All InfoSec / Cybersecurity Videos
Source: www.youtube.com / Dr Josh Stroschein
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA
Crafting Yara Signatures from Code using Hex - Detecting PECompact2
4 days, 15 hours ago |
www.youtube.com
Analyzing Padded Structures in IDA Pro - Part 3
1 week, 4 days ago |
www.youtube.com
07 - Signed and Unsigned Integers
1 week, 5 days ago |
www.youtube.com
06 - Program Segments and Debugging with GDB
1 week, 6 days ago |
www.youtube.com
Analyzing Stack-Based Structures in IDA Pro - Part 2
2 weeks, 4 days ago |
www.youtube.com
The Basics of Analyzing and Creating Structures in IDA Pro - Part 1
3 weeks, 4 days ago |
www.youtube.com
What are PE File Forwarded Exports?
3 weeks, 5 days ago |
www.youtube.com
Memory Dump Unpacking - Finding Redline Stealer
4 months, 2 weeks ago |
www.youtube.com
OneNote Malware Trends - Password Protected Documents
4 months, 4 weeks ago |
www.youtube.com
CyberChef Recipe to Loop Over Values to Modify and Decode
5 months, 3 weeks ago |
www.youtube.com
Using Yara for Detecting Bloated Overlays
5 months, 3 weeks ago |
www.youtube.com
Analyzing Bloated Malware - Trimming Files with a Hex Editor
6 months, 2 weeks ago |
www.youtube.com
Analyzing Malicious Link Files - Identifying Initial Access Techniques
6 months, 2 weeks ago |
www.youtube.com
Yara Basics - Exploring the Differences between Wide and ASCII Strings
6 months, 3 weeks ago |
www.youtube.com
OneNote Malware Trends - Understanding Process Activity with ProcMon
7 months, 1 week ago |
www.youtube.com
Investigating NullMixer Network Traffic: Utilizing Suricata and Evebox (Part 3)
7 months, 3 weeks ago |
www.youtube.com
Unpacking NullMixer - Identifying and Unraveling ASPack (Part 2)
7 months, 3 weeks ago |
www.youtube.com
Investigating NullMixer - Identifying Initial Packing Techniques (Part 1)
7 months, 3 weeks ago |
www.youtube.com
Working with UPX - Manual Unpacking with IDA Pro, x32dbg and Scylla
8 months, 1 week ago |
www.youtube.com
Unpacking VIDAR using Time-Travel Debugging (TTD) in WinDbg Preview
8 months, 2 weeks ago |
www.youtube.com
The Basics of Overlays in PE Files
8 months, 2 weeks ago |
www.youtube.com
Identifying Signs of Packing in VIDAR Stealer with IDA Pro
8 months, 3 weeks ago |
www.youtube.com
Getting Started with Detect-It-Easy (DIE): Investigating a Stealer
8 months, 3 weeks ago |
www.youtube.com
Getting Started with dnSpyEx - Unraveling a .NET Formbook Dropper
9 months, 1 week ago |
www.youtube.com
Items published with this topic over the last 90 days.
Latest
Crafting Yara Signatures from Code using Hex - Detecting PECompact2
4 days, 15 hours ago |
www.youtube.com
Analyzing Padded Structures in IDA Pro - Part 3
1 week, 4 days ago |
www.youtube.com
07 - Signed and Unsigned Integers
1 week, 5 days ago |
www.youtube.com
06 - Program Segments and Debugging with GDB
1 week, 6 days ago |
www.youtube.com
Analyzing Stack-Based Structures in IDA Pro - Part 2
2 weeks, 4 days ago |
www.youtube.com
The Basics of Analyzing and Creating Structures in IDA Pro - Part 1
3 weeks, 4 days ago |
www.youtube.com
What are PE File Forwarded Exports?
3 weeks, 5 days ago |
www.youtube.com
Memory Dump Unpacking - Finding Redline Stealer
4 months, 2 weeks ago |
www.youtube.com
OneNote Malware Trends - Password Protected Documents
4 months, 4 weeks ago |
www.youtube.com
CyberChef Recipe to Loop Over Values to Modify and Decode
5 months, 3 weeks ago |
www.youtube.com
Using Yara for Detecting Bloated Overlays
5 months, 3 weeks ago |
www.youtube.com
Analyzing Bloated Malware - Trimming Files with a Hex Editor
6 months, 2 weeks ago |
www.youtube.com
Analyzing Malicious Link Files - Identifying Initial Access Techniques
6 months, 2 weeks ago |
www.youtube.com
Yara Basics - Exploring the Differences between Wide and ASCII Strings
6 months, 3 weeks ago |
www.youtube.com
OneNote Malware Trends - Understanding Process Activity with ProcMon
7 months, 1 week ago |
www.youtube.com
Investigating NullMixer Network Traffic: Utilizing Suricata and Evebox (Part 3)
7 months, 3 weeks ago |
www.youtube.com
Unpacking NullMixer - Identifying and Unraveling ASPack (Part 2)
7 months, 3 weeks ago |
www.youtube.com
Investigating NullMixer - Identifying Initial Packing Techniques (Part 1)
7 months, 3 weeks ago |
www.youtube.com
Working with UPX - Manual Unpacking with IDA Pro, x32dbg and Scylla
8 months, 1 week ago |
www.youtube.com
Unpacking VIDAR using Time-Travel Debugging (TTD) in WinDbg Preview
8 months, 2 weeks ago |
www.youtube.com
The Basics of Overlays in PE Files
8 months, 2 weeks ago |
www.youtube.com
Identifying Signs of Packing in VIDAR Stealer with IDA Pro
8 months, 3 weeks ago |
www.youtube.com
Getting Started with Detect-It-Easy (DIE): Investigating a Stealer
8 months, 3 weeks ago |
www.youtube.com
Getting Started with dnSpyEx - Unraveling a .NET Formbook Dropper
9 months, 1 week ago |
www.youtube.com
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
Business Information Security Officer
@ Metrolink | Los Angeles, CA
Senior Security Engineer
@ Freedom of the Press Foundation | Remote, 4 hour time zone overlap with New York City
Security Engineer
@ ChartMogul | Remote, EU
Elastic Consultant - EMEA
@ Elasticsearch | Germany
Software Development Engineer, Security
@ Binance | Romania, Bucharest
Digital Network Exploitation Analyst III
@ Aperio Global, LLC | Fort Meade, Maryland, United States