All InfoSec / Cybersecurity Videos
Source: www.youtube.com / Dr Josh Stroschein
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA
Getting Started with Network Simulation and Fakenet-NG
4 months, 1 week ago |
www.youtube.com
Testing and Debugging Shellcode with SCLauncher
4 months, 2 weeks ago |
www.youtube.com
Patching Binaries with IDA Pro (free)!
4 months, 3 weeks ago |
www.youtube.com
Generating Shellcode with MSFVENOM
4 months, 3 weeks ago |
www.youtube.com
Performing a Stack Pivot - How to Control EIP
6 months, 1 week ago |
www.youtube.com
Getting Control of the Instruction Pointer (EIP)!
6 months, 3 weeks ago |
www.youtube.com
Getting Started with REMnux - Installing Tools in a Custom VM
7 months, 1 week ago |
www.youtube.com
What is a Stack Buffer Overflow? Exploring How To Exploit the Stack
7 months, 2 weeks ago |
www.youtube.com
What is Kali Linux? Features, Installation and Why I Use It
7 months, 3 weeks ago |
www.youtube.com
Crafting Yara Signatures from Code using Hex - Detecting PECompact2
7 months, 3 weeks ago |
www.youtube.com
07 - Signed and Unsigned Integers
8 months ago |
www.youtube.com
06 - Program Segments and Debugging with GDB
8 months ago |
www.youtube.com
Analyzing Stack-Based Structures in IDA Pro - Part 2
8 months, 1 week ago |
www.youtube.com
The Basics of Analyzing and Creating Structures in IDA Pro - Part 1
8 months, 2 weeks ago |
www.youtube.com
What are PE File Forwarded Exports?
8 months, 2 weeks ago |
www.youtube.com
CyberChef Recipe to Loop Over Values to Modify and Decode
1 year, 1 month ago |
www.youtube.com
Using Yara for Detecting Bloated Overlays
1 year, 1 month ago |
www.youtube.com
OneNote Malware Trends - OneNote Leads to AgentTesla
1 year, 1 month ago |
www.youtube.com
OneNote Malware Trends - Analyzing Emotet Abuse
1 year, 1 month ago |
www.youtube.com
Analyzing Bloated Malware - Trimming Files with a Hex Editor
1 year, 2 months ago |
www.youtube.com
Analyzing Malicious Link Files - Identifying Initial Access Techniques
1 year, 2 months ago |
www.youtube.com
Yara Basics - Exploring the Differences between Wide and ASCII Strings
1 year, 2 months ago |
www.youtube.com
Detecting Nullmixer with Yara - Crafting a Custom Rule
1 year, 2 months ago |
www.youtube.com
OneNote Malware Trends - Understanding Process Activity with ProcMon
1 year, 3 months ago |
www.youtube.com
Unpacking NullMixer - Identifying and Unraveling ASPack (Part 2)
1 year, 3 months ago |
www.youtube.com
Investigating NullMixer - Identifying Initial Packing Techniques (Part 1)
1 year, 3 months ago |
www.youtube.com
Why I use the 010 Hex-Editor - Essential Reverse Engineering Tools
1 year, 3 months ago |
www.youtube.com
Nothing found.
Items published with this topic over the last 90 days.
Latest
Getting Started with Network Simulation and Fakenet-NG
4 months, 1 week ago |
www.youtube.com
Testing and Debugging Shellcode with SCLauncher
4 months, 2 weeks ago |
www.youtube.com
Patching Binaries with IDA Pro (free)!
4 months, 3 weeks ago |
www.youtube.com
Generating Shellcode with MSFVENOM
4 months, 3 weeks ago |
www.youtube.com
Performing a Stack Pivot - How to Control EIP
6 months, 1 week ago |
www.youtube.com
Getting Control of the Instruction Pointer (EIP)!
6 months, 3 weeks ago |
www.youtube.com
Getting Started with REMnux - Installing Tools in a Custom VM
7 months, 1 week ago |
www.youtube.com
What is a Stack Buffer Overflow? Exploring How To Exploit the Stack
7 months, 2 weeks ago |
www.youtube.com
What is Kali Linux? Features, Installation and Why I Use It
7 months, 3 weeks ago |
www.youtube.com
Crafting Yara Signatures from Code using Hex - Detecting PECompact2
7 months, 3 weeks ago |
www.youtube.com
07 - Signed and Unsigned Integers
8 months ago |
www.youtube.com
06 - Program Segments and Debugging with GDB
8 months ago |
www.youtube.com
Analyzing Stack-Based Structures in IDA Pro - Part 2
8 months, 1 week ago |
www.youtube.com
The Basics of Analyzing and Creating Structures in IDA Pro - Part 1
8 months, 2 weeks ago |
www.youtube.com
What are PE File Forwarded Exports?
8 months, 2 weeks ago |
www.youtube.com
CyberChef Recipe to Loop Over Values to Modify and Decode
1 year, 1 month ago |
www.youtube.com
Using Yara for Detecting Bloated Overlays
1 year, 1 month ago |
www.youtube.com
OneNote Malware Trends - OneNote Leads to AgentTesla
1 year, 1 month ago |
www.youtube.com
OneNote Malware Trends - Analyzing Emotet Abuse
1 year, 1 month ago |
www.youtube.com
Analyzing Bloated Malware - Trimming Files with a Hex Editor
1 year, 2 months ago |
www.youtube.com
Analyzing Malicious Link Files - Identifying Initial Access Techniques
1 year, 2 months ago |
www.youtube.com
Yara Basics - Exploring the Differences between Wide and ASCII Strings
1 year, 2 months ago |
www.youtube.com
Detecting Nullmixer with Yara - Crafting a Custom Rule
1 year, 2 months ago |
www.youtube.com
OneNote Malware Trends - Understanding Process Activity with ProcMon
1 year, 3 months ago |
www.youtube.com
Unpacking NullMixer - Identifying and Unraveling ASPack (Part 2)
1 year, 3 months ago |
www.youtube.com
Investigating NullMixer - Identifying Initial Packing Techniques (Part 1)
1 year, 3 months ago |
www.youtube.com
Why I use the 010 Hex-Editor - Essential Reverse Engineering Tools
1 year, 3 months ago |
www.youtube.com
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Security Operations Manager-West Coast
@ The Walt Disney Company | USA - CA - 2500 Broadway Street
Vulnerability Analyst - Remote (WFH)
@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US
Senior Mainframe Security Administrator
@ Danske Bank | Copenhagen V, Denmark