- Présentations
- Documents
- Infographies
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Description
bugcrowd
•
il y a 8 ans
Secret of Intel Management Engine by Igor Skochinsky
CODE BLUE
•
il y a 10 ans
Do The IMPOSSIBLE
David Crandall
•
il y a 12 ans
Lie to Me: Bypassing Modern Web Application Firewalls
Ivan Novikov
•
il y a 10 ans
I Have the Power(View)
Will Schroeder
•
il y a 8 ans
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
•
il y a 8 ans
Bo0oM - Deanonymization and total espionage (ZeroNights, 2014)
Дмитрий Бумов
•
il y a 9 ans
Introducing Intelligence Into Your Malware Analysis
Brian Baskin
•
il y a 10 ans
Windows Privilege Escalation
Riyaz Walikar
•
il y a 8 ans
Windows Operating System Archaeology
enigma0x3
•
il y a 7 ans
IDA ユーザなら知っておくべきマントノン侯爵夫人にモテる 7つの法則
勇 中津留
•
il y a 9 ans
Security Ninjas: An Open Source Application Security Training Program
OpenDNS
•
il y a 9 ans
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) - Defcon 25
Chris Thompson
•
il y a 6 ans
What Can Reverse Engineering Do For You?
Amanda Rousseau
•
il y a 6 ans
Client side attacks using PowerShell
Nikhil Mittal
•
il y a 9 ans
Exploitation and State Machines
Michael Scovetta
•
il y a 12 ans
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Sam Bowne
•
il y a 7 ans
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
•
il y a 7 ans
Study on Android Emulator
Samael Wang
•
il y a 8 ans
SANS @Night Talk: SQL Injection Exploited
Micah Hoffman
•
il y a 9 ans