Youtube activity of "" (@lauriewired) on "LaurieWired" channel.
-
Commenter youtube id
- 85
-
Commenter name
-
Commenter name id
-
Comments by video
"ARM Assembly: Lesson 1 (MOV, Exit Syscall)"
"ARM Assembly: Lesson 3 (LDR, STR)"
"ARM Assembly: Lesson 8 (Branching)"
"Analyzing Deepseek's "undefined" NVIDIA PTX optimizations (with benchmarks!)"
"Android Banker Deep Dive (Part 1)"
"Android Banker Deep Dive (Part 2)"
"Android Banker Deep Dive (Part 4)"
"Android Undercover: Native Code Translation for AV Stealth - DC615/DEF CON Nashville"
"Azure ARM64 Android Emulator for Reverse Engineering"
"Bad Unboxing: Automated Android Unpacking"
"Choosing an Android Emulator for Malware Reversing, Development, and More!"
"Computing the Euclidean Algorithm in raw ARM Assembly"
"Debugging Android Java Code With JDB"
"Deciphering Obfuscated JavaScript Malware"
"Easy Android Emulator in Docker"
"Finding the Entrypoint of iOS Apps in Ghidra"
"History of Valentine's Day Malware (2001-2022)"
"Hooking Java Methods with Frida"
"Hooking Native Android Methods with Frida"
"How a Clever 1960s Memory Trick Changed Computing"
"JADXecute: Dynamic Scripting For JADX"
"Linux Backdoor Deep Dive (Part 1)"
"Linux Backdoor Deep Dive (Part 4)"
"Mastering Memory: Allocation Techniques in C, C++, and ARM Assembly"
"Objective-C Calling Conventions for iOS Reverse Engineering"
"Operation Binder: Secrets of Inter-Process Communication"
"RISC-V Assembly Hello World (Part 1)"
"RISC-V Assembly Hello World (Part 2)"
"Reverse Engineering 101: How to Dissect and Master Any Platform"
"Santa gave me a concurrency problem for Christmas..."
"Sniffing Android HTTPS Traffic with Burpsuite"
"Speeding up Linux Malware Analysis with Docker"
"The Magic of RISC-V Vector Processing"
"Triggering Android Intents"
"Unpacking Android APKs with Medusa"
"Using Strace to Trace Linux Syscalls"
"What ACTUALLY happens during a Stack Overflow?"
"Where's the native code? (In Android)"
"Writing a custom Android Decryptor in Java"
"what happens when your CPU has a bug? (GhostWrite)"