DEFCON 15: Fingerprinting and Cracking Java Obfuscated Code

47:42
Java Bytecode Crash Course

51:34
DEFCON 15: Functional Fuzzing with Funk

41:57
OHM2013: USE OTR!

13:56
everything is open source if you can reverse engineer (try it RIGHT NOW!)

26:53
Philip Roberts: ¿Que diablos es el "event loop" (bucle de eventos) de todos modos? | JSConf EU

23:09
7 patrones de diseño que todo desarrollador debería conocer

9:09
Self-Learning Reverse Engineering in 2022

26:40