ expira in 3 ani. Eu am deja Security+ (2017), si invat acuma pentru CySA+, beta examen pe care il am pe data de Decembrie 20. Daca il iau imi reinnoiesc Network+, Security+ si am si CySA+. Ureaza-mi bafta Nimeni nu-ti poate lua cunostinta pe care o ai, dar daca nu o pui in practica in cateva luni de zile, incepi sa scartaii. Faptul ca ai facut niste certificate trebuie sa arate ca ai macar sete de cunostinta de felul ala, ca ti-ar placea sa faci asa ceva, ca ai ceva idei. Cunostintele de baza ar trebui sa arate un manager ca vi cu ceva cunostinte la bord, si ca acuma el ca lider/sef/manager poate sa te cladeasca. Dar multi cretini din industria de security nu le trebuie numai unicorni si cai verzi pe pereti. E jale in industria de security, cu 2 milioane de locuri de munca vacante, si managerii de cacat se plang ca nu gasesc oameni. Se afla oameni, dar nu unicorni din aia care vor ei. Lucrurile se vor schimba in 2020 pentru ca se va incepe la un nou trend in care managerii, din cauza industriei, vor fi nevoiti sa angajeze entry-level si sa ii cladeasca, sau vor trebuie sa plateasca salarii exagerate celor care sunt deja cu experienta dar fac mofturi la salarii. Asa ca pune mana si invata ca iti va prinde bine, ori in tara ori inafara tarii. Iti doresc succes si revino cu denumeriri si probleme pe care le intalnesti in timpul studiilor. Sper ca gasesc oameni de treaba, care sa te ajute sa inveti, si sa nu ai de-a face cu aroganta unora care o ajuns mare haxori si o uitat de unde o inceput care iti arunca vorbele de parca vorbesc cu un caine. Numai bine.
  9. Hai mah nu te ambala in halul ala ca noi doi nu avem nimic unul cu celalalt. Treaba lui ala ce vrea sa faca, dar mai intelept ar fi sa nu inceapa la drum pana nu isi face experienta in IT de cativa ani buni.
  10. @vatman32 - tu crezi ca toti analistii dezvolta 0 days? Si numai daca poti sa dezvolati un 0 day esti haxor? exagerezi putin Dar un cybersec analist trebuie sa inteleaga mentalitatea de haxor oricum, la fel si un sys admin/engineer. Nu e nevoie sa dam exemple de unicorni din aia care la 50 de ani si-o schimbat cariera din lopatar in web developer
  11. Chiar sunt curios cum merg lucrurile in Romania pe domeniul Info Sec. Adica IT-ul aud ca o duce destul de bine, incepand cu salarii de vreo 500 de euro la novice, dar astia care fac upgrade-ul din sysadmin/helpdesk/etc in InfoSec, cum sunt salariile? Se moare fara diploma de facultate? Ii impresioneaza certificatele pe angajatori? Ce se cere mai mult: blue teamers, red teamers, o amestecata din aia de purple teamers?
  12. Ce-o vrut sa zica ii ca daca vrea sa ii impresioneze pe aia de la angajari, sa duca ceva de-acasa, ceva proiect la ce-o lucrat, ceva practic, decat niste hartii si teorie din certificate.
  13. Exact parerea mea gigiRoman. Omul de-abia si-a terminat CCNA-ul si vrea sa sa se faca cybersec analist, si @vatman il ia cu chestii de development: panel web, stocare in baze de date, APIs, sisteme cache, uz abuziv de procesoare in development, cunostinte de baze de stocare de date. Eu zic omului sa se faca sys admin/inginer daca ii place IT-ul si sa lase labareala din Info Sec. Si mai ales, sa invate 1-2 domenii la care ii bun ca de ex retele si inca ceva si apoi sa treaca in Info Sec daca ii place inca labareala. Sa lase visele alea de mare haxor ca se pierde pe drum si o da in disperare si nebunie ca multi din Info Sec care is cu nervii la pamant. Sunt destule joburi in IT si dupa 8-10 ore mergi acasa si ai viata de familie si prieteni. Nu-ii trebuie adictie la calculatoare.
