Vulnerability Assessment Courses
IEEE via YouTube Cross-Architecture Bug Search in Binary Executables
IEEE via YouTube How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations
IEEE via YouTube Zeroconf Protocols and Their Numerous Man in the Middle Attacks
IEEE via YouTube Managing a Bug Bounty Program From a Hacker's Perspective - NahamCon 2022 EU
NahamSec via YouTube An Adversary's Approach to Smart Contracts
NahamSec via YouTube Smart Contract Auditing - Episode 3
NahamSec via YouTube Bug Bounty Methodology and Hacking the US Government - Interview with Jack Cable
NahamSec via YouTube Live Recon on Rockstar Games - Vulnerability Testing Methodology
NahamSec via YouTube Live Recon and Distributed Recon Automation Using Axiom
NahamSec via YouTube