YoVDO

DerbyCon Courses

COM Hijacking Techniques
YouTube
Lying in Wait - Discovering and Exploiting Weaknesses in Automated Discovery Actions
YouTube
Kubered Recipes for C2 Operations on Kubernetes
YouTube
Collect All the Data - Protect All the Things
YouTube
How to Tell the C Level Their Baby is Ugly
YouTube
Prepare to Be Boarded - A Tale of Kubernetes Plunder and Cryptobooty
YouTube
Stable 13 - The 1995 Anonymous Cyber Profile Patrick Matthews
YouTube
Cyber False Flags and Adversarial Counterintelligence - Oh My
YouTube
Stable 10 - Getting Dirty on the CANBUS
YouTube
How Do I Detect Technique X in Windows - Applied Methodology to Definitively Answer This Question
YouTube
< Prev Page 5 Next >