02. x33fcon 2018 - Open Source Pentesting by mubix
02. x33fcon 2019 - Out of the Blue by Marc Smeets & Mark Bergman
03. x33fcon 2018 - Threat-based Purple Teaming with ATT&CK by Chris and Cody from MITRE
08. x33fcon 2018 - Aligning Threat intelligence Attribution to Defender Needs by Joe Slowik
07. x33fcon 2018 - What The HELK? Enabling Graph Analytics for Threat Hunting by Cyb3rWard0g
04. x33fcon 2019 - Chaos in the Machine: APT28 Complex by Jason Kitchen & Alex Orleans
10. x33fcon 2018 - Sandbox Evasion using VBA Referencing by Amit Dori
02. Kicking Orion's Assets by mubix
16. x33fcon 2018 - DevSec Defense by Daniel Bohannon
BG - Gitdigger Creating Useful Wordlists From Public Github Repositories - WiK & Mubix
02. mubix (aka Rob Fuller) interview
03. Jurassic Malware by Rob Fuller (mubix)
03. x33fcon 2019 - Offensive Testing of ICS Security by Joe Slowik
BSidesPhilly cs04 Threat Hunting Defining the Process While Circumventing Corporate Obstacles Kevin
01. OMG WTF CTF by keidii
11. Where Cypherpunk Meets Organized Crime by Ben Brown
The Hidden Office Test Key (Persistence)
Tracking attackers: Why attribution matters and how to do it.
APPSEC Cali 2018 - Hunter – Optimize your Pentesters Time
Meet Me in the Middle: Threat Indications and Warning in Principle & Practice - SANS CTI Summit 2019