ESXiArgs Ransomware Analysis with @fwosar

28:54
Malware Triage Tips: How To Stop Wasting Time in IDA On Packed Samples [ Twitch Clip ]

1:53:17
N00bs Night Malware RE Workshop with @c3rb3ru5d3d53c

1:04:00
Is Skynet watching you already?

48:29
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

18:02
Bypassing IsDebuggerPresent using x32dbg

24:58
DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry

42:28
Unpacking Process Injection Malware With IDA PRO (Part 1)

14:09