Similar Tracks
DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve
DEFCONConference
#HITBCW2021 D2 - How To Defeat EDRs In Usermode - Alessandro Magnosi & Jean Francois Maes
Hack In The Box Security Conference
DEF CON 32 - Defeating EDR Evading Malware with Memory Forensics - Case, Sellers, Richard, et al.
DEFCONConference
#HITB2022SIN One-Click To Completely Takeover A MacOS Device - Mickey Jin
Hack In The Box Security Conference
Under the hood of Amazon Aurora Limitless: scaling a relational DB / Victor Vedmich, Mike Golubev
Tech Internals Conf
#HITB2024BKK D2 - Exposing Critical Threats in Millions of Connected Devices
Hack In The Box Security Conference