SHEHACKS // Chat with Matt Suiche (OPCDE)
OPCDE
SHEHACKS // Chat with Matt Suiche (OPCDE)
51:23
vrOPCDE | Hackers and Virtual Reality. One step closer to cyberpunks?
OPCDE
vrOPCDE | Hackers and Virtual Reality. One step closer to cyberpunks?
1:41:56
vOPCDE #10 - Crypto AMA (Mark C.,vixentael, Kiyanchuk)
OPCDE
vOPCDE #10 - Crypto AMA (Mark C.,vixentael, Kiyanchuk)
1:14:49
vOPCDE #10 - Red Team Handcuffs(McGary, Bachman)
OPCDE
vOPCDE #10 - Red Team Handcuffs(McGary, Bachman)
45:41
vOPCDE 10 | July 29, 2020
OPCDE
vOPCDE 10 | July 29, 2020
2:23:11
vOPCDE #9 - A Journey into Malware HTTP Communication Channels Spectacles (Mohamad Mokbel)
OPCDE
vOPCDE #9 - A Journey into Malware HTTP Communication Channels Spectacles (Mohamad Mokbel)
1:41:11
vOPCDE #9 - macOS Ransomware: OSX.EvilQuest Uncovered (Patrick Wardle)
OPCDE
vOPCDE #9 - macOS Ransomware: OSX.EvilQuest Uncovered (Patrick Wardle)
1:31:50
vOPCDE 9 | July 15, 2020
OPCDE
vOPCDE 9 | July 15, 2020
3:55:41
vOPCDE #6-Decoding and interpreting Intel PT traces for vulnerability analysis(Jeong Wook 'Matt' Oh)
OPCDE
vOPCDE #6-Decoding and interpreting Intel PT traces for vulnerability analysis(Jeong Wook 'Matt' Oh)
1:06:00
vOPCDE #8 - CrimeOps: The operational art of cybercrime (The Grugq)
OPCDE
vOPCDE #8 - CrimeOps: The operational art of cybercrime (The Grugq)
1:14:34
vOPCDE #8 - Scoop the Windows 10 pool! (Corentin Bayet, Paul Fariello)
OPCDE
vOPCDE #8 - Scoop the Windows 10 pool! (Corentin Bayet, Paul Fariello)
42:02
vOPCDE #8 - SMBaloo: From zero to hero (Matt Suiche, Baloo)
OPCDE
vOPCDE #8 - SMBaloo: From zero to hero (Matt Suiche, Baloo)
1:19:09
The art of cyber crime, Windows Pools and Windows ARM64 exploitation | July 1, 2020 | vOPCDE #8 |
OPCDE
The art of cyber crime, Windows Pools and Windows ARM64 exploitation | July 1, 2020 | vOPCDE #8 |
3:24:11
vOPCDE #7- Automating the Provisioning of Active Directory Labs in Azure(Christophe Tafani-Dereeper)
OPCDE
vOPCDE #7- Automating the Provisioning of Active Directory Labs in Azure(Christophe Tafani-Dereeper)
36:43
vOPCDE #7 - Covid19, A Venture Perspective (William Lin)
OPCDE
vOPCDE #7 - Covid19, A Venture Perspective (William Lin)
41:58
Venture Investments, Active Directory in Azure, and Null Points! | June 17, 2020 | vOPCDE #7 |
OPCDE
Venture Investments, Active Directory in Azure, and Null Points! | June 17, 2020 | vOPCDE #7 |
2:44:56
vOPCDE #6 - Surveillance, Security and old-school hackers in the Covid era (Joseph Menn)
OPCDE
vOPCDE #6 - Surveillance, Security and old-school hackers in the Covid era (Joseph Menn)
37:39
vOPCDE #6 - The Penquin is in da house (Dr. Silvio La Porta Leonardo, Dr. Antonio Villani Leonardo)
OPCDE
vOPCDE #6 - The Penquin is in da house (Dr. Silvio La Porta Leonardo, Dr. Antonio Villani Leonardo)
32:24
vOPCDE #6 - WinDbg: time to put the @ back in the bag (Yarden Shafir)
OPCDE
vOPCDE #6 - WinDbg: time to put the @ back in the bag (Yarden Shafir)
