Vulnerability Analysis Courses
44CON Information Security Conference via YouTube Hidden Networks Pivoting - Redefining DNS Rebinding Attack
BSidesLV via YouTube Unpacking PKGs - A Look Inside macOS Installer Packages and Common Security Flaws
BSidesLV via YouTube What Makes Software Exploitation Hard?
USENIX Enigma Conference via YouTube Adventures with Cybercrime Toolkits - Insights for Pragmatic Defense
USENIX Enigma Conference via YouTube Stack Overflow: A Story of Two Security Tales - Enhancing Software Security
USENIX Enigma Conference via YouTube The Impact of Third-party Code on Android App Security
USENIX Enigma Conference via YouTube IoT RCE, a Study With Disney
BruCON Security Conference via YouTube CVE-Search
BruCON Security Conference via YouTube Breaking Web3 - Exploitation Techniques for Cryptocurrency Hacking
Hack In The Box Security Conference via YouTube