Changelog Master Feed

Hacking with Go: Part 1 (Go Time #205)

Nov 11, 2021
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 4min
2
What's Your Favorite Security Question?
04:24 • 2min
3
Using the GOL Compiler to Detect Malware?
06:44 • 2min
4
How Does Alpha Golang Make Compiling Easier?
08:50 • 4min
5
Using Polymorphism in a Malware Environment?
12:42 • 4min
6
Do You Know What Version of the Compiler Is?
16:44 • 4min
7
Reverse Engineering
20:22 • 4min
8
UTFA Character Sets - What's the Difference?
24:14 • 2min
9
Reverse Engineering in the Binaries
25:52 • 2min
10
Hacking Is Fun, Isn't It?
27:48 • 2min
11
Go Hacking - Red Team, Blue Team, Red Team?
30:16 • 2min
12
What Color Hat Have You Got On?
32:28 • 2min
13
Capturing the Flag
33:58 • 2min
14
The New Paradigm of Programming Languages
35:43 • 2min
15
Reverse Engineering
37:25 • 2min
16
Reverse Engineering - How Many of the Tooling Will Break?
39:48 • 2min
17
Go Is the Ultimate Malware Writing Language
42:03 • 5min
18
Go Malware
47:05 • 2min
19
InfoSec Twitter
49:18 • 2min
20
Is There a Seagull in Go?
50:57 • 3min
21
How to Write a Malware Into a GitHub Repository
53:57 • 2min
22
I'm Very Curious for When We're Going to See Government Quality Malware
55:34 • 2min
23
The Next Episode About AI Generated Malware
57:10 • 2min
24
VB Script, the Love Bug
59:30 • 4min
25
Are You Ready for Unpopular Opinions?
01:03:32 • 4min
26
The Community That's Ride in Slack?
01:07:36 • 4min
27
Go Time Podcast - Go Time
01:11:21 • 2min