- Presentations
- Documents
- Infographics
Steelcon 2015 Reverse-Engineering Obfuscated Android Applications
Tom Keetch
•
8 years ago
ASERT's DDoS Malware Corral, Volume 2
dschwarz_arbor
•
10 years ago
ASERT's DDoS Malware Corral, Volume 1 by Dennis Schwarz and Jason Jones
arborjjones
•
10 years ago
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
midnite_runr
•
10 years ago
Have You Seen My Malware?
midnite_runr
•
10 years ago
Building Advanced XSS Vectors
Rodolfo Assis (Brute)
•
7 years ago
Dealing with Linux Malware
Michael Boelen
•
8 years ago
Handling of compromised Linux systems
Michael Boelen
•
8 years ago
Bridging the Gap
Will Schroeder
•
8 years ago
Secure 360 adversary simulation
Chris Hernandez
•
7 years ago
A CTF Hackers Toolbox
Stefan
•
7 years ago
Unicode - Hacking The International Character System
Websecurify
•
9 years ago
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Rahul Sasi
•
9 years ago
#RootedCON2012 - DNS: A botnet dialect - Carlos Diaz & Francisco J. Gomez
ffranz
•
12 years ago
Taming worms, rats, dragons & more
Christiaan Beek
•
11 years ago
"Giving the bad guys no sleep"
Christiaan Beek
•
8 years ago
"There's a pot of Bitcoins behind the ransomware rainbow"
Christiaan Beek
•
8 years ago
Avoiding the Pitfalls of Hunting - BSides Charm 2016
Tony Cook
•
8 years ago
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
grecsl
•
8 years ago
Attacker Ghost Stories - ShmooCon 2014
Rob Fuller
•
10 years ago