Malware Development: Native API

44:49
Malware Development: System Calls

1:06:21
Malware Development: Process Injection

30:18
Buffer Overflows: A Symphony of Exploitation

1:02:49
Exploit Development for Dummies

27:53
some of the worst API security i've EVER seen

1:10:01
An Introduction to Malware Analysis

19:03
The Malware that Hacked Disney

1:50:25