Posts

[Video]BugBounty Hunters Must Know and Use These 10 Google Chrome Features/Tricks

[Video]Building a Machine Learning Based Web Application Firewall/Intrusion Prevention System From Scratch

Beginner's Guide to DFIR/Threat Hunting with VirusTotal Video Series

[Video]IDA Pro Video Tutorial Series for Vulnerability Researchers & Reverse Engineers[Beginners]

[Video]Virtual Machine Detection using JavaScript | Malware | Browser Exploit

[Video]Reflective Dll Injection Explained in 10 Minutes Malware Techniques

Dll Injection Explained in 10 Minutes | Video Tutorial | Basic Malware Techniques Simplified

My First $15,000 Microsoft Windows Insider Preview Bug Bounty | How to Get Started

Dynamic Binary Instrumentation(DBI)Tutorial with Intel PIN for Reverse Engineering Video

Fixing Windbg Broken Stack Trace using Fake Debugging Symbol Exported From IDA Pro.

Frida Video Tutorial Series for Reverse Engineers

Video Tutorial Series on Python Winappdbg for Reverse Engineers

Ranked #32 in Microsoft’s Top 100 Security Researchers - BlackHat USA 2018