DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve Published 2022-10-20 Download video MP4 360p Download video MP4 720p Recommendations 35:49 DEF CON 30 - Lennert Wouters - A Black-Box Security Evaluation of SpaceX Starlink User Terminal 46:01 DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security 47:24 Develop Your Own RAT: EDR + AV Defense by Dobin Rutishauser 1:02:01 #HITB2022SIN EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl 20:31 DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin 46:22 DEF CON 30 - Cesare Pizzi - Old Malware, New tools: Ghidra and Commodore 64 44:56 I'll Let Myself In: Tactics of Physical Pen Testers 22:22 DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs 53:11 NSA Backdoor in Windows? This and more from the guy who created Windows Task Manager! 1:18:10 License to Kill: Malware Hunting with the Sysinternals Tools 47:18 The Tragedy of systemd 37:23 DEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3r 54:09 CrikeyCon 2019 - Christopher Vella - Reversing & bypassing EDRs 39:44 DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep Rodriguez 43:10 DEF CON 30 - Sam Quinn, Steve Povolny - Perimeter Breached Hacking an Access Control System 47:34 DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater 45:30 DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza: Writing Golang Malware 42:04 DEF CON 22 - Dr. Philip Polstra - Am I Being Spied On? 47:47 Writing Tiny, Efficient, And Reliable Malware by Rad Kawar 35:06 DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas Similar videos 32:13 DEF CON 30 - Michael Bargury - No-Code Malware - Windows 11 at Your Service 32:12 DEF CON 31 Packet Hacking Village - WINE Pairing with Malware - Jared Stroud 02:18 Brute Ratel v1.1 - Memory Evasion 07:37 Blindside: A New Technique for EDR Evasion with Hardware Breakpoints 41:59 DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie Kirk 42:14 DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling 12:51 Getting Executables into Memory (Going Fileless) 25:44 DEF CON 30 - Tarek Abdelmotaleb, Dr. Bramwell Brizendine - Weaponizing Windows Syscalls 37:07 DEF CON 30 - Jose Pico, Fernando Perera - Wireless Keystroke Injection via Bluetooth Low Energy 51:08 DEF CON 29 - Policy Panel - Ransomware’s Big Year From Nuisance to Scourge - LIVE 18:52 DEF CON 30 - Andrew Logan - Tracking Military Ghost Helicopters over Washington DC 11:28 Hunting with PE-sieve and invisible injection 24:42 DEF CON 30 RF Village - Eric Escobar - WIPS/WIDS Evasion for Rogue Access Points 05:06 VLOG - EDR Evasion 43:29 DEF CON 30 - Hadrien Barral - Emoji Shellcoding: 🛠️, 🧌, and 🤯 29:31 Master Of Puppets: How To Tamper The EDR? - Daniel Feichter 46:33 #Hacktivity2022 // Practical EDR Bypass Methods in 2022 by István Tóth More results