30:34
Is the Fed pushing us into a dystopian cyberpunk future? | June 3, 2020 | vOPCDE #6 |
OPCDE
Is the Fed pushing us into a dystopian cyberpunk future? | June 3, 2020 | vOPCDE #6 |
3:06:03
VOPCDE #5 - Cleanly Escaping the Chrome Sandbox (Tim Becker)
OPCDE
VOPCDE #5 - Cleanly Escaping the Chrome Sandbox (Tim Becker)
45:19
vOPCDE #5 - Panel: Mobile Tracking: Xiaomi, Aarogya Setu etc. (Raiu, Cirlig, Alderson)
OPCDE
vOPCDE #5 - Panel: Mobile Tracking: Xiaomi, Aarogya Setu etc. (Raiu, Cirlig, Alderson)
39:32
vOPCDE #5 - Tracking the mobile trackers (Costin Raiu)
OPCDE
vOPCDE #5 - Tracking the mobile trackers (Costin Raiu)
41:02
vOPCDE #5 - Keynote: China's cheap Xiaomis are low on privacy (Gabi Cirlig)
OPCDE
vOPCDE #5 - Keynote: China's cheap Xiaomis are low on privacy (Gabi Cirlig)
39:21
May 20, 2020 | vOPCDE #5 | Mobile Tracking, Xiaomi, Aarogya Setu, and Chrome Sandbox escape.
OPCDE
May 20, 2020 | vOPCDE #5 | Mobile Tracking, Xiaomi, Aarogya Setu, and Chrome Sandbox escape.
2:50:47
vOPCDE #4 - Exploratory Endeavor in Reverse Engineering of Multi-platform Compiler (Mohamad Mokbel)
OPCDE
vOPCDE #4 - Exploratory Endeavor in Reverse Engineering of Multi-platform Compiler (Mohamad Mokbel)
1:14:55
vOPCDE #4 -  Security Conversations: Ryan Naraine interviews Interview of Bill Demirkapi
OPCDE
vOPCDE #4 - Security Conversations: Ryan Naraine interviews Interview of Bill Demirkapi
32:18
vOPCDE #4 | Reversing the wrong  Win32k vulnerability | Maddie Stone (Google Project Zero)
OPCDE
vOPCDE #4 | Reversing the wrong Win32k vulnerability | Maddie Stone (Google Project Zero)
36:18
vOPCDE #4 | Keynote: Active Measures | Thomas Rid (Johns Hopkins SAIS, Author of ACTIVE MEASURES)
OPCDE
vOPCDE #4 | Keynote: Active Measures | Thomas Rid (Johns Hopkins SAIS, Author of ACTIVE MEASURES)
40:21
vOPCDE #4 | May 6, 2020 | Active Measures, Win32k 0days in the wild, becoming a hacker and reversing
OPCDE
vOPCDE #4 | May 6, 2020 | Active Measures, Win32k 0days in the wild, becoming a hacker and reversing
3:36:40
vOPCDE #3 - Search & Delete: eDiscovery using EWS & Graph APIs (Josh Rickard)
OPCDE
vOPCDE #3 - Search & Delete: eDiscovery using EWS & Graph APIs (Josh Rickard)
43:39
vOPCDE #3 - Panel: Vulnerability Disclosure (Casey Ellis, Costin Raiu, The Grugq)
OPCDE
vOPCDE #3 - Panel: Vulnerability Disclosure (Casey Ellis, Costin Raiu, The Grugq)
51:40
vOPCDE #3 - It’s Goin’ Down: Finding New Threat Actors in Old Scriptures (J. A. Guerrero-Saade)
OPCDE
vOPCDE #3 - It’s Goin’ Down: Finding New Threat Actors in Old Scriptures (J. A. Guerrero-Saade)
36:20
vOPCDE #3 - MISP & Information Sharing (Alexandre Dulaunoy)
OPCDE
vOPCDE #3 - MISP & Information Sharing (Alexandre Dulaunoy)
34:34
vOPCDE #3 | April 22, 2020 | MISP Threat Intelligence, APTs, Bug Bounties and Graph API.
OPCDE
vOPCDE #3 | April 22, 2020 | MISP Threat Intelligence, APTs, Bug Bounties and Graph API.