  14. CBT-Getting-Started-with-Palo-Alto-Firewalls-v8.x https://mega.nz/#F!M2ARlKbT!P5-pS0E-QZroCEe4kz1Wqw!wzYFnSIA
  15. https://www.jollyfrogs.com/osee-awestralia-2018-preparations/ OSEE - AWEstralia 2018 preparations Living in Australia, the total cost of attending the AWE training in Vegas, including flights and hotel would exceed AUD 10,000$. So instead I decided to ask the Offensive Security trainers if they wanted to come and deliver the AWE training in my home town of Brisbane, Australia. I was able to rally together a few large companies interested in participating in the training. We now have over 25 interested people - enough for Offensive Security to come to Brisbane and host the training right here in Australia! Since the training is called Advanced Windows Exploitation (AWE), we call the training AWEstralia 2018 - it will be a lot of fun! This post is to help myself and other participants prepare for the AWE exam. Many thanks to Alpine for helping put together this guide. This guide was written based on existing AWE (OSEE) reviews and the official AWE syllabus topics. We're in the preparation stages now - lots of learning and finding good resources to prepare for the onslaught of AWE. Offensive Security has not yet confirmed a date for 2018 but we expect them to confirm very soon. The date will be around May 2018 and the course will be held in Brisbane Australia. If you'd like to join us, please contact me on TheFrog at jollyfrogs -dot -com. WinDBG usage AWE students are expected to know how to use the WinDBG debugger WinDBG general information: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/ WinDBG configuration: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/getting-started-with-windows-debugging WinDBG configuration in VMWare: http://silverstr.ufies.org/lotr0/windbg-vmware.html WinDBG configuration in VirtualBox: https://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/ WinDBG Lab: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debug-universal-drivers---step-by-step-lab--echo-kernel-mode- WinDBG Useful commands reference: https://briolidz.wordpress.com/2013/11/17/windbg-some-debugging-commands/ Module 0x01 Custom Shellcode Creation http://www.securitytube-training.com/online-courses/securitytube-linux-assembly-expert/index.html http://www.securitytube-training.com/online-courses/x8664-assembly-and-shellcoding-on-linux/index.html SLAE32 and SLAE64 discount code https://www.fuzzysecurity.com/tutorials/expDev/6.html https://blahcat.github.io/2017/08/14/a-primer-to-windows-x64-shellcoding/ The Shellcoder's Handbook http://sh3llc0d3r.com/windows-reverse-shell-shellcode-ii/ http://blog.harmonysecurity.com/2009/06/retrieving-kernel32s-base-address.html http://nagareshwar.securityxploded.com/2013/09/21/using-peb-to-get-base-address-of-kernelbase-dll/ http://www.rohitab.com/discuss/topic/38717-quick-tutorial-finding-kernel32-base-and-walking-its-export-table/ http://www.hick.org/code/skape/papers/win32-shellcode.pdf http://expdev-kiuhnm.rhcloud.com/2015/05/22/shellcode/ https://www.offensive-security.com/vulndev/fldbg-a-pykd-script-to-debug-flashplayer/ https://exploit.courses/files/bfh2017/day6/0x60_WindowsExploiting.pdf https://secure2.sophos.com/de-de/medialibrary/PDFs/other/Comprehensive-Exploit-Prevention.ashx Module 0x02 DEP/ASLR/EMET Bypass and Sandbox Escape via Flash HeapSpray https://www.offensive-security.com/vulndev/disarming-and-bypassing-emet-5-1/ https://www.offensive-security.com/vulndev/disarming-emet-v5-0/ https://www.offensive-security.com/vulndev/disarming-enhanced-mitigation-experience-toolkit-emet/ https://www.blackhat.com/presentations/bh-europe-07/Sotirov/Whitepaper/bh-eu-07-sotirov-WP.pdf