08. x33fcon 2019 - APT ATT&CK™ - Threat-based Purple Teaming by Jamie Williams & Daniel Weiss
08. x33fcon 2018 - Aligning Threat intelligence Attribution to Defender Needs by Joe Slowik
07. x33fcon 2019 - Techniques and Tools for becoming an Intelligence Operator by Robert Sell
10. x33fcon 2019 - Hunters ATT&CKing with the right data! by Roberto Rodriguez Jose Louis Rodriguez
03. x33fcon 2019 - Offensive Testing of ICS Security by Joe Slowik
08. Joe Slowik interview
09. x33fcon 2019 - Hunting beacons by Bartosz Jerzman
12. x33fcon 2019 - Attacking AWS: the full cyber kill chain by Paweł Rzepa
#Mortifire Episode 1
2. Piotr Białczak - Hunting malware using its fingerprints
x33fcon 2020 conference highlights
14. The Code Signing Certificate You Never Knew You Had by Dima van de Wouw
Joe Slowik - Indicators vs. Anomalies vs. Behaviors: A Critical Examination for ICS Defense
Christophe Nasarre-Soulier — From ETW to EventPipe
12. EDR Evasion and OODA Loops by Jackson T.
9. Joe Slowik - Cyber Consequences, Operational Dependencies, and Full-Scope Security
BSidesPhilly cs04 Threat Hunting Defining the Process While Circumventing Corporate Obstacles Kevin
Tracking attackers: Why attribution matters and how to do it.
19. Paul Coggin interview
5. Dominic Chell - Offensive Development: Post Exploitation Tradecraft in an EDR World