Media Summary: Build real confidence analyzing malware. Join the waitlist. Get my This course preview provides an overview of analyzing information collection functionality in an Server Message Block (SMB) ... In this stream Xusheng Li from Vector35 walks us through Time Travel Debugging in

Malware Analysis With Binary Ninja Plugins Api Hashing - Detailed Analysis & Overview

Build real confidence analyzing malware. Join the waitlist. Get my This course preview provides an overview of analyzing information collection functionality in an Server Message Block (SMB) ... In this stream Xusheng Li from Vector35 walks us through Time Travel Debugging in Join the waitlist for my Reverse Engineering Throughout this stream we look at reverse engineering As threats have increased in prevalence and sophistication over the years, analysts simply need more time and resources to ...

This video has a newer, updated version here: I tried three free disassemblers and decompilers and ... Throughout this video we look at the 2.0 features of the Anuj's Channel: Free Cybersecurity Education and Ethical Hacking with John Hammond ... In this stream we started the development of a general code emulation Types are very important when reverse engineering Tim Blazytko joins us to compare various MCP, CLI, agentic, and other LLM options for both assisted and fully-automatic reverse ...

Photo Gallery

Malware Analysis with Binary Ninja Plugins (API Hashing)
Malware Information Collection Analysis with Binary Ninja (Course Preview)
Triaging Obfuscated Binaries with Binary Ninja and AssemblyLine (Stream - 26/08/2025)
Time Travel Debugging in Binary Ninja with Xusheng Li
An Introduction to Binary Ninja for Malware Analysis
AI Malware Reverse Engineering with Binary Ninja MCP Server (Stream - 11/04/2025)
Stealer Malware Analysis with Binary Ninja (Stream - 25/02/2025)
Recon 2018 Montreal - Malware Analysis and Automation using Binary Ninja by Erika Noerenberg
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free
Binary Ninja Sidekick 2.0: Analyzing Ransomware with Large Language Models
Automated Unpacking  (Malware Analysis & Reverse Engineering)
Make Malware Analysis FASTER with Binary Emulation
View Detailed Profile
Malware Analysis with Binary Ninja Plugins (API Hashing)

Malware Analysis with Binary Ninja Plugins (API Hashing)

Build real confidence analyzing malware. Join the waitlist. https://go.themalwarelab.co/join Get my

Malware Information Collection Analysis with Binary Ninja (Course Preview)

Malware Information Collection Analysis with Binary Ninja (Course Preview)

This course preview provides an overview of analyzing information collection functionality in an Server Message Block (SMB) ...

Triaging Obfuscated Binaries with Binary Ninja and AssemblyLine (Stream - 26/08/2025)

Triaging Obfuscated Binaries with Binary Ninja and AssemblyLine (Stream - 26/08/2025)

Scavenger

Time Travel Debugging in Binary Ninja with Xusheng Li

Time Travel Debugging in Binary Ninja with Xusheng Li

In this stream Xusheng Li from Vector35 walks us through Time Travel Debugging in

An Introduction to Binary Ninja for Malware Analysis

An Introduction to Binary Ninja for Malware Analysis

Join the waitlist for my Reverse Engineering

AI Malware Reverse Engineering with Binary Ninja MCP Server (Stream - 11/04/2025)

AI Malware Reverse Engineering with Binary Ninja MCP Server (Stream - 11/04/2025)

Throughout this stream we look at reverse engineering

Stealer Malware Analysis with Binary Ninja (Stream - 25/02/2025)

Stealer Malware Analysis with Binary Ninja (Stream - 25/02/2025)

In this stream

Recon 2018 Montreal - Malware Analysis and Automation using Binary Ninja by Erika Noerenberg

Recon 2018 Montreal - Malware Analysis and Automation using Binary Ninja by Erika Noerenberg

As threats have increased in prevalence and sophistication over the years, analysts simply need more time and resources to ...

Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

This video has a newer, updated version here: https://youtu.be/k2gzFV2-czc I tried three free disassemblers and decompilers and ...

Binary Ninja Sidekick 2.0: Analyzing Ransomware with Large Language Models

Binary Ninja Sidekick 2.0: Analyzing Ransomware with Large Language Models

Throughout this video we look at the 2.0 features of the

Automated Unpacking  (Malware Analysis & Reverse Engineering)

Automated Unpacking (Malware Analysis & Reverse Engineering)

Build real confidence analyzing malware. Join the waitlist. https://go.themalwarelab.co/join Get my

Make Malware Analysis FASTER with Binary Emulation

Make Malware Analysis FASTER with Binary Emulation

Anuj's Channel: https://www.youtube.com/@sonianuj Free Cybersecurity Education and Ethical Hacking with John Hammond ...

Binary Ninja Malware Emulation Plugin Development - Advobfuscator (Stream - 08/07/2025)

Binary Ninja Malware Emulation Plugin Development - Advobfuscator (Stream - 08/07/2025)

In this stream we started the development of a general code emulation

Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja

Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja

We

Building BinaryNinja type libraries for malware analysis!

Building BinaryNinja type libraries for malware analysis!

Types are very important when reverse engineering

IDA vs Binary Ninja vs Ghidra after 1.5 years using them

IDA vs Binary Ninja vs Ghidra after 1.5 years using them

This is a comparison of Ghidra,

Malware Evasion Techniques: API Unhooking (Malware Analysis & Reverse Engineering)

Malware Evasion Techniques: API Unhooking (Malware Analysis & Reverse Engineering)

Build real confidence analyzing malware. Join the waitlist. https://go.themalwarelab.co/join Get my

AI vs AI - Binary Ninja Live Stream

AI vs AI - Binary Ninja Live Stream

Tim Blazytko joins us to compare various MCP, CLI, agentic, and other LLM options for both assisted and fully-automatic reverse ...

312 Using Binary Ninja for Modern Malware Analysis Dr Jared DeMott Mr Josh Stroschein

312 Using Binary Ninja for Modern Malware Analysis Dr Jared DeMott Mr Josh Stroschein

These are the videos from Derbycon 2016: http://www.irongeek.com/i.php?page=videos/derbycon6/mainlist.

Agentic Malware Analysis: From Task Automation to Deep Analysis

Agentic Malware Analysis: From Task Automation to Deep Analysis

Speaker: Tim Blazytko Part of