deepanshu khanna
Automated Kubernetes Forensics: A Practical Threat Hunting Lab for Real-World Investigations
18:08
deepanshu khanna
Kubernetes Forensics: A Practical Threat Hunting Lab for Real-World Investigations
54:45
deepanshu khanna
Prompt Injection Exploit on GitHub AI Agents – Live Technical Demonstration
15:48
deepanshu khanna
CTI Masterclass Part-II | Automating CTI & hunting APT groups | Automating CTI Lab with Docker
1:27:31
deepanshu khanna
Complete Cyber Threat Intelligence (CTI) Masterclass | Learn and Hunt APT36 espionage group
44:32
deepanshu khanna
🧠 Memory Forensics | Hands-on Ransomware Infected machine | Real-World Memory Analysis like a Pro
1:38:17
deepanshu khanna
Docker forensics - in-depth threat analysis for threat hunters
1:21:42
deepanshu khanna
pe32ransomware - an amateur but interesting ransomware that connects over telegram bot | DFIR
1:01:38
deepanshu khanna
Emotet - The Malware Kingpin Exposed | Complete DFIR and malware analysis
35:56
deepanshu khanna
Designing a Bullet Proof Incident Response (IR) Playbook - Stop Incidents from Becoming Disasters
45:32
deepanshu khanna
Medusa ransomware unlocked - complete in depth ransomware analysis and digital forensics
1:16:23
deepanshu khanna
Agent Tesla - CVE-2017-0199 - malware analysis
31:33
deepanshu khanna
DarkGate malware - Digital Forensics and Incident Response
44:20
deepanshu khanna
EDR bypass - throwback using direct syscalls with AES encryption
1:53
deepanshu khanna
Sock puppets - OSINT and Investigation
42:36
deepanshu khanna
OSINT & Investigations - Lab Setup like a real investigator
46:12
deepanshu khanna
Living off the Land attack via TPMtool
3:56
deepanshu khanna
Dirtypipe - Linux Privilege Escalation CVE2022-0847
1:39
deepanshu khanna
log4j Remote Code Execution demo - CVE2021-44228
1:10
deepanshu khanna
Meterpreter Reverse Shell Complete EDR Bypass
1:07
deepanshu khanna
Certificate Signing - Signing malwares with digital certificates to bypass AVs at runtime
1:03
deepanshu khanna
MP4 malwares - Compromise remote machine using video files
1:04
deepanshu khanna
ADCS NTLM Relay - Compromise the DC
1:59
deepanshu khanna
Hive-Nightmare - Windows 10 CVE-2021-36934
1:45
deepanshu khanna
Print Nightmare LPE Windows11 AV Bypassed (Fully undetectable) - FUD
1:11
deepanshu khanna
Windows Simple Backdoor - Bypassed latest Anti-Virus
1:08
deepanshu khanna
Reverse Engineering - ReverseME
14:29
deepanshu khanna
S3 bucket -- Compromise and Data Leakage (leaking data through security holes)
16:12
deepanshu khanna
AWS Identity Access Management (IAM) - Local Privilege Escalation (LPE)
1:41
deepanshu khanna
Compromising the remote user's system through jpeg icons creating shortcut links
0:50
deepanshu khanna
Malware deployment (Reverse Connection) through Excel (office tools) -- Macro based FUD excel
0:45
deepanshu khanna
md5-collisions
0:30
deepanshu khanna
Phishing or malware execution through PDF
6:47
deepanshu khanna
Phishing or malware execution through Office Tools - Red Team awareness
0:39
deepanshu khanna
Code Caving - How to create or hide a backdoor behind the actual softwares
5:18