Channel Avatar

cybercdh @UCND1KVdVt8A580SjdaS4cZg@youtube.com

30K subscribers - no pronouns :c

More from this channel (soon)


00:35
If Amber Heard did InfoSec
23:01
Detect, Hunt & Analyze Threats with INTEZER
06:38
Y2K22 - Why 2022 Broke Email
09:37
LOG4SHELL - A Zero Day you need to protect against TODAY
23:41
Was it Really North Korea? Tools and Techniques to Attribute Malware Campaigns to Nation States
28:28
NSO Pegasus Malware - How Governments spy on any phone
09:26
Kaseya Ransomware Attack - 5 Key Insights into this Malware campaign
10:44
JavaScript Malware - How bad can it be?
13:55
Clubhouse Malware - Analysis of an Agent Tesla Infection Campaign
12:26
How to STEAL $1bn - A look at the Bangladesh Bank Heist
18:18
I bought a PHISHING website from the DARKWEB. Here's what I found...
19:51
Cyber Defender REACTS to THEFT of Microsoft Exchange Server ZERO DAYS used by HAFNIUM
10:59
Remcos Config - Using RC4 to Get Command & Control from CyberChef
17:10
Building a Malware Lab - Software, Hardware, Tools and Tips for Effective Malware Analysis
11:39
Emotet is Dead
16:16
JNLP Dangers - Java Malware Detection & Analysis
33:41
The Truth About Phishing - Tools, Tactics and Techniques to Analyse Phishing & Protect Your Privacy
17:26
Zyxel Backdoor & A Known Plaintext Attack
14:55
SUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShell
31:13
SUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victims
29:30
SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering
23:29
Wrangle with Hangul - Analysis of a malicious hwp document
23:58
Unlocking Excel 4.0 Macro Malware
17:46
Threat Hunting with Inquest Labs
17:55
Crack The BAT - Identifying Compression, Packers & Googling for IOCs
01:07
Welcome to my Channel!
06:14
SANS Got Hacked - 5 Things to Consider
14:10
Bashing LOLSnif - Defeating Anti-Analysis Techniques to get real IOCs
29:48
Coding Expectations for Malware & Pentesting
20:57
HTML Deobfuscation - Analysing HTML Guard Protected Code
00:52
Welcome to my Channel!
37:44
COVID19 Malware - Getting Closer to the Bad Guys
39:47
Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection
12:31
Getting started in Cyber Security
26:59
WannaCry Ransomware - Revisited. Behavioural and Static Analysis Techniques
13:05
Using WhatsApp for Malware Persistence
05:43
Analysing an Emotet Downloader with CMD Watcher and CyberChef
36:18
Analysing Obfuscated VBA - Extracting indicators from a Trickbot downloader
23:31
Stack Buffer Overflows - a primer on smashing the stack using CVE-2017-11882
25:22
Olympic Destroyer - Quick behavioural Analysis of this Wiper Malware
11:14
Malware Lab Setup - Network Configuration
16:08
CVE-2017-11882 - 3 ways to perform technical analysis, 1 easy way to protect
11:08
CVE-2017-8570 - Dynamic analysis of Exploit used in Powerpoint to deliver KeyBase InfoStealer
10:36
BadRabbit Ransomware - How to implement a vaccine to prevent infection
14:57
Reverse Engineer packed JavaScript like a Pro - Using the 'Matching Bracket Method'
15:43
Overcome Self-Defending Malware - Tools, Techniques and Lab Setup
10:15
Extracting encrypted contents from Kronos Banking Trojan
13:59
Technical Analysis of a Word Zero Day - CVE-2017-0262 / CVE-2015-2545
12:19
ScanPOS malware delivered by Kronos Banking Trojan - Quick Code Analysis
17:51
Extract Shellcode from Fileless Malware like a Pro
14:21
Three and a half ways to unpack malware using Ollydbg
15:18
Five Awesome Tools to perform Behavioural Analysis of Malware
11:41
Quick Behavioural Analysis of NotPetya / Petrwrap Ransomware
15:33
JavaScript that drops a RAT - Reverse Engineer it like a pro
05:22
Is WhatsApp leaking your Private Information?
12:16
Malicious Powerpoint and .jse behavioural and code analysis
16:48
Adylkuzz CryptoMiner - A quick behavioural analysis
14:13
Jaff Ransomware - A quick technical analysis
09:04
WannaCry 2.0 - Three ways to find the Kill Switch
14:50
WannaCry 2.0 Ransomware