Pages from a Sword-Maker's Notebook Part II
Offered By: 0xdade via YouTube
Course Description
Overview
Explore advanced techniques for covert intelligence gathering software in this 52-minute conference talk. Delve into implemented solutions for common requirements, including anti-virus evasion, anti-attribution, covert channels, C2 protection, administration, scaling, persistence, and counter-intelligence. Gain insights into which tactics work from a methodological and human perspective, with specific mappings to technical capabilities. Examine full source code snippets, primarily in Golang, and practical examples addressing various roadblocks in covert operations. Learn from the presenter's extensive experience in offensive security, covering topics such as reverse engineering, penetration testing, malware development, and long-term electronic surveillance.
Syllabus
Pages from a Sword-Maker's Notebook pt. II - Vyrus
Taught by
0xdade
Related Courses
Chip Decapping on a Budget0xdade via YouTube Adventures in Hardware Hacking or Building Expensive Tools on a Budget
0xdade via YouTube Whitelisting LD PRELOAD for Fun and No Profit
0xdade via YouTube 5G Protocol Vulnerabilities and Exploits
0xdade via YouTube Real World Zero Trust Implementation
0xdade via YouTube