03. x33fcon 2018 - Threat-based Purple Teaming with ATT&CK by Chris and Cody from MITRE
02. x33fcon 2018 - Open Source Pentesting by mubix
09. x33fcon 2018 - Advances in IPv6 Network Reconnaissance by Fernando Gont
x33fcon 2018 Opening
03. Jurassic Malware by Rob Fuller (mubix)
08. x33fcon 2018 - Aligning Threat intelligence Attribution to Defender Needs by Joe Slowik
03. Chris Korban and Cody Thomas interview
04. x33fcon 2018 - This is enterprise grade solution - and that is how we root it ;) by keidii
03. x33fcon 2019 - Offensive Testing of ICS Security by Joe Slowik
07. x33fcon 2018 - What The HELK? Enabling Graph Analytics for Threat Hunting by Cyb3rWard0g
04. x33fcon 2019 - Chaos in the Machine: APT28 Complex by Jason Kitchen & Alex Orleans
Class 2 03 Advanced threat hunting with open source tools and no budget Joseph DePlato
BG - ATT&CKing the Status Quo: Improving Threat Intel and Cyber Defense with MITRE ATT&CK - Katie Ni
Track 2 03 Threat Activity Attribution Differentiating the Who from the How Joe Slowik
10. x33fcon 2018 - Sandbox Evasion using VBA Referencing by Amit Dori
05. x33fcon 2018 - Oracle Hacking Session with Kamil Stawiarski
10. I Can See an Apple Behind Your Windows - Red Teaming macOS Environments by Wojciech Reguła
Joe Slowik - Indicators vs. Anomalies vs. Behaviors: A Critical Examination for ICS Defense
x33fcon 2017 conference highlights