Prelude
Intro to Verified Security Tests: Authoring Tests That Scale
31:08
Prelude
Global Affairs? In my Threat Model?
56:20
Prelude
Designing and Building a Mechanical Keyboard
41:51
Prelude
Protocol Reverse Engineering
1:24:23
Prelude
Avoiding Insidious Points of Compromise in Infrastructure Access Systems
53:39
Prelude
Offensive Wasm
1:06:56
Prelude
Intro to Syscalls for Windows Malware
1:09:00
Prelude
My Open Source Journey with osquery and Fleet
36:32
Prelude
Malware Dev with Nim: A Case Study in NimPlant
1:02:45
Prelude
An Introduction to Open Source Continuous Security Testing at Scale
1:05:08
Prelude
AV/EDR Evasion: Packer Style
1:38:33
Prelude
Windows Internals for Red Teams
1:14:46
Prelude
Intro to Reverse Engineering
1:06:38
Prelude
Creating a Windows Packer
59:44
Prelude
CVE-2014-6271: ShellShock
1:30
Prelude
APT38 Pharmaceuticals Attacks
10:14
Prelude
GTsST Iron Viking
9:48
Prelude
APT38 CryptoSpy
6:58
Prelude
GTsST Sandworm
7:42
Prelude
APT38 WannaCry
6:29
Prelude
APT38 The Sony Hack
9:56
Prelude
APT38 DarkSeoul
6:17
Prelude
APT40 Find and Exfiltrate Chain
4:54
Prelude
APT40 Shellcode Injection & Defense Evasion
9:20
Prelude
0verture: The Prelude Podcast CVE-EP12
51:19
Prelude
APT40 Government Organizations
5:36
Prelude
APT40 Maritime Industry
1:01
Prelude
0verture: The Prelude Podcast CVE-EP11
58:34
Prelude
Prelude Live: Operator 1.5 Tips and Features (Recorded 4/14/22)
1:06:41
Prelude
Prelude Live: Operator 1.5 Tips and Features (Recorded 4/14/22)
53:39
Prelude
Prelude Operator v1.5 Live Demo
Prelude
APT40 targets defense industry with multi-stage macro-enabled documents
1:09
Prelude
Introducing Prelude Operator 1.5
11:14
Prelude
Mr.Un1k0d3r Offensive Coding: Prelude Operator 1.5 for red team
1:01:56
Prelude
Python Active Directory (AD) Discovery
1:02
Prelude
APT29 (Cozy Bear) RNC Hack
1:32
Prelude
0verture: The Prelude Podcast CVE-EP10
52:21
Prelude
APT29 (Cozy Bear) COVID-19 Vaccine Data
1:32
Prelude
0verture: The Prelude Podcast CVE-EP9
43:24
Prelude
APT29 (Cozy Bear) Operation Ghost
1:16
Prelude
Operator 1.5: BOF + Execute-Assembly chains using Sliver implant
0:51
Prelude
APT29 (Cozy Bear) - US think tanks and NGOs (PolarCalm)
2:25
Prelude
Prelude Operator v1.5 Live Demo (Edited)
52:54
Prelude
Prelude Operator v1.5 Live Demo
1:07:54
Prelude
APT29 (Cozy Bear) - 2016 Democratic National Committee
0:49
Prelude
Sliver mTLS implants with Operator 1.5.0 (alpha)
0:45
Prelude
APT29 (Cozy Bear) - 2015 Pentagon Hack (Goldilocks)
2:53
Prelude
Vectr Community Publisher
4:11
Prelude
Conti Deploy Ransomware
1:12
Prelude
0verture: The Prelude Podcast CVE-EP7
38:42
Prelude
Conti Collect and Exfiltrate
2:33
Prelude
Conti Move to Remote System
1:55
Prelude
0verture: The Prelude Podcast CVE-EP8
1:02:19
Prelude
Conti Privilege Escalation and Persistence
1:43
Prelude
Conti Local and Remote Discovery
2:39
Prelude
0verture: The Prelude Podcast CVE-EP5
55:57
Prelude
0verture: The Prelude Podcast CVE-EP6
45:10
Prelude
Conti Recon & Initial Access
2:12
Prelude
CSwipe Ransomware
3:35
Prelude
SCwipe Ransomware
5:52
Prelude
Windows Live-off-the-Land (LotL) Ransomware
2:19
Prelude
Linux Live-off-the-Land (LotL) Ransomware
0:58
Prelude
0verture: The Prelude Podcast - CVE-EP4 (Live from Seattle)
46:54
Prelude
Prelude Operator 1.3 - Connect Plugin
5:33
Prelude
0verture: The Prelude Podcast - CVE-EP3
47:56
Prelude
0verture: The Prelude Podcast - CVE-EP2
38:33
Prelude
[Twitch Stream] Build-a-Bare minimum viable product | 13 Oct 2021
3:40:24
Prelude
0verture: The Prelude Podcast - CVE-EP1
38:33
Prelude
SIEM Plugin: Integrate real adversarial attack data into the enterprise
3:20
Prelude
Introducing Prelude Operator 1.0.0
11:55
Prelude
Switchboard: Interactive redirector management tool
1:30
Prelude
Prelude Operator and Vectr Integration
2:14
Prelude
Prelude Operator 0.9.13 - Hot swap C2 and TTP similarity detection
13:15
Prelude
Rapid TTP Development and Testing in Prelude Operator
2:57
Prelude
Defanging ryuk for validating signature detections
2:16
Prelude
Prelude Operator
0:59