Dynamic Analysis Courses
Black Hat via YouTube How Embedded TCP-IP Stacks Breed Critical Vulnerabilities
Black Hat via YouTube Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares
Black Hat via YouTube IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies
Black Hat via YouTube Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches
Black Hat via YouTube BluePill - Neutralizing Anti-Analysis Behavior in Malware Dissection
Black Hat via YouTube Mac-A-Mal - An Automated Platform for Mac Malware Hunting
Black Hat via YouTube When Qiling Framework Meets Symbolic Execution
Hack In The Box Security Conference via YouTube ProdSec - A Technical Approach
Hack In The Box Security Conference via YouTube Go Speed Tracer - Guided Fuzzing
Hack In The Box Security Conference via YouTube