- Présentations
- Documents
- Infographies
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Beau Bullock
•
il y a 8 ans
Fade from Whitehat... to Black
Beau Bullock
•
il y a 8 ans
Clamdigging: Leveraging ClamAV for Malware Analysis and Detection
malwareforme
•
il y a 6 ans
PowerShell - PowerForensics
Taha İslam YILMAZ
•
il y a 7 ans
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Auditing Tool !
Aditya K Sood
•
il y a 10 ans
DPAPI AND DPAPI-NG: Decryption toolkit. Black Hat 2017
Paula Januszkiewicz
•
il y a 6 ans
Endpoint is not enough
Sumedt Jitpukdebodin
•
il y a 6 ans
Modern Evasion Techniques
Jason Lang
•
il y a 6 ans
Bypassing patchguard on Windows 8.1 and Windows 10
Honorary_BoT
•
il y a 9 ans
44CON 2014 - Binary Protocol Analysis with CANAPE, James Forshaw
44CON
•
il y a 9 ans
Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying
Dan Kaminsky
•
il y a 13 ans
BSides 2017 - Opening Slides
eanmeyer
•
il y a 7 ans
Understanding the fundamentals of attacks
Cyber Security Alliance
•
il y a 7 ans
Green id airquality report_web_final
Minh Vu
•
il y a 7 ans
BSides Lisbon - Data science, machine learning and cybersecurity
Tiago Henriques
•
il y a 7 ans
Finding attacks with these 6 events
Michael Gough
•
il y a 8 ans
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
•
il y a 8 ans
Open Canary - novahackers
Chris Gates
•
il y a 7 ans
Microsoft Ignite session: Explore adventures in the underland: forensic techniques against hackers evading the hook
Paula Januszkiewicz
•
il y a 7 ans
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Peter Hlavaty
•
il y a 7 ans