Modern Adversarial Reconnaissance – Long Live the External

46:40
Recon Like An Adversary: Uncovering Modern Techniques in Attack Surface Management with Jason Haddix

36:35
Hacking on Bug Bounties for 10 years: Shubs' (@infosec_au) Keynote at BSides Ahmedabad 2023

1:08:48
#NahamCon2024: The Art of Bypassing WAFs (with live demos!) | @Brumens2

32:37
A Practical Approach to Smart Fuzzing:Discovering 8 Zero-Days in a Week

30:20
Are VPNs even safe now? Hacker Explains

47:21
The Bug Hunter's Methodology - Application Analysis | Jason Haddix

42:09
DEF CON 25 Recon Village - Jason Haddix - Domain Discovery:Expanding Your Scope Like A Boss

10:38