- Presentations
- Documents
- Infographics
Nightmares of a Penetration Tester ( How to protect your network)
Chris Nickerson
•
8 years ago
Adversarial Post-Ex: Lessons From The Pros
Justin Warner
•
7 years ago
Protecting endpoints from targeted attacks
AppSense
•
8 years ago
System hardening - OS and Application
edavid2685
•
9 years ago
Fermín J. Serna - Exploits & Mitigations: EMET [RootedCON 2010]
RootedCON
•
14 years ago
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
•
7 years ago
TDOH 南區 WorkShop 2016 Reversing on Windows
Sheng-Hao Ma
•
7 years ago
44Con 2014: GreedyBTS - Hacking Adventures in GSM
iphonepentest
•
9 years ago
Threatcrowd
Christopher Doman
•
7 years ago
Docker London: Container Security
Phil Estes
•
7 years ago
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial Development of Leads
Sam Bowne
•
7 years ago
Securing your Containers (Meetup at Docker HQ 4/7)
Docker, Inc.
•
8 years ago
Implementing Secure Docker Environments At Scale by Ben Bernstein, Twistlock
Docker, Inc.
•
7 years ago
Practical Container Security by Mrunal Patel and Thomas Cameron, Red Hat
Docker, Inc.
•
7 years ago
Securing the Container Pipeline at Salesforce by Cem Gurkok
Docker, Inc.
•
7 years ago
Docker Security workshop slides
Docker, Inc.
•
7 years ago
Docker Security Deep Dive by Ying Li and David Lawrence
Docker, Inc.
•
7 years ago
Reverse Engineering automation
Positive Hack Days
•
9 years ago
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Priyanka Aash
•
9 years ago