Channel Avatar

Cooper @UCI6B0zYvK-7FdM0Vgh3v3Tg@youtube.com

2.2K subscribers - no pronouns :c

All sorts of things related to hacking, security or just me


04:58
CTF Prizegiving Ceremony - Hack.lu
30:00
Disconnecting Games With A Single Packet: An Unreal Untold Story - Hugo Bertin
20:36
Mercator: Mapping The Information System - Didier Barzin
28:02
Detection And Response For Linux Without EDR - Hilko Bengen
21:45
Reverse Engineering Android Apps With ACVTool - Aleksandr Pilgun
30:01
Internal Domain Name Collision 2.0 - Philippe Caturegli
07:51
Pentests Using LLMs - Al Mochkin
04:46
Luks Full Disk Encryption Upside-Down - Michael Hamm
04:27
Learn Anything - Reload - Pauline Bourmeau (Cookie)
04:07
AIL Project: Secrets In Squares - QR Codes - Aurelien Thirion
31:05
Sigma Unleashed: A Realistic Implementation - Mathieu Le Cleach
30:56
New Features In The Zeek Network Monitor - Christian Kreibich
35:25
The XE Files: Trust No Router - James Atack
18:00
The Ouroboros Of Cybercrime: Threat Actors Go From Pwn To Pwn'd - Estelle Ruellan & Stuart Beck
33:29
Understanding File Type Identifiers & Scanners - Ange Albertini
35:19
Keys To The City: The Trade-Off Between Revenue & Privacy In Monetizing SDKs - Dimitrios Valsamaras
27:45
SQL Injection Isn't Dead: Smuggling Queries At The Protocol Level - Paul Gerste
28:13
Ghosts'n'Gadgets: Common Buffer Overflows That Still Haunt Our Networks - Stanislav Dashevskyi
30:28
Making IOT Great Again - David Durvaux & Marc Durvaux
24:52
Quantum Cybersecurity: Pioneering A Secure Future - Samira Chaychi & Sharif Shahini
05:05
MISP Playbooks, Proving The Value Of Cyber Threat Intelligence And ICS-CSIRT.io - Koen Van Impe
06:05
Vulnerability Lookup - Cédric Bonhomme
06:17
Analysis And Forecasting Of Exploits With AI - Roman Graf
05:09
Future Of Websites Without DDoS - Lukáš Kršek
04:12
Using LLM Locally - Pauline Bourmeau (Cookie)
27:37
Scam As A Service Powered By Telegram - Aurimas Rudinskis
04:14
Running Circles Around Threat Actor Tooling Using Javascript Data Visualisation - Chris Horsley
33:01
From 0 To Millions: Protecting Against AitM Phishing At Scale - Jacob Torrey
34:46
The Good, The Bad, And The Ugly: Microsoft Copilot - Inbar Raz & Michael Bargury
27:28
Blowing Up Gas Stations For Fun And Profit - Pedro Umbelino
32:54
Back To The Failure: Did Your Physical Security Evolve In The Last 40 Years? - Simon Geusebroek
10:19
Security Pitfalls In Distributed Erlang And Elixir Systems - Jean-Louis Huynen
05:03
Sharing IoC - Wrong Answers Only - Deborah Servili
38:26
Comprehensive Analysis Of Modern Satellite Vulnerabilities And Emerging Attack Surfaces - Vic Huang
28:07
DFIQ: Codifying Digital Forensic Intelligence - Thomas Chopitea
32:25
Spicy — Generating Robust Parsers For Protocols & File Formats - Benjamin Bannier
25:48
Artemis: How CERT PL Improves The Security Of The Polish Internet - Krzysztof Zając
33:33
Empowering Cybersecurity Outreach And Learning... - David Durvaux & Alexandre Dulaunoy
16:14
Exploit Password Management Software To Obtain Credential From Memory - Efstratios Chatzoglou
06:38
Any Sufficiently Advanced Technology Indistinguishable From 01 January 1970 - Trey Darley
07:34
How Much Time We Had For IPv6 Preparation? - Nicol Dankova
06:19
How I Learned To Stop Worrying And Love The NLF - Fukami
05:31
Flowintel - Flow Your Management - Cruciani David
08:56
A Quick Monologue On Global Inefficiency - Claus Cramon Houmann
32:19
The Web Of Cognitive Warfare - Jindrich Karasek
30:07
KubeHound: Identifying Attack Paths In Kubernetes Clusters At Scale With No Hustle - Julien Terriac
25:36
IoT Hacks Humans: Unexpected Angles Of Human Process Compromise - Vladimir Kropotov
30:59
The Gist Of Hundreds Of Incident Response Cases - Stephan Berger
27:46
Decoding Galah: An LLM Powered Web Honeypot - Adel Karimi
29:00
In-Depth Study Of Linux Rootkits: Evolution, Detection, And Defense - Stephan Berger
31:30
Breaking Industrial Protocol Translation Devices Before The Research Begins - Claire Vacherot
23:28
Malware And Hunting For Persistence: How Adversaries Exploit Your Windows? - Cocomelonc
24:13
You Just Got A CTI Program Funded. Now What? - Lukas Vytautas Dagilis
29:21
Nothing To See Here! On Cloaking Malicious Web Content Delivery - Jeroen Pinoy
31:56
Dredge: An Open Source Framework For Cloud Incident Response - Santi Abastante
21:45
Automating Dark Web CTI Reports With RAG Insight For MISP Sharing - Shing-Li Hung
05:40
Running Exercises with SkillAegis - Sami Mokaddem
31:49
Lessons Learned From (Almost) 8 Years Of Sigma Development - Thomas Patzke
04:22
Latest Updates on Kunai - Quentin Jerome
03:07
Cyrus - The story Of No Cloud - Guillaume Ginis