- Extracting and Making Use of Chrome Passwords
- Data Visualization Plugin for IDA Pro
- SAP_exploit
- IDE for Nmap Script Developers
- Using Google Cloud Platform to store and query 1.4 billion usernames and passwords
- mitm6 – compromising IPv4 networks via IPv6
- When Scriptlets Attack: The Moniker
- New Python-Based Crypto-Miner Botnet Flying Under the Radar
- The Bug That Killed Equation Editor - How We Found, Exploited And Micropatched It
- .NET Instrumentation via MSIL bytecode injection
- Discover and analyze gaps in your security posture.
- Windows Console Command History: Valuable Evidence for Live Response Investigation
- FLARE IDA Pro Script Series: Simplifying Graphs in IDA
- Carving Fragmented Registry Files
- Google Home Mini teardown, comparison to Echo Dot, and giving technology a voice
- Decompile Tomb Raider
- Crackme0x02 Dissected with Radare2
- YouTube : 34C3 - Reverse engineering FPGAs
- Censys subdomain finder
- YouTube : Windows Memory Analysis
- Automated Memory Forensic
- YouTube : Introduction to Redline
- YouTube : Introduction to Plaso Heimdall (also covers 20171118)
- Anatomy of the thread suspension mechanism in Windows (Windows Internals)
- Hacking the fx-CP400 - Part 1 (Getting the Firmware)
- Attacking secure USB keys, behind the scene
- Adversarial Tactics, Techniques & Common Knowledge
- Free computer forensic tools