- Presentations
- Documents
- Infographics
Defcon 27 - Writing custom backdoor payloads with C#
Mauricio Velazco
•
4 years ago
Detection Rules Coverage
Sunny Neo
•
4 years ago
Windows 10 Nt Heap Exploitation (Chinese version)
Angel Boy
•
4 years ago
Red Team Tactics for Cracking the GSuite Perimeter
Mike Felch
•
5 years ago
XXE: How to become a Jedi
Yaroslav Babin
•
6 years ago
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
Saumil Shah
•
5 years ago