- Presentations
- Documents
- Infographics
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Beau Bullock
•
8 years ago
Fade from Whitehat... to Black
Beau Bullock
•
8 years ago
Clamdigging: Leveraging ClamAV for Malware Analysis and Detection
malwareforme
•
6 years ago
PowerShell - PowerForensics
Taha İslam YILMAZ
•
7 years ago
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Auditing Tool !
Aditya K Sood
•
10 years ago
DPAPI AND DPAPI-NG: Decryption toolkit. Black Hat 2017
Paula Januszkiewicz
•
6 years ago
Endpoint is not enough
Sumedt Jitpukdebodin
•
6 years ago
Modern Evasion Techniques
Jason Lang
•
6 years ago
Bypassing patchguard on Windows 8.1 and Windows 10
Honorary_BoT
•
9 years ago
44CON 2014 - Binary Protocol Analysis with CANAPE, James Forshaw
44CON
•
9 years ago
Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying
Dan Kaminsky
•
13 years ago
BSides 2017 - Opening Slides
eanmeyer
•
7 years ago
Understanding the fundamentals of attacks
Cyber Security Alliance
•
7 years ago
Green id airquality report_web_final
Minh Vu
•
7 years ago
BSides Lisbon - Data science, machine learning and cybersecurity
Tiago Henriques
•
7 years ago
Finding attacks with these 6 events
Michael Gough
•
8 years ago
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
•
8 years ago
Open Canary - novahackers
Chris Gates
•
7 years ago
Microsoft Ignite session: Explore adventures in the underland: forensic techniques against hackers evading the hook
Paula Januszkiewicz
•
7 years ago
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Peter Hlavaty
•
7 years ago