WWHF 2020 (Virtual): Hunting Software Vulnerabilities Without Reversing - Jake Williams
WWHF 2020 (Virtual): Workshop - How To Create How To’s - Jason Blanchard
Dr. Brizendine, Austin Babcock, Dr. Stroschein | Exploits with the JOB ROCKET | WWHF Deadwood 2020
WWHF 2020 (Virtual): Stopping Python-Based Backdoor Attacks - Peter Smith
Lifting the Veil, a Look at MDE Under the Hood | Olaf Hartong | WWHF San Diego 2022
Jake Williams AMA 26 May 2022
An Invitation to Way West Wild West Hackin' Fest - John Strand
BHIS | Firmware Enumeration Using Open Source Tools | Paul Asadoorian | 1-Hour
Mike Felch | Modern Red Team Weaponization | WWHF Deadwood 2020
Emulating the Adversary in Post-Exploitation w/ Jake Williams - SANS HackFest & Ranges Summit 2020
WWHF (Virtual): DOT NET Advanced Malware Development - Joff Thyer
IDA and Malware Reverse Eng 101 by Jake Williams
Cyber Security Training Demo I (For training contact/WA - +91 9452569101)
WWHF Blue Team Roundup | Alissa Torres | IR Pivots : When to Dig into Host Data
Peekaboo - I own you: Owning hundreds of thousands of devices with a broken HTTP packet
Exploiting Persistent XSS | Ken Pyle | WWHF Deadwood 2022
Architecting for Ransomware Resilience | Jake Williams | WWHF San Diego 2022
WWHF | Should you set it and forget it? Intro to IOT Hacking
What Does "Security" Really Mean? - Part 1 - Jake Williams - SCW #28
#374 Vulnerability Hunting with @SANSInstitute @MalwareJake @RenditionSec @Encase #Enfuse2017