https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/ https://www.fuzzysecurity.com/tutorials/expDev/8.html https://www.fuzzysecurity.com/tutorials/expDev/11.html https://www.corelan.be/index.php/2016/07/05/windows-10-x86wow64-userland-heap/ https://www.corelan.be/index.php/2013/01/18/heap-layout-visualization-with-mona-py-and-windbg/ https://www.corelan.be/index.php/2013/02/19/deps-precise-heap-spray-on-firefox-and-ie10/ http://gsec.hitb.org/sg2016/sessions/look-mom-i-dont-use-shellcode-a-browser-exploitation-case-study-for-internet-explorer-11/ https://github.com/shellphish/how2heap https://0x00sec.org/t/heap-exploitation-abusing-use-after-free/3580 http://expdev-kiuhnm.rhcloud.com/2015/06/02/ie11-part-1/ http://expdev-kiuhnm.rhcloud.com/2015/06/02/ie11-part-2/ http://expdev-kiuhnm.rhcloud.com/2015/06/01/ie10-use-free-bug/ https://sites.google.com/site/zerodayresearch/smashing_the_heap_with_vector_Li.pdf http://blog.morphisec.com/exploit-bypass-emet-cve-2015-2545 http://casual-scrutiny.blogspot.sg/2015/01/simple-emet-eaf-bypass.html Module 0x03 32-bit Kernel Driver Exploitation https://www.offensive-security.com/vulndev/ms11-080-voyage-into-ring-zero/ https://github.com/hacksysteam/HackSysExtremeVulnerableDriver https://theevilbit.blogspot.sg/2017/09/pool-spraying-fun-part-1.html https://theevilbit.blogspot.in/2017/09/windows-kernel-pool-spraying-fun-part-2.html https://theevilbit.blogspot.in/2017/09/windows-kernel-pool-spraying-fun-part-3.html https://www.fuzzysecurity.com/tutorials/expDev/14.html https://www.fuzzysecurity.com/tutorials/expDev/15.html https://www.fuzzysecurity.com/tutorials/expDev/19.html https://www.whitehatters.academy/intro-to-windows-kernel-exploitation-2-windows-drivers/ https://foxglovesecurity.com/2017/08/25/abusing-token-privileges-for-windows-local-privilege-escalation/ https://glennmcgui.re/introduction-to-windows-kernel-exploitation-pt-1/ https://glennmcgui.re/introduction-to-windows-kernel-driver-exploitation-pt-2/ http://srcincite.io/blog/2017/09/06/sharks-in-the-pool-mixed-object-exploitation-in-the-windows-kernel-pool.html https://github.com/hatRiot/token-priv https://rootkits.xyz/blog/2017/06/kernel-setting-up/ https://rootkits.xyz/blog/2017/08/kernel-stack-overflow/ https://rootkits.xyz/blog/2017/09/kernel-write-what-where/ Module 0x04 64-bit Kernel Driver Exploitation http://trackwatch.com/windows-kernel-pool-spraying/ https://blahcat.github.io/2017/08/31/arbitrary-write-primitive-in-windows-kernel-hevd/
  16. Se pare ca vin strainii pe site Azi maine vorbim cu totii engleza pe aici.
  17. @SilenTx0 - nu ai cumva si cursul PTX de la eLearnSec?
  18. Merge daca o tastez, dar nu merge daca ii dau cu grija copy&paste. Nu are spatiu. Merci
  19. Si ce cursuri erau? Am zis sa le luati cat is calde
  20. Am o gramada de cursuri, dar imi trebe si spatiu unde sa le uploadez.
  21. Snort IDS IPS Rule Writing Course https://mega.nz/#!69U1kSZK!K2tv9BdikXunJLu1_etQdUTmeSs0HHzACfQn2bnzJjc
  22. https://mega.nz/#!hn5xxSjD!BVBsHKorhpwqbjuR5872s_jjB7dYyP4bIYTpzCpJfdg The Hacker Playbook 3 Practical Guide to Penetration Testing.
