Is your PC hacked? RAM Forensics with Volatility

13:55
How to not get hacked: real example

10:19
How to know if your PC is hacked? Suspicious Network Activity 101

32:00
Introduction to Memory Forensics with Volatility 3

1:18:10
License to Kill: Malware Hunting with the Sysinternals Tools

16:51
Day-198: How Does Crowdstrike Falcon Malware Detection And Analysis Tool Work?

19:26
NEVER install these programs on your PC... EVER!!!

13:56
everything is open source if you can reverse engineer (try it RIGHT NOW!)

34:46