Vulnerability Assessment Courses
Black Hat via YouTube ProxyLogon is Just the Tip of the Iceberg - A New Attack Surface on Microsoft Exchange Server
Black Hat via YouTube Qualcomm WiFi - Infinity War
Black Hat via YouTube Wi-Fi Direct to Hell - Attacking Wi-Fi Direct Protocol Implementations
Black Hat via YouTube The UEFI Firmware Rootkits - Myths and Reality
Black Hat via YouTube Samsung Pay - Tokenized Numbers Flaws and Issues
Black Hat via YouTube Android Kernel and OS Security Assessment with Iron Crow
Black Hat via YouTube How to Hack an API in 15 Minutes
LASCON via YouTube Scanning at Scale with OWASP ZAP - Technical Challenges and Improvements
LASCON via YouTube Using API Specifications to Attack APIs
LASCON via YouTube