Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
Introduction
00:00 • 4min
What's Your Favorite Security Question?
04:24 • 2min
Using the GOL Compiler to Detect Malware?
06:44 • 2min
How Does Alpha Golang Make Compiling Easier?
08:50 • 4min
Using Polymorphism in a Malware Environment?
12:42 • 4min
Do You Know What Version of the Compiler Is?
16:44 • 4min
Reverse Engineering
20:22 • 4min
UTFA Character Sets - What's the Difference?
24:14 • 2min
Reverse Engineering in the Binaries
25:52 • 2min
Hacking Is Fun, Isn't It?
27:48 • 2min
Go Hacking - Red Team, Blue Team, Red Team?
30:16 • 2min
What Color Hat Have You Got On?
32:28 • 2min
Capturing the Flag
33:58 • 2min
The New Paradigm of Programming Languages
35:43 • 2min
Reverse Engineering
37:25 • 2min
Reverse Engineering - How Many of the Tooling Will Break?
39:48 • 2min
Go Is the Ultimate Malware Writing Language
42:03 • 5min
Go Malware
47:05 • 2min
InfoSec Twitter
49:18 • 2min
Is There a Seagull in Go?
50:57 • 3min
How to Write a Malware Into a GitHub Repository
53:57 • 2min
I'm Very Curious for When We're Going to See Government Quality Malware
55:34 • 2min
The Next Episode About AI Generated Malware
57:10 • 2min
VB Script, the Love Bug
59:30 • 4min
Are You Ready for Unpopular Opinions?
01:03:32 • 4min
The Community That's Ride in Slack?
01:07:36 • 4min
Go Time Podcast - Go Time
01:11:21 • 2min