Thanks for the video, I look forward to seeing more content of this very useful tool on FOR610 class, great idea to make this series of videos and very well made. I also like the approach of making small videos that one can see while having lunch, etc. :) Keep up the good work.
Thank you! I was actually able to follow along! I learned a lot! Messing with some malware now. Heh heh. Hey you can deactivate malware with this right? I see a script called repair as well as one called clear flow and repAir. Can i fix my files with these? I have had nasty lol junk code on my machine i cannot kill for 3 years, I got ghidra to finally analyze and learn to fight back maybe make some bug bounty money...so being able to see the difference between a repaired file and the original would help me make a good case. Because otherwise I’m still a bit shaky with assembly. I love hunting though.
This is the best course on Ghidra that I have found. No wasted time and clear, concise explanations.
how i download this exe file please guide me
Thank you for the feedback!
Excellent video. Not flashy, well edited, well spoken.
Thank you!
Thanks for the video, I look forward to seeing more content of this very useful tool on FOR610 class, great idea to make this series of videos and very well made. I also like the approach of making small videos that one can see while having lunch, etc. :) Keep up the good work.
This is awesome, Anuj! I can't wait to see more of these.
FYI, the MD5 for this sample is db349b97c37d22f5ea1d1841e3c89eb4.
Could you provide the link to sample please?
Thank you for spending your time making this video. Btw, you look like Dinesh from Silicon Valley lol.
Thank you! I was actually able to follow along! I learned a lot! Messing with some malware now. Heh heh. Hey you can deactivate malware with this right? I see a script called repair as well as one called clear flow and repAir. Can i fix my files with these? I have had nasty lol junk code on my machine i cannot kill for 3 years, I got ghidra to finally analyze and learn to fight back maybe make some bug bounty money...so being able to see the difference between a repaired file and the original would help me make a good case. Because otherwise I’m still a bit shaky with assembly. I love hunting though.
It would be handy if you actually gave the MD5 of the exe!
Good point - the MD5 is db349b97c37d22f5ea1d1841e3c89eb4
Thanks a LOOOOT!
MKBHD voice