All About DLL Hijacking - My Favorite Persistence Method
![](https://i.ytimg.com/vi/FiT7-zxQGbo/mqdefault.jpg)
42:17
DIY C2 - Malleable Agent Config
![](https://i.ytimg.com/vi/Iwyd5VJwPGA/mqdefault.jpg)
33:29
Windows Hacking Series DLL Hijacking
![](https://i.ytimg.com/vi/JPQWQfDhICA/mqdefault.jpg)
1:02:28
CppCon 2017: James McNellis “Everything You Ever Wanted to Know about DLLs”
![](https://i.ytimg.com/vi/tBR1-1J5Jec/mqdefault.jpg)
9:26
Malware Theory - Process Injection
![](https://i.ytimg.com/vi/9fV8tWb2W1M/mqdefault.jpg)
17:27
How Hackers Evade Program Allowlists with DLLs
![](https://i.ytimg.com/vi/5osU3Igzv_Y/mqdefault.jpg)
2:20:46
HackTheBox - Mist
![](https://i.ytimg.com/vi/rfYVkpArtgU/mqdefault.jpg)
2:06:46
HackTheBox RegistryTwo
![](https://i.ytimg.com/vi/nsg3RYiZ_oQ/mqdefault.jpg)
1:43:25