2:57:43
vOPCDE #2 - Discussion: Disinformation about Disinformation (Grugq, SJ, Brian)
OPCDE
vOPCDE #2 - Discussion: Disinformation about Disinformation (Grugq, SJ, Brian)
1:16:24
vOPCDE #2 - The 'S' in Zoom, Stands for Security (Patrick Wardle)
OPCDE
vOPCDE #2 - The 'S' in Zoom, Stands for Security (Patrick Wardle)
51:09
vOPCDE #2 - Catching APTs@home - how to tap your home internet (Costin Raiu)
OPCDE
vOPCDE #2 - Catching APTs@home - how to tap your home internet (Costin Raiu)
39:44
vOPCDE #2 - Keynote (Ryan Naraine)
OPCDE
vOPCDE #2 - Keynote (Ryan Naraine)
21:40
vOPCDE #2 | April 8, 2020 | Disinformation, APTs, and catching vulnerabilities in Zoom.
OPCDE
vOPCDE #2 | April 8, 2020 | Disinformation, APTs, and catching vulnerabilities in Zoom.
3:27:47
NTML Relay Is Dead? - Yongtao Wang and Yang Zhang
OPCDE
NTML Relay Is Dead? - Yongtao Wang and Yang Zhang
37:03
vOPCDE #1 - Half Automatic Compilable Source Code Recovery (Joxean Koret) | vOPCDE #1
OPCDE
vOPCDE #1 - Half Automatic Compilable Source Code Recovery (Joxean Koret) | vOPCDE #1
48:38
vOPCDE #1 - Black Box Reverse Engineering (Charles Muiruri) | vOPCDE #1
OPCDE
vOPCDE #1 - Black Box Reverse Engineering (Charles Muiruri) | vOPCDE #1
42:18
vOPCDE #1 - Using Serverless To Build Pentesting Toolset (Mazin Ahmed) | vOPCDE #1
OPCDE
vOPCDE #1 - Using Serverless To Build Pentesting Toolset (Mazin Ahmed) | vOPCDE #1
26:50
vOPCDE #1 - I'm Pouncing Over APTs for Purple Teaming (Katie Chuzie, Jesse Zhang, Andrei Saygo)
OPCDE
vOPCDE #1 - I'm Pouncing Over APTs for Purple Teaming (Katie Chuzie, Jesse Zhang, Andrei Saygo)
36:29
vOPCDE #1 | March 25, 2020 | Serverless pentesting, reversing, APTs and Purple Teams
OPCDE
vOPCDE #1 | March 25, 2020 | Serverless pentesting, reversing, APTs and Purple Teams
2:47:29
OPCDE: Meeting Africa's Hackers (Kenya)
OPCDE
OPCDE: Meeting Africa's Hackers (Kenya)
19:23
ZeroNights 2019 - From Memory Forensics to Cloud Memory Analysis (Matt Suiche)
OPCDE
ZeroNights 2019 - From Memory Forensics to Cloud Memory Analysis (Matt Suiche)
36:09
Comae Tutorials - E03 - Memory Analysis of Azure Cloud Windows Virtual Machines
OPCDE
Comae Tutorials - E03 - Memory Analysis of Azure Cloud Windows Virtual Machines
4:56
Comae Tutorials - E02 - Linux Memory Acquisition and Analysis
OPCDE
Comae Tutorials - E02 - Linux Memory Acquisition and Analysis
3:52
Comae Tutorial - E01 - Windows Memory Acquisition & Analysis with DumpIt and Stardust
OPCDE
Comae Tutorial - E01 - Windows Memory Acquisition & Analysis with DumpIt and Stardust
4:32
Next-gen IoT botnets - Alex "Jay" Balan
OPCDE
Next-gen IoT botnets - Alex "Jay" Balan
34:23
WhatsApp Digger - Deemah, Lamyaa, Malak, Sarah
OPCDE
WhatsApp Digger - Deemah, Lamyaa, Malak, Sarah
33:37
Lions at the watering hole - Andrei Boz
OPCDE
Lions at the watering hole - Andrei Boz
44:14
Automated Reverse Engineering of Industrial Control Systems Binaries - Mihalis Maniatakos
OPCDE
Automated Reverse Engineering of Industrial Control Systems Binaries - Mihalis Maniatakos
47:05
Using Symbolic Execution to Root Routers - Mathy Vanhoef
