Personal Information
Secteur d’activité
Technology / Software / Internet
Site Web
www.blackh4t.org
À propos
Hacking 4 fun~
- Présentations
- Documents
- Infographies
Not a Security Boundary: Bypassing User Account Control
enigma0x3
•
il y a 6 ans
Building Advanced XSS Vectors
Rodolfo Assis (Brute)
•
il y a 7 ans
Kerberos, NTLM and LM-Hash
Ankit Mehta
•
il y a 9 ans
Lares from LOW to PWNED
Chris Gates
•
il y a 12 ans
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “features”
Beau Bullock
•
il y a 5 ans
COM Hijacking Techniques - Derbycon 2019
David Tulis
•
il y a 4 ans
An ACE in the Hole - Stealthy Host Persistence via Security Descriptors
Will Schroeder
•
il y a 6 ans
A 2018 practical guide to hacking RFID/NFC
Slawomir Jasek
•
il y a 5 ans
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
Christopher Gerritz
•
il y a 7 ans
RootedCON 2015 - Deep inside the Java framework Apache Struts
testpurposes
•
il y a 9 ans
Reverse proxies & Inconsistency
GreenD0g
•
il y a 5 ans
PowerShell for Cyber Warriors - Bsides Knoxville 2016
Russel Van Tuyl
•
il y a 7 ans
Shellcode injection
Dhaval Kapil
•
il y a 8 ans
PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satoshi Tanda
CODE BLUE
•
il y a 6 ans
A Year in the Empire
Will Schroeder
•
il y a 7 ans
Protecting browsers’ secrets in a domain environment
Itai Grady
•
il y a 7 ans
Formbook - In-depth malware analysis (Botconf 2018)
Rémi Jullian
•
il y a 5 ans
MQTT - IoT - explore & exploit - BSidesTLV 2017 (June 2017)
Moshe Zioni
•
il y a 6 ans
Metasploit - The Exploit Learning Tree
E Hacking
•
il y a 10 ans
Entrepreneurship for hackers
snyff
•
il y a 4 ans