Catch Me If You Can. LOLBins and the Adversaries Who Abuse Them
![](https://i.ytimg.com/vi/6vj96QetfTg/mqdefault.jpg)
42:46
How the Best Hackers Learn Their Craft
![](https://i.ytimg.com/vi/YE2AlGIhxt0/mqdefault.jpg)
50:29
CatPhish Automation - The Emerging Use of Artificial Intelligence in Social Engineering
![](https://i.ytimg.com/vi/NHaQdA-uUVY/mqdefault.jpg)
28:25
NSEC2023 - Charles F. Hamilton - Evasion as a Red Teamer
![](https://i.ytimg.com/vi/QBvM-MzQ570/mqdefault.jpg)
19:10
How to Proxy Command Execution: "Living Off The Land" Hacks
![](https://i.ytimg.com/vi/61Qjx8Uti5s/mqdefault.jpg)
1:10:25
Incident Response Process
![](https://i.ytimg.com/vi/sibeN4U1fOg/mqdefault.jpg)
46:51
The Five Most Dangerous New Attack Techniques and How to Counter Them
![](https://i.ytimg.com/vi/XQi6aO2CSgY/mqdefault.jpg)
51:19
Cybercriminalité, des attaques bien réelles | ARTE
![](https://i.ytimg.com/vi/-K6gwI4L9u4/mqdefault.jpg)
27:44