Se cacher à la vue de tous : techniques d'obscurcissement du shellcode | Mike Saunders
![](https://i.ytimg.com/vi/d1xDdJ-mPm8/mqdefault.jpg)
37:13
Abuso de la seguridad de la API – Charles Shirer
![](https://i.ytimg.com/vi/gNdD1R_bUCU/mqdefault.jpg)
50:44
Vunerability-centric Pentesting | Matthew Toussain
![](https://i.ytimg.com/vi/NLezMfNXSmw/mqdefault.jpg)
46:53
Fracasos épicos y relatos de atracos: Red Teaming en busca de una seguridad verdaderamente probad...
![](https://i.ytimg.com/vi/kqaMIFEz15s/mqdefault.jpg)
16:55
Cybersecurity Trends for 2025 and Beyond
![](https://i.ytimg.com/vi/vebIgKHQn60/mqdefault.jpg)
34:39
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
![](https://i.ytimg.com/vi/9dNv9tH0dkU/mqdefault.jpg)
32:20
JD Vance goes after European allies in Munich Security Conference speech | DW News
![](https://i.ytimg.com/vi/JLxA0e5Gja0/mqdefault.jpg)
39:20
Dominio de GeoINT: un píxel vale más que mil palabras | Mishaal Khan
![](https://i.ytimg.com/vi/Rj3sTAMYNQk/mqdefault.jpg)
11:59