OPCDE
Using Symbolic Execution to Root Routers - Mathy Vanhoef
47:02
Trade War Shellcode Wielding of Imports and Exports - Willi Ballenthin
OPCDE
Trade War Shellcode Wielding of Imports and Exports - Willi Ballenthin
39:28
Modern Secure Boot Attacks - Alex Matrosov
OPCDE
Modern Secure Boot Attacks - Alex Matrosov
42:54
Practical Uses for Memory Visualization - Ulf Frisk
OPCDE
Practical Uses for Memory Visualization - Ulf Frisk
43:04
(SAP) Gateway to Heaven - Dmitry Chastuhin & Mathieu Geli
OPCDE
(SAP) Gateway to Heaven - Dmitry Chastuhin & Mathieu Geli
42:10
Evolving Attacker Techniques in Cryptocurrency User Targeting - Philip Martin
OPCDE
Evolving Attacker Techniques in Cryptocurrency User Targeting - Philip Martin
31:08
Danger of using fully homomorphic encryption -   Zhiniang Peng
OPCDE
Danger of using fully homomorphic encryption - Zhiniang Peng
43:48
OPCDE 2019 - Dubai, UAE
OPCDE
OPCDE 2019 - Dubai, UAE
2:17
Comae Stardust - New Features (Process Memory Dumps)
OPCDE
Comae Stardust - New Features (Process Memory Dumps)
27:24
OPCDExSomalia - Interview with Eng. Zahra Abdikarim
OPCDE
OPCDExSomalia - Interview with Eng. Zahra Abdikarim
1:08
Webinar 01 - Memory Forensics With Comae
OPCDE
Webinar 01 - Memory Forensics With Comae
1:00:10
OPCDE 2018 Dubai - UEFI BIOS firmware analysis at scale -  Oleksandr Bazhaniuk
OPCDE
OPCDE 2018 Dubai - UEFI BIOS firmware analysis at scale - Oleksandr Bazhaniuk
35:20
OPCDE 2018 Dubai - Security Response in Today’s Ecosystem - Philip Misner
OPCDE
OPCDE 2018 Dubai - Security Response in Today’s Ecosystem - Philip Misner
43:05
OPCDE 2018 Dubai - Improved KRACK Attacks Against WPA2 Implementations - Mathy Vanhoef
OPCDE
OPCDE 2018 Dubai - Improved KRACK Attacks Against WPA2 Implementations - Mathy Vanhoef
44:20
OPCDE 2018 Dubai Highlights
OPCDE
OPCDE 2018 Dubai Highlights
1:45
OPCDE 2018 Dubai - Surprise, Supplies! - Paul Rascagneres & Warren Mercer
OPCDE
OPCDE 2018 Dubai - Surprise, Supplies! - Paul Rascagneres & Warren Mercer
43:17
OPCDE 2018 Dubai - “One person’s “magic” is another person’s engineering - Daniel Cuthbert
OPCDE
OPCDE 2018 Dubai - “One person’s “magic” is another person’s engineering - Daniel Cuthbert
35:37
OPCDE2018 Dubai - DPRK's eyes on mobile: Spying on North Korean Defectors - Inhee Han & Jaewon Min
OPCDE
OPCDE2018 Dubai - DPRK's eyes on mobile: Spying on North Korean Defectors - Inhee Han & Jaewon Min
46:53
OPCDE 2018 Dubai - Getting Cozy with Auditing on MacOS - Patrick Wardle
OPCDE
OPCDE 2018 Dubai - Getting Cozy with Auditing on MacOS - Patrick Wardle
46:53
OPCDE 2018 Dubai - Revisiting the Security of NVIDIA Tegra Platform - Sen "nforest" Nie
OPCDE
OPCDE 2018 Dubai - Revisiting the Security of NVIDIA Tegra Platform - Sen "nforest" Nie
41:02
OPCDE 2018 Dubai - Kernel Object Abuse by Type Isolation - Saif El Shereif & Ian Kronquist
OPCDE
OPCDE 2018 Dubai - Kernel Object Abuse by Type Isolation - Saif El Shereif & Ian Kronquist
40:46
OPCDE 2017 Dubai Highlights
OPCDE
OPCDE 2017 Dubai Highlights
2:56
Comae - Cyber Security Facts
OPCDE
Comae - Cyber Security Facts
1:35