Channel Avatar

OALabs @UC--DwaiMV-jtO-6EvmKOnqg@youtube.com

0 subscribers - no pronouns :c

Malware analysis tools, techniques, and tutorials!


22:07
Zombieware
16:43
Introduction to YARA Part 4 - Efficient Rule Development
08:55
Introduction to YARA Part 3 - Rule Use Cases
04:46
Introduction to YARA Part 2 - Hunting on UnpacMe
09:50
Introduction to YARA Part 1 - What is a YARA Rule
47:41
OALABS Holiday Variety Show 2023
05:09
Tips For Analyzing Delphi Binaries in IDA (Danabot)
09:14
How To Recognize Macro Encrypted Strings in Malware
07:06
Direct vs. Indirect Syscalls What Is All The HYPE?! [OALABS Call-In Show]
10:35
Are Red Team Tools Helping or Hurting Our Industry? [OALABS Call-In Show]
21:03
Reverse Engineering With Unicorn Emulation
26:53
Emulation Fundamentals - Writing A Basic x86 Emulator
08:36
AV Emulation Detection Tricks Used by Malware
09:11
Tips to Learn Reverse Engineering: Avoid These Common Pitfalls!
01:53:17
N00bs Night Malware RE Workshop with @c3rb3ru5d3d53c
16:09
Understanding The PEB for Reverse Engineers
09:40
Well it finally happened... infected myself with Emotet lel
10:28
PE File Unmapping Explained aka Lazy Process Dumping
57:30
ESXiArgs Ransomware Analysis with @fwosar
12:11
What The Security Industry Should Know About Reverse Engineering [ Reverse Engineering AMA ]
06:21
Do Companies Actually Pay Ransomware [ Reverse Engineering AMA ]
06:40
What is The Future of Reverse Engineering [ Reverse Engineering AMA ]
10:52
One Trick To Level Up Your Reverse Engineering [ Reverse Engineering AMA ]
10:33
How To Identify Unknown Crypto Functions [ Reverse Engineering AMA ]
04:33
Tips For Writing a .NET Static Config Extractor for Malware [ Reverse Engineering AMA ]
12:53
What Is The Most Interesting Malware From 2022 [ Reverse Engineering AMA ]
08:02
Most Embarrassing Malware You Have Analyzed [ Reverse Engineering AMA ]
07:39
How to Switch Careers Into Reverse Engineering [ Reverse Engineering AMA ]
07:35
Tips for Analysis of Large Complex Binaries [ Reverse Engineering AMA ]
04:34
Does Big Cyber Pay Better Than Startups [ Reverse Engineering AMA ]
14:15
Do CTFs Help Build Malware Analysis Skills [ Reverse Engineering AMA ]
06:06
Advantages Of Intermediate Language (IL) Over Pseudo C Code [ Reverse Engineering AMA ]
27:05
How Accessible Is The Reverse Engineering Industry [ Reverse Engineering AMA ]
19:15
How To Get Started Reverse Engineering [ Reverse Engineering AMA ]
21:05
Hacking chatGPT with mrexodia [ Twitch Clip ]
12:04
Using CyberChef To Automatically Extract Shellcode from PowerShell Loader [Twitch Clip]
05:03
Retroactive Malware Hunting [ Twitch Clip ]
18:09
M1 Mac Malware Analysis VM Setup with Windows 11 (Free)
04:16
The Vitali Metric
14:23
Process Memory Basics for Reverse Engineers - Tracking Memory With A Debugger [ Patreon Unlocked ]
09:22
Your VPN Sucks for Malware Analysis [ Twitch Rant ]
14:20
Career / Interview Advice for Reverse Engineers [ Twitch Clip ]
18:00
Vulnerable Antivirus Driver Used by Ransomware - We Reverse Engineer How!!?
11:28
Understanding Pointers for Reverse Engineers - Pointer Basics in Assembly [ Patreon Unlocked ]
28:54
Malware Triage Tips: How To Stop Wasting Time in IDA On Packed Samples [ Twitch Clip ]
31:07
Emotet 64-bit Emulation and String Decryption with Dumpulator [Twitch Clip ]
02:42
x64dbg System Breakpoint Explained
04:44
How Does a Debugger Work - Debug Events Explained
04:07
The Thread Context - Debugging Explained
07:53
What is a Breakpoint - Debugging Explained
09:22
Control Flow Flattening Obfuscation Explained Practically [ Twitch Clip ]
21:37
Assembly Calling Conventions For Reverse Engineers [Patreon Unlocked]
04:42
Quick Tips For Learning Assembly and Reverse Engineering at The Same Time
19:48
How To Unpack VMProtect 3 (x64) Night Sky Ransomware With VMPDump [Patreon Unlocked]
12:50
Why Is The PE Entry Point Not The Same As Main SEH and The _security_init_cookie [Patreon Unlocked]
10:24
Bypassing BlackMatter Anti-Debug With x64dbg [Patreon Unlocked]
11:15
Debugging a DLL Export With x64dbg [Patreon Unlocked]
00:30
View Disassembly and Pseudocode Windows Synchronize Side-by-Side In IDA Pro [ Patreon Unlocked ]
02:17
Setup IDA Pro Type Libraries For Windows Malware Analysis [ Patreon Unlocked ]
03:05
How To Identify Dynamic Imports In Malware [ Patreon Unlocked ]