Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Windows Internals
YouTube
education
Showing:
18
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Dr Josh Stroschein
Finding Functions from Export Directory and Using Seeds for API Checksums - Part 6
0
rewiews
Explore Lockbit's runtime-linking techniques, including EXPORT_DIRECTORY usage and DLL name seed for API checksum computation. Learn to debug and find APIs efficiently.
Add to list
8
Lesons
16 minutes
On-Demand
Free-Video
Dr Josh Stroschein
Walking the PEB, Enhancing IDA's Output with Structures, and Unlocking Runtime-Linking - Lecture 4
0
rewiews
Explore PEB usage in malware, learn runtime DLL location techniques, and enhance IDA analysis with custom structures for improved reverse engineering.
Add to list
4
Lesons
16 minutes
On-Demand
Free-Video
HackMiami
Building a Canarytoken to Monitor Windows Process Execution - Track 2
0
rewiews
Explore building Canarytokens to monitor Windows process execution, creating alerts for unexpected commands and strengthening defense against potential attacks.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Dr Josh Stroschein
Lockbit's DLL Name Seeding Technique for API Hashing - Part 5
0
rewiews
Explore Lockbit's runtime-linking technique, focusing on DLL name usage for API hashing seed creation and its impact on reverse engineering efforts.
Add to list
7
Lesons
14 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Windows Agentless C2 - Abusing the MDM Client Stack
0
rewiews
Unveils innovative research on exploiting Windows MDM stack for agentless C2 systems. Explores vulnerabilities, custom C2 server creation, and remote device control techniques, inspiring new defensive strategies.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
OffensiveCon
Practical Exploitation of Registry Vulnerabilities in the Windows Kernel
0
rewiews
Explore practical exploitation techniques for Windows kernel registry vulnerabilities, enhancing your understanding of system security and potential attack vectors.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
SyScan360
All About RPC, LRPC, ALPC, and LPC in Your PC
0
rewiews
Comprehensive exploration of Windows inter-process communication mechanisms, including RPC, LRPC, ALPC, and LPC, detailing their architecture, security implications, and practical applications.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Cooper
A View into ALPC-RPC - Advanced Local Procedure Call and Remote Procedure Call
0
rewiews
Explore ALPC-RPC in Windows, including core structures, API, and vulnerability research. Learn about UAC bypass and Local Privilege Escalation discovered during the investigation.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
NorthSec
Advanced Process Injection Techniques
0
rewiews
Hands-on workshop exploring APT tactics for privilege escalation and persistence. Learn to develop stealthy implants through 7 labs on Windows process injection techniques.
Add to list
1
Lesons
2 hours 5 minutes
On-Demand
Free-Video
nullcon
Hypervisors in Your Toolbox - Monitoring and Controlling System Events with HyperPlatform
0
rewiews
Explore HyperPlatform, a thin hypervisor for Windows, enabling flexible handling of system events and rapid implementation of hypervisor-based tools with high compatibility and efficiency using Intel VT-x technology.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
44CON Information Security Conference
Indicators of Compromise - From Malware Analysis to Eradication
0
rewiews
Explore malware analysis techniques, from detection to eradication, using free tools. Learn to identify indicators of compromise and effectively remove threats from enterprise networks.
Add to list
29
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
Battle of Windows Service - A Silver Bullet to Discover File Privilege Escalation Bugs Automatically
0
rewiews
Discover file privilege escalation bugs automatically in Windows services using Advanced Local Procedure Call analysis and process monitoring techniques for enhanced system security.
Add to list
25
Lesons
21 minutes
On-Demand
Free-Video
Black Hat
Counterfeiting the Pipes with FakeNet 2.0
0
rewiews
Explore network simulation for malware analysis using FakeNet 2.0. Learn to mimic protocols, configure settings, and capture network signatures efficiently in this hands-on workshop.
Add to list
36
Lesons
54 minutes
On-Demand
Free-Video
Black Hat
Counterfeiting the Pipes with FakeNet 2.0 - Part 2
0
rewiews
Learn to simulate networks for malware analysis using FakeNet 2.0. Capture network signatures, mimic protocols, and defeat malware through hands-on challenges with real-world samples.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Black Hat
The Sandbox Roulette - Are You Ready For The Gamble?
0
rewiews
Explore application sandbox vulnerabilities and evasion techniques through a "Sandbox Roulette" demonstration, comparing various commercial solutions and their effectiveness against different exploit vectors.
Add to list
32
Lesons
55 minutes
On-Demand
Free-Video
NDC Conferences
Internals of Exceptions
0
rewiews
Explore internal exception mechanisms in Windows, C++, and C#, from low-level details to high-level constructs. Gain insights into advanced exception handling techniques and CLR implementation.
Add to list
21
Lesons
50 minutes
On-Demand
Free-Video
BSidesMunich
Indirect Syscalls: A Journey From High to Low
0
rewiews
Dive into the mechanics of system calls, exploring both direct and indirect implementations while understanding their journey from high-level to low-level programming concepts and security implications.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
x33fcon
Kernel Games: The Ballad of Offense and Defense in Rootkit Methodologies
0
rewiews
Dive into advanced kernel rootkit techniques for red team operations and defense strategies, covering stealthy persistence, EDR evasion, and practical detection methods with hands-on demos.
Add to list
8
Lesons
31 minutes
On-Demand
Free-Video
load more...