Похожие видео
array(10) {
[0]=>
object(stdClass)#5851 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ZDXqrfG7hWc"
["related_video_title"]=>
string(85) "Analyzing the FBI's Qakbot Takedown Code (Malware Analysis & Reverse Engineering)"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(9) "Anuj Soni"
}
[1]=>
object(stdClass)#5824 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Tc8Wl37uwYc"
["related_video_title"]=>
string(51) "Decode Malware Strings with Conditional Breakpoints"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(9) "Anuj Soni"
}
[2]=>
object(stdClass)#5849 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "uU0n3U4dASc"
["related_video_title"]=>
string(25) "Malware Demo and Tutorial"
["posted_time"]=>
string(27) "8 месяцев назад"
["channelName"]=>
string(12) "David Bombal"
}
[3]=>
object(stdClass)#5856 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "WJ7g234Qnyg"
["related_video_title"]=>
string(60) "Binary Diffing with Ghidra's BSim Feature (Malware Analysis)"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(9) "Anuj Soni"
}
[4]=>
object(stdClass)#5835 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "73KJQRqz_Ec"
["related_video_title"]=>
string(28) "Protocol Reverse Engineering"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(7) "Prelude"
}
[5]=>
object(stdClass)#5853 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "kNP7EyS87G4"
["related_video_title"]=>
string(59) "The Static File Analysis Tools I Trust for Malware Analysis"
["posted_time"]=>
string(19) "4 дня назад"
["channelName"]=>
string(9) "Anuj Soni"
}
[6]=>
object(stdClass)#5848 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "i-FFVM4cIXQ"
["related_video_title"]=>
string(138) "База по Базам Данных - Storage (Индексы, Paging, LSM, B+-Tree, R-Tree) | Влад Тен Систем Дизайн"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
string(15) "Влад Тен"
}
[7]=>
object(stdClass)#5858 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "FKv7njCmJMU"
["related_video_title"]=>
string(67) "Malware Analysis with capa & Binary Ninja Plugins (API Hashing)"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
string(9) "Anuj Soni"
}
[8]=>
object(stdClass)#5834 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Sv8yu12y5zM"
["related_video_title"]=>
string(87) "Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
string(13) "stacksmashing"
}
[9]=>
object(stdClass)#5852 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7jnJbZIvQ5s"
["related_video_title"]=>
string(91) "Авторизация и аутентификация | Глубокая теория 2025"
["posted_time"]=>
string(19) "2 дня назад"
["channelName"]=>
string(8) "TeaCoder"
}
}
Analyzing the FBI's Qakbot Takedown Code (Malware Analysis & Reverse Engineering)
Decode Malware Strings with Conditional Breakpoints
Malware Demo and Tutorial
Binary Diffing with Ghidra's BSim Feature (Malware Analysis)
Protocol Reverse Engineering
The Static File Analysis Tools I Trust for Malware Analysis
База по Базам Данных - Storage (Индексы, Paging, LSM, B+-Tree, R-Tree) | Влад Тен Систем Дизайн
Malware Analysis with capa & Binary Ninja Plugins (API Hashing)
Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra
Авторизация и аутентификация | Глубокая теория 2025