ShmooCon Courses
0xdade via YouTube High Confidence Malware Attribution Using the Rich Header
0xdade via YouTube Behind Enemy Lines - Inside the Operations of a Nation State's Cyber Program
0xdade via YouTube BECs and Beyond - Investigating and Defending Office 365
0xdade via YouTube Process Control Through Counterfeit Comms - Using and Abusing Built-In Functionality to Own a PLC
0xdade via YouTube Looking for Malicious Hardware Implants with Minimal Equipment
0xdade via YouTube Mentoring the Intelligent Deviant - What the Special Operations and Infosec Communities Can Learn from Each Other
0xdade via YouTube Three Ways DuckDuckGo Protects User Privacy While Getting Things Done - And How You Can Too
0xdade via YouTube That's No Moonshot
0xdade via YouTube When CAN CANT
0xdade via YouTube