eBPF Warfare - Detecting Kernel & eBPF Rootkits with Tracee
![](https://i.ytimg.com/vi/TJgxjVTZtfw/mqdefault.jpg)
1:17:57
Tutorial: Getting Started with eBPF - Liz Rice, Isovalent
![](https://i.ytimg.com/vi/t996ZkbWnEs/mqdefault.jpg)
40:46
Rust and Tell - Berlin - Aya: Extending the Linux Kernel with eBPF and Rust by Michal Rostecki
![](https://i.ytimg.com/vi/61Qjx8Uti5s/mqdefault.jpg)
1:10:25
Incident Response Process
![](https://i.ytimg.com/vi/Wb_vD3XZYOA/mqdefault.jpg)
30:00
eBPF: Unlocking the Kernel [OFFICIAL DOCUMENTARY]
![](https://i.ytimg.com/vi/sibeN4U1fOg/mqdefault.jpg)
46:51
The Five Most Dangerous New Attack Techniques and How to Counter Them
![](https://i.ytimg.com/vi/g6SKWT7sROQ/mqdefault.jpg)
43:05
DEF CON 29 - PatH - Warping Reality: Creating and Countering the Next Generation of Linux Rootkits
![](https://i.ytimg.com/vi/-IGReOYExqo/mqdefault.jpg)
1:07:02
BPF With C
![](https://i.ytimg.com/vi/qymbuuG1flM/mqdefault.jpg)
53:15