09-03-2019, 01:06 PM
Immunity Debugger for Exploit Devs - YCSC Lab Essentials
.MP4 | Video: 1280x720, 30 fps® | Audio: AAC, 44100 Hz, 2ch | 2.6 GB
Duration: 3 hours | Genre: eLearning | Language: English
Learn Immunity Debugger in and out
Learn Immunity Debugger in and out
What you'll learn
Basics of Immunity Debugger
Get familiar with various Views / Windows
Stack operations available in Immunity Debugger
Disassembler operations available in Immunity Debugger
Get started with PyCommands & Mona Library
Just-in-time debugging with Immunity Debugger
How to set breakpoints, step through and trace
Immunity Debugger command line
Requirements
Familiarity with Assembly Language (good to have)
Understanding of x86 CPU architecture (registers, flags, stack etc.)
Description
Immunity Debugger is the go to debugger for most security professionals. Immunity Inc describes it as a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry's first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility.
Note: To know about offers on this course, check out our website yaksas-dot-io
This course covers both, well-known and lesser-known, features of Immunity Debugger. Few of the key topics discussed in this course are as follows:
Download and Installation
Views
Stack Operations
Disassembler Operations
Breakpoints, stepping through, tracing etc.
PyCommands and Mona Library
Just-in-time debugging
... and a lot more
A good understanding of Immunity Debugger comes in handy while exploit development, backdooring PE files, encoding files for anti-virus evasion. Once you have completed this course, you will be a lot more comfortable with Immunity Debugger and you'll know which features to use to perform each of the previously mentioned activities.
Since other debuggers like Ollydbg (Olly debug), evans debug etc. have a similar interface, through this course you can learn how to use them as well. I have created this course with the vision that it becomes your go to reference guide for Immunity Debugger and other similar debuggers.
To know about offers on this course, check out our website yaksas-dot-io
Who this course is for:
Cyber security professionals
Reverse Engineers
Beginners in Exploit Development
Security Researchers / Engineers/ Analysts
DOWNLOAD
Code:
http://nitroflare.com/view/E846C073C774A5A/sts1p.Immunity.Debugger.for.Exploit.Devs..YCSC.Lab.Essentials.part1.rar
http://nitroflare.com/view/8E3691002FA6D45/sts1p.Immunity.Debugger.for.Exploit.Devs..YCSC.Lab.Essentials.part2.rar
http://nitroflare.com/view/5201BF3D46E0CD9/sts1p.Immunity.Debugger.for.Exploit.Devs..YCSC.Lab.Essentials.part3.rar
Code:
https://rapidgator.net/file/258a859e26bc0cacdb351ce4ac368630/sts1p.Immunity.Debugger.for.Exploit.Devs..YCSC.Lab.Essentials.part1.rar
https://rapidgator.net/file/30df7440d4afbb3a797de91b47001c67/sts1p.Immunity.Debugger.for.Exploit.Devs..YCSC.Lab.Essentials.part2.rar
https://rapidgator.net/file/baa2fc3c2326e6bfd5e7941767705c32/sts1p.Immunity.Debugger.for.Exploit.Devs..YCSC.Lab.Essentials.part3.rar