  23. AORE unpacking_12311134.rar unpacking_ahpack_v0.1.rar unpacking_antidote_v1.4.rar unpacking_arm_protector_v0.3.rar unpacking_ascrypt_v0.1.rar unpacking_avercryptor_v1.0.rar unpacking_bastards_tools_v1.1.rar unpacking_cds_ss_v1.0_beta1.rar unpacking_celsius_crypt_v2.1.rar unpacking_c.i._crypt_v0.2.rar unpacking_cryptocrackpeprotector_v0.9.3.rar unpacking_cryptocrc_pe_protector_v0.9.3.rar unpacking_dalkrypt_v1.0.rar unpacking_dotfix_niceprotect_v2.2.rar unpacking_drony_protect_v3.0_and_luck007_v2.7.rar unpacking_epexe_pack_v1.2.rar unpacking_exeevil_v1.0.rar unpacking_fearz_crypter_v1.0.rar unpacking_ghf_protector.rar unpacking_gie_protector_v0.2.rar unpacking_gx_protector_v1.2.rar unpacking_jdpack_v1.01.rar unpacking_mfkpack.rar unpacking_minke_v1.01.rar unpacking_molebox_pro_2.6.0.2375.rar unpacking_molebox_v2.6_extracting_embedded_files.rar unpacking_mr_undectetable_v1.0.rar unpacking_nomer1.rar unpacking_npack_v1.1.300.rar unpacking_open_source_code_crypter_v1.0.rar unpacking_pack_v4.0.rar unpacking_pc_shrinker_v0.71.rar unpacking_pediminisher_v0.1.rar unpacking_pestil_v1.0_1.rar unpacking_pestil_v1.0_2.rar unpacking_petite_v2.3.rar unpacking_pohernah_v1.0.rar unpacking_polyene_v0.01.rar unpacking_qrypt0r.rar unpacking_rcryptor_v2.0.rar unpacking_recrypt_v0.80.rar unpacking_rpolycrypt_v1.4.rar unpacking_russian_cryptor_v1.0.rar unpacking_sexe_crypter_v1.1.rar unpacking_shrinkwrap_v1.4.rar unpacking_sopelka_v1.5.rar unpacking_splayer_v0.08.rar unpacking_stelth_pe_v1.01.rar unpacking_the_best_cryptor.rar unpacking_tubby_crypt_v1.1.0.rar unpacking_underground_crypter_v1.0.rar unpacking_unkown_crypter_v1.0.rar unpacking_upolyx_v0.04.rar unpacking_upxhit_v0.0.1.rar unpacking_vcrpyt_0.9b.rar unpacking_windofcrypt_v1.0.rar unpacking_winkrypt_v1.0.rar unpacking_xcr_v0.13.rar unpacking_yzpack_1.1__2.0.rar unpacking_yzpack_v1.1.rar JOKER ITALY asprotect_ske_2.3__unpacking_dll_.zip dumped_asprotect_aspack_joker_italy.rar KDT.rar pirate_zylom_joker_italy.rar themida_unleashed.rar unpack_ar_crypt_private_by_joker_italy.rar unpack_at4re_asm_protector.rar unpack_at4re_protector_1_by_joker_italy.rar unpack_berio_1.02.rar unpack_beroexepacker_1.0(1).rar unpack_beroexepacker_1.0.rar unpack_criptx_mew11.rar unpack_dcrypt_private_0.9b_by_joker_italy.rar unpack_dragonarmour.rar unpack_eleckey_2.0_by_joker_italy.rar unpack_exesmasher_1.0.rar unpack_exestealth3.16_by_joker_italy.rar unpack_fearz_packer_0.3.rar unpack_free_joiner_small_0.15.rar unpack_gie_protector0.2.rar unpack_h4ck_y0u.org_crypter.rar unpack_hac_crew_crypter.rar unpack_halv_crypter_by_joker_italy.rar unpack_hideprotect.rar unpack_hmimys_packer_1.3.rar unpacking_zylom_wrapper.rar unpack_joker_protector_1.0.8_by_joker_italy.rar unpack_joker_protector_1.1.3_by_joker_italy.rar unpack_kiams_cryptor_1.4_by_joker_italy.rar unpack_kkrunchy023_by_joker_italy.rar unpack_larp_lite_edition_2.0_by_joker_italy.rar unpack_mal_packer_1.2_by_joker_italy.rar unpack_moddedfogv1.1_by_joker_italy.rar unpack_morphnah.rar unpack_mpack_0.0.3.rar unpack_nova_cipher_1.0.rar unpack_nox_crypt_1.1_by_joker_italy.rar unpack_npack_1.1.800.2008.rar Unpack_NtKrnlpacker_Secure_Suite_By_Joker_Italy_Script.rar unpack_osc_crypter.rar unpack_pain_crew_protector_1.1_by_joker_italy.rar unpack_pepsi2.rar unpack_poke_crypter.rar unpack_polybox_1.0.rar unpack_polymorphic_crypter_0.1.rar unpack_pub_crypter_by_joker_italy.rar unpack_russian_cryptor.rar unpack_secure_shade_1.5_by_joker_italy.rar unpack_sexe_crypter_1.1.rar unpack_softsentry_3.00.rar unpack_software_compress_.4_by_joker_italy.rar unpack_stealth_pe_2.2_by_joker_italy.rar unpack_the_best_cryptor.rar unpack_the_zone_crypter.rar unpack_unamed_scrambler_2.5.2.rar unpack_undetector_1.2.rar unpack_upxunopix_scrambler_1.10.rar unpack_ussr_0.31.rar unpack_vb_powerwrap.rar unpack_vcrypt0.9b.rar unpack_wingscrypt_1.0_by_joker_italy.rar Unpack_WinUpack_0.399.rar unpack_wl_crypt_1.0_by_joker_italy.rar LENA151 snd-reversingwithlena-tutorial01.tutorial snd-reversingwithlena-tutorial02.tutorial snd-reversingwithlena-tutorial03.tutorial snd-reversingwithlena-tutorial04.tutorial snd-reversingwithlena-tutorial05.tutorial snd-reversingwithlena-tutorial06.tutorial