EpochZero Learn
EpochZero LearnMulti-Domain Tech Learning Hub
// Walkthroughs

Video analyses

Step-by-step reverse engineering and malware analysis sessions on real samples. Each video is paired with synchronized lab notes and follow-up resources.

Introduction to Malware Analysis: Triage & x86 Architecture

Introduction to Malware Analysis: Triage & x86 Architecture

Foundational lecture on what malware is, the three-question triage method, and the x86 fundamentals every analyst needs.

foundations·beginner·2 views
The Foundations of Malware Analysis & x86 Theory

The Foundations of Malware Analysis & x86 Theory

A deeper, more academic exploration of x86 internals, instruction encoding, the EFLAGS register, and the operand model.

foundations·beginner·3 views
Real-World Malware Case Studies & Code Evasion

Real-World Malware Case Studies & Code Evasion

Three landmark cases — Stuxnet, Colonial Pipeline, and REvil/Kaseya — paired with the code-level evasion taxonomy every analyst must know.

foundations·intermediate·2 views
The Malware Analysis Pipeline: Static & Dynamic Techniques

The Malware Analysis Pipeline: Static & Dynamic Techniques

The full pipeline from receiving a sample to producing a verdict, covering PE structure, hashes, IAT analysis, sandbox detonation, and persistence checks.

static-analysis·intermediate
Reversing Malicious Code: Process Hollowing & API Hooking

Reversing Malicious Code: Process Hollowing & API Hooking

How malware injects code into other processes and intercepts function calls. The four major injection techniques and the three layers of API hooking.

reverse-engineering·advanced
The Explainer: Dissecting Process Hollowing

The Explainer: Dissecting Process Hollowing

A focused, single-topic walkthrough of process hollowing — the API sequence, the memory state at each step, and how to detect it.

reverse-engineering·advanced
Malware's Perfect Disguise: Inside Advanced Code Injection

Malware's Perfect Disguise: Inside Advanced Code Injection

Living off the Land binaries, fileless execution, and the techniques attackers use to disappear into legitimate Windows processes.

reverse-engineering·advanced
Malicious Web & Document Files: Phishing & Drive-By Downloads

Malicious Web & Document Files: Phishing & Drive-By Downloads

How attackers compromise targets through browsers and documents instead of executables. Drive-by downloads, weaponised PDFs and Office documents, JavaScript de-obfuscation.

document-analysis·intermediate
In-Depth Malware Analysis: Unpacking & Memory Forensics

In-Depth Malware Analysis: Unpacking & Memory Forensics

Identifying packed binaries, manual unpacking with the ESP breakpoint, IAT reconstruction, and Volatility memory forensics workflow.

advanced-analysis·advanced
Defeating Self-Defending Malware: Anti-Debugging & Evasion

Defeating Self-Defending Malware: Anti-Debugging & Evasion

How elite malware detects debuggers, identifies VMs, sabotages analysis, and protects embedded data — and how the analyst defeats each defence.

evasion·advanced