ASERT's DDoS Malware Corral, Volume 2

dschwarz_arbor 10 years ago

Have You Seen My Malware?

midnite_runr 10 years ago

Building Advanced XSS Vectors

Rodolfo Assis (Brute) 7 years ago

Dealing with Linux Malware

Michael Boelen 8 years ago

Handling of compromised Linux systems

Michael Boelen 8 years ago

Bridging the Gap

Will Schroeder 8 years ago

Secure 360 adversary simulation

Chris Hernandez 7 years ago

A CTF Hackers Toolbox

Stefan 7 years ago

Taming worms, rats, dragons & more

Christiaan Beek 11 years ago

"Giving the bad guys no sleep"

Christiaan Beek 8 years ago

Attacker Ghost Stories - ShmooCon 2014

Rob Fuller 10 years ago