snd-reversingwithlena-tutorial07.tutorial snd-reversingwithlena-tutorial08.tutorial snd-reversingwithlena-tutorial09.tutorial snd-reversingwithlena-tutorial10.tutorial snd-reversingwithlena-tutorial11.tutorial snd-reversingwithlena-tutorial12.tutorial snd-reversingwithlena-tutorial13.tutorial snd-reversingwithlena-tutorial14.tutorial snd-reversingwithlena-tutorial15.tutorial snd-reversingwithlena-tutorial16.tutorial snd-reversingwithlena-tutorial17.tutorial snd-reversingwithlena-tutorial18.tutorial snd-reversingwithlena-tutorial19.tutorial snd-reversingwithlena-tutorial20.tutorial snd-reversingwithlena-tutorial21.tutorial snd-reversingwithlena-tutorial22.tutorial snd-reversingwithlena-tutorial23.tutorial snd-reversingwithlena-tutorial24.tutorial snd-reversingwithlena-tutorial25.tutorial snd-reversingwithlena-tutorial26.tutorial snd-reversingwithlena-tutorial27.tutorial snd-reversingwithlena-tutorial28.tutorial snd-reversingwithlena-tutorial29.tutorial snd-reversingwithlena-tutorial30.tutorial snd-reversingwithlena-tutorial31.tutorial snd-reversingwithlena-tutorial32.tutorial snd-reversingwithlena-tutorial33.tutorial snd-reversingwithlena-tutorial34.tutorial snd-reversingwithlena-tutorial35.tutorial snd-reversingwithlena-tutorial36.tutorial snd-reversingwithlena-tutorial37.tutorial snd-reversingwithlena-tutorial38.tutorial snd-reversingwithlena-tutorial39.tutorial snd-reversingwithlena-tutorial40.tutorial Tutorials Index.txt REVERSE ENGINEERING FOR BEGINNERS Reverse_Engineering_for_Beginners-en-A5-lite.pdf Reverse_Engineering_for_Beginners-en-A5.pdf Reverse_Engineering_for_Beginners-en-lite.pdf Reverse_Engineering_for_Beginners-en.pdf THE LEGEND OF RANDOM Miscellaneous Modifying Binaries For Fun And Profit Other Tutorials R4ndom’s Beginning Reverse Engineering Tutorials R4ndom’s Guide to RadASM readme.txt VARIOUS Advaned Decoding.rar ahmad_1.rar armadillo_copymem-II_debug_blocker_unpacking_tutorial.rar armadillo_debug_blocker_unpacking_tutorial.rar ArmadilloFVR.rar Byte.rar CliSecure.rar CodeVeil13.rar cs_programming.shtml.rar CV_rongchaua.rar DotFix NiceProtect 3.4.rar enigma_unpack_tut.rar execryptor_1.5.3.0_unpacking.rar ExeCryptor_HWID_Patching.rar EXECryptor_tutorial_2.rar EXECryptor.v2.2.6 .All.Protection.rar expressor_pro_1.7.0.1.ahmadmansoor.rar HASPSRM_V1.rar Intelliprotector.rar manually.unpacking..cracking.nsasoft.product.key.explorer.v2.4.5.with.masteruploader.rar mol.rar pespin_1_32_all_protection_options.rar telock_1.0_all_protection_options.rar themida_2.x.x_code_encrypt.rar thinstall_extract_dependencies.rar ua5xxdbo.rar universalexplorer5_tut.rar Unpack_Expressor_Apakekdah.rar Unpacking CodeVeil 1.xx.rar unpacking_CrypToCrackPeProtector.rar unpacking_DragonArmour.rar Unpacking_.NET_Reactor_3.5.rar Unpacking_NETZ_Packer.rar Unpacking_PELock.rar unpacking_spalsher_1_0_3_0_scorm.rar unpacking_tutor_3.6.rar Unpacking_Yoda.rar Video_tut_bypass_and_unpacking_PwdProtect_by_skypeaful.rar [Video_Tut]CodeVisionAVR V2.04.4_PerTican_Cin1Team.rar Xenocode_unpacking.rar https://mega.nz/#!K2hwlCoS!Luluk4RSrmtizNW381mxrO3fJJOn3aBZYeZ3F7BNDds
  24. Surviving Digital Forensics - Link Files Surviving Digital Forensics - Memory Analysis 1 Surviving Digital Forensics - Memory Analysis 2 Surviving Digital Forensics - Memory Analysis 3 Surviving Digital Forensics - RAM Extraction Fundamentals Surviving Digital Forensics - Resolving Attached USBs Surviving Digital Forensics - Windows Explorer Surviving Digital Forensics - Windows Prefetch Surviving Digital Forensics - Windows Shellbags Surviving Digital Forensics Volume Shadow Copy (1 Video Only) https://mega.nz/#F!Sr5FDDJJ!bif_tefFmiQtkYUiGaMQIA
×
×
  • Create New...