- Presentations
- Documents
- Infographics
Security Operation Center - Design & Build
Sameer Paradia
•
9 years ago
When you don't have 0days: client-side exploitation for the masses
Michele Orru
•
10 years ago
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Rob Fuller
•
12 years ago
Standard Penetration Test & Liquid Limit,Plasticity Limit
gurjapsinghsomal
•
9 years ago
SCADA hacking industrial-scale fun
Jan Seidl
•
10 years ago
Building an Empire with PowerShell
Will Schroeder
•
8 years ago
Hacking SIP Like a Boss!
Fatih Ozavci
•
10 years ago
How to Setup A Pen test Lab and How to Play CTF
n|u - The Open Security Community
•
12 years ago
Scada Industrial Control Systems Penetration Testing
Yehia Mamdouh
•
9 years ago
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
•
8 years ago
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
qqlan
•
11 years ago
Internet connected ICS/SCADA/PLC
qqlan
•
10 years ago
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
•
7 years ago
SCADA deep inside: protocols and security mechanisms
Aleksandr Timorin
•
9 years ago
Red Team Methodology - A Naked Look
Jason Lang
•
4 years ago
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Europe 2014)
arnaudsoullie
•
9 years ago
PT - Siemens WinCC Flexible Security Hardening Guide
qqlan
•
11 years ago
Security Onion Conference - 2015
DefensiveDepth
•
8 years ago
Malware analysis using volatility
Yashashree Gund
•
10 years ago
Outlook and Exchange for the bad guys
Nick Landers
•
7 years ago