TROOPERS Courses
WEareTROOPERS via YouTube Active Directory and Azure - Core Security Principles
WEareTROOPERS via YouTube Abusing Privileged File Operations on Windows
WEareTROOPERS via YouTube No More Dumb Hex
WEareTROOPERS via YouTube Fetch Exploit - Attacks Against Source Code Downloaders
WEareTROOPERS via YouTube IoT Backdoors in Cars
WEareTROOPERS via YouTube Wild West of Conference Apps Security
WEareTROOPERS via YouTube Things Attack - Peek into a 18 Months IoT Honeypot
WEareTROOPERS via YouTube Breaking the Laws of Robotics - Attacking Industrial Robots
WEareTROOPERS via YouTube Swimming IoT or How to Hack a Yacht
WEareTROOPERS via YouTube