Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Reverse Engineering with SDR |

In this video, Paul Clark discusses the process of reverse engineering using Software Defined Radio (SDR) technology. The presentation covers the essentials of SDR and how it can be utilized in reverse engineering projects, showcasing the steps involved through a practical example.

Getting Started in Cyber Deception

In this video, John Strand discusses the concept and strategies around Cyber deception. They explore the use of deception technology in cybersecurity, clarifying that it does not involve illegal activities such as hacking back but is aimed at increasing the effort required for an attacker to succeed.

How to Build a Phishing Engagement: Coding TTP’s

In this video, Ralph discusses how to build a phishing engagement, focusing on coding techniques and tools to automate and secure phishing tests. He demonstrates how infrastructure setup, operational security, and phishing email creation can be automated using tools like Ansible, Terraform, and Docker.

Linux Command Line Dojo

In this video, Hal and John discuss advanced Unix command line techniques and their implications for system administration and security. They delve into various Unix commands, demonstrating their use in real-world scenarios to manipulate and analyze system data effectively.

SDR Quick Start Guide

In this video, Paul Clark discusses the fundamentals and applications of Software Defined Radio (SDR). He covers key topics including what SDR is, why it matters, and the different types of hardware and software that can enhance SDR experiences.

Shopping Cart

No